CVE-2022-23829Improper Access Control in AMD Athlon 3000 Series Mobile Processors With Radeon Graphics

Severity
8.2HIGHNVD
EPSS
0.0%
top 99.51%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedJun 18

Description

A potential weakness in AMD SPI protection features may allow a malicious attacker with Ring0 (kernel mode) access to bypass the native System Management Mode (SMM) ROM protections.

CVSS vector

CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:HExploitability: 1.5 | Impact: 6.0

Affected Packages24 packages

CVEListV5amd/amd_epyc_embedded_3000various
CVEListV5amd/amd_epyc_embedded_7002various
CVEListV5amd/amd_epyc_embedded_7003various

🔴Vulnerability Details

2
GHSA
GHSA-624f-w3rg-939c: A potential weakness in AMD SPI protection features may allow a malicious attacker with Ring0 (kernel mode) access to bypass the native System Managem2024-06-18
CVEList
CVE-2022-23829: A potential weakness in AMD SPI protection features may allow a malicious attacker with Ring0 (kernel mode) access to bypass the native System Managem2024-06-18

📋Vendor Advisories

1
Red Hat
hw: amd: SPI protection feature may result in a potential arbitrary code execution.2024-06-11

💬Community

1
Bugzilla
CVE-2022-23829 hw: amd: SPI protection feature may result in a potential arbitrary code execution.2023-03-10
CVE-2022-23829 — Improper Access Control in AMD | cvebase