CVE-2020-12931AMD Radeon RX 5000 Series PRO W5000 Series vulnerability

4 documents4 sources
Severity
7.8HIGHNVD
EPSS
0.1%
top 72.50%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedNov 9
Latest updateNov 10

Description

Improper parameters handling in the AMD Secure Processor (ASP) kernel may allow a privileged attacker to elevate their privileges potentially leading to loss of integrity.

CVSS vector

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:HExploitability: 1.8 | Impact: 5.9

Affected Packages8 packages

NVDamd/radeon_software< 22.5.2
NVDamd/enterprise_driver< 22.10.20
CVEListV5amd/amd_radeon_rx_5000_series_pro_w5000_seriesAMD Radeon Software22.5.2+2
CVEListV5amd/amd_ryzen_embedded_5000various

🔴Vulnerability Details

2
GHSA
GHSA-j7rp-w7cg-34p9: Improper parameters handling in the AMD Secure Processor (ASP) kernel may allow a privileged attacker to elevate their privileges potentially leading2022-11-10
CVEList
CVE-2020-12931: Improper parameters handling in the AMD Secure Processor (ASP) kernel may allow a privileged attacker to elevate their privileges potentially leading2022-11-09

📋Vendor Advisories

1
Red Hat
hw: amd: Improper handling in the ASP kernel leading to loss of integrity2022-11-08