CVE-2022-23829 — Improper Access Control in AMD Athlon 3000 Series Mobile Processors With Radeon Graphics
Severity
8.2HIGHNVD
EPSS
0.0%
top 99.51%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedJun 18
Description
A potential weakness in AMD SPI protection features may allow a malicious attacker with Ring0 (kernel mode) access to bypass the native System Management Mode (SMM) ROM protections.
CVSS vector
CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:HExploitability: 1.5 | Impact: 6.0
Affected Packages24 packages
🔴Vulnerability Details
2GHSA▶
GHSA-624f-w3rg-939c: A potential weakness in AMD SPI protection features may allow a malicious attacker with Ring0 (kernel mode) access to bypass the native System Managem↗2024-06-18
CVEList▶
CVE-2022-23829: A potential weakness in AMD SPI protection features may allow a malicious attacker with Ring0 (kernel mode) access to bypass the native System Managem↗2024-06-18
📋Vendor Advisories
1Red Hat
▶
💬Community
1Bugzilla▶
CVE-2022-23829 hw: amd: SPI protection feature may result in a potential arbitrary code execution.↗2023-03-10