Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2024-19551 | Incorrect default permissions in the AMD RyzenTM Master monitoring SDK installation directory could allow an attacker to achieve privilege escalation potentially resulting in arbitrary code execution. |
Wed, 18 Dec 2024 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Amd ryzen Master Monitoring Software Development Kit
|
|
| CPEs | cpe:2.3:a:amd:ryzen_master_monitoring_software_development_kit:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Amd ryzen Master Monitoring Software Development Kit
|
Wed, 13 Nov 2024 21:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Amd
Amd ryzen Master |
|
| CPEs | cpe:2.3:o:amd:ryzen_master:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Amd
Amd ryzen Master |
|
| Metrics |
ssvc
|
Tue, 12 Nov 2024 17:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Incorrect default permissions in the AMD RyzenTM Master monitoring SDK installation directory could allow an attacker to achieve privilege escalation potentially resulting in arbitrary code execution. | |
| Weaknesses | CWE-276 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: AMD
Published:
Updated: 2024-11-13T20:18:46.240Z
Reserved: 2024-01-03T16:43:21.322Z
Link: CVE-2024-21945
Updated: 2024-11-13T20:18:39.426Z
Status : Analyzed
Published: 2024-11-12T18:15:18.450
Modified: 2024-12-18T18:58:24.397
Link: CVE-2024-21945
No data.
OpenCVE Enrichment
No data.
EUVD