Products
ASP Secure OS Trusted Execution Environment
- UNKNOWN
Source
psirt@amd.com
Tags
CVE-2021-46746 details
Published : Aug. 13, 2024, 5:15 p.m.
Last Modified : Aug. 13, 2024, 5:15 p.m.
Last Modified : Aug. 13, 2024, 5:15 p.m.
Description
Lack of stack protection exploit mechanisms in ASP Secure OS Trusted Execution Environment (TEE) may allow a privileged attacker with access to AMD signing keys to c006Frrupt the return address, causing a stack-based buffer overrun, potentially leading to a denial of service.
CVSS Score
1 | 2 | 3 | 4 | 5.2 | 6 | 7 | 8 | 9 | 10 |
---|
Weakness
Weakness | Name | Description |
---|
CVSS Data
Attack Vector
LOCAL
Attack Complexity
HIGH
Privileges Required
HIGH
Scope
UNCHANGED
Confidentiality Impact
LOW
Integrity Impact
LOW
Availability Impact
HIGH
Base Score
5.2
Exploitability Score
0.5
Impact Score
4.7
Base Severity
MEDIUM
Vector String : CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:L/I:L/A:H
References
URL | Source |
---|---|
https://www.amd.com/en/resources/product-security/bulletin/amd-sb-3003.html | psirt@amd.com |
This website uses the NVD API, but is not approved or certified by it.