Products
AMD Ryzen Master
Source
psirt@amd.com
Tags
CVE-2023-20518 details
Published : Aug. 13, 2024, 5:15 p.m.
Last Modified : Aug. 13, 2024, 5:15 p.m.
Last Modified : Aug. 13, 2024, 5:15 p.m.
Description
Incomplete cleanup in the ASP may expose the Master Encryption Key (MEK) to a privileged attacker with access to the BIOS menu or UEFI shell and a memory exfiltration vulnerability, potentially resulting in loss of confidentiality.
CVSS Score
1.9 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 |
---|
Weakness
Weakness | Name | Description |
---|
CVSS Data
Attack Vector
LOCAL
Attack Complexity
HIGH
Privileges Required
HIGH
Scope
UNCHANGED
Confidentiality Impact
LOW
Integrity Impact
NONE
Availability Impact
NONE
Base Score
1.9
Exploitability Score
0.5
Impact Score
1.4
Base Severity
LOW
Vector String : CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:L/I:N/A:N
References
URL | Source |
---|---|
https://www.amd.com/en/resources/product-security/bulletin/amd-sb-3003.html | psirt@amd.com |
https://www.amd.com/en/resources/product-security/bulletin/amd-sb-5002.html | psirt@amd.com |
This website uses the NVD API, but is not approved or certified by it.