Description







Insufficient validation in the IOCTL (Input Output Control) input buffer in AMD Ryzen™ Master may permit a privileged attacker to perform memory reads/writes potentially leading to a loss of confidentiality or arbitrary kernel execution.











Published: 2023-08-15
Score: 6.7 Medium
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Analysis and contextual insights are available on OpenCVE Cloud.

Remediation

No vendor fix or workaround currently provided.

Additional remediation guidance may be available on OpenCVE Cloud.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2023-24743 Insufficient validation in the IOCTL (Input Output Control) input buffer in AMD Ryzen™ Master may permit a privileged attacker to perform memory reads/writes potentially leading to a loss of confidentiality or arbitrary kernel execution.
History

Tue, 08 Oct 2024 20:15:00 +0000

Type Values Removed Values Added
First Time appeared Amd ryzen
CPEs cpe:2.3:h:amd:ryzen:-:*:*:*:*:*:*:*
Vendors & Products Amd ryzen
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Subscriptions

Amd Ryzen Ryzen Master Ryzen Master Monitoring Sdk
Microsoft Windows 10 Windows 11
cve-icon MITRE

Status: PUBLISHED

Assigner: AMD

Published:

Updated: 2024-10-08T19:31:56.839Z

Reserved: 2022-10-27T18:53:39.747Z

Link: CVE-2023-20564

cve-icon Vulnrichment

Updated: 2024-08-02T09:05:36.256Z

cve-icon NVD

Status : Modified

Published: 2023-08-15T22:15:11.597

Modified: 2024-11-21T07:41:07.807

Link: CVE-2023-20564

cve-icon Redhat

Severity : Important

Publid Date: 2023-08-08T06:30:00Z

Links: CVE-2023-20564 - Bugzilla

cve-icon OpenCVE Enrichment

No data.

Weaknesses