Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2024-19552 | Incorrect default permissions in the AMD RyzenTM Master Utility installation directory could allow an attacker to achieve privilege escalation potentially resulting in arbitrary code execution. |
Wed, 18 Dec 2024 19:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Amd ryzen Master Utility For Overclocking Control
|
|
| CPEs | cpe:2.3:a:amd:ryzen_master_utility_for_overclocking_control:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Amd ryzen Master Utility For Overclocking Control
|
Wed, 13 Nov 2024 21:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Amd
Amd ryzen Master |
|
| CPEs | cpe:2.3:o:amd:ryzen_master:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Amd
Amd ryzen Master |
|
| Metrics |
ssvc
|
Tue, 12 Nov 2024 17:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Incorrect default permissions in the AMD RyzenTM Master Utility installation directory could allow an attacker to achieve privilege escalation potentially resulting in arbitrary code execution. | |
| Weaknesses | CWE-276 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: AMD
Published:
Updated: 2024-11-13T20:15:22.603Z
Reserved: 2024-01-03T16:43:21.322Z
Link: CVE-2024-21946
Updated: 2024-11-13T20:15:16.346Z
Status : Analyzed
Published: 2024-11-12T18:15:18.633
Modified: 2024-12-18T19:00:53.060
Link: CVE-2024-21946
No data.
OpenCVE Enrichment
No data.
EUVD