Vulnerability Monitor

The vendors, products, and vulnerabilities you care about

CVE-2021-46757


Insufficient checking of memory buffer in ASP Secure OS may allow an attacker with a malicious TA to read/write to the ASP Secure OS kernel virtual address space potentially leading to privilege escalation.


Security Impact Summary

This vulnerability carries a HIGH severity rating with a CVSS v3.1 score of 7.8, requiring local system access to exploit with relatively low complexity without requiring user interaction requiring only low-level privileges . The vulnerability impacts confidentiality (data exposure), integrity (unauthorized modifications), and availability (service disruption) for affected systems. Impacting 20 products from amd, from amd, from amd and 17 others, organizations running these solutions should prioritize assessment and patching.

Historical Context

Reported in 2024, this vulnerability emerged during an era marked by increased sophistication in supply chain attacks, cloud infrastructure vulnerabilities, and software-as-a-service (SaaS) security challenges. Security practices during this period emphasized zero-trust architectures, container security, and API protection.


Published

2024-02-13T20:15:50.060

Last Modified

2025-05-07T22:15:15.447

Status

Modified

Source

[email protected]

Severity

CVSSv3.1: 7.8 (HIGH)

Weaknesses
  • Type: Primary
    NVD-CWE-noinfo
  • Type: Secondary
    CWE-119

Affected Vendors & Products
Type Vendor Product Version/Range Vulnerable?
Operating System amd ryzen_embedded_5950e_firmware < embam4pi_1.0.0.0 Yes
Hardware amd ryzen_embedded_5950e - No
Operating System amd ryzen_embedded_5900e_firmware < embam4pi_1.0.0.0 Yes
Hardware amd ryzen_embedded_5900e - No
Operating System amd ryzen_embedded_5800e_firmware < embam4pi_1.0.0.0 Yes
Hardware amd ryzen_embedded_5800e - No
Operating System amd ryzen_embedded_5600e_firmware < embam4pi_1.0.0.0 Yes
Hardware amd ryzen_embedded_5600e - No
Operating System amd ryzen_embedded_v2516_firmware < embeddedpi-fp6_1.0.0.6 Yes
Hardware amd ryzen_embedded_v2516 - No
Operating System amd ryzen_embedded_v2546_firmware < embeddedpi-fp6_1.0.0.6 Yes
Hardware amd ryzen_embedded_v2546 - No
Operating System amd ryzen_embedded_v2718_firmware < embeddedpi-fp6_1.0.0.6 Yes
Hardware amd ryzen_embedded_v2718 - No
Operating System amd ryzen_embedded_v2748_firmware < embeddedpi-fp6_1.0.0.6 Yes
Hardware amd ryzen_embedded_v2748 - No
Operating System amd ryzen_embedded_r2312_firmware < embeddedpi-fp6_1.0.0.6 Yes
Hardware amd ryzen_embedded_r2312 - No
Operating System amd ryzen_embedded_r2314_firmware < embeddedpi-fp6_1.0.0.6 Yes
Hardware amd ryzen_embedded_r2314 - No

References

How SecUtils Interprets This CVE

SecUtils normalizes and enriches National Vulnerability Database (NVD) records by standardizing vendor and product identifiers, aggregating vulnerability metadata from both NVD and MITRE sources, and providing structured context for security teams. For amd's affected products, we extract Common Platform Enumeration (CPE) data, Common Weakness Enumeration (CWE) classifications, CVSS severity metrics, and reference data to enable rapid vulnerability prioritization and asset correlation. This record contains no exploit code, proof-of-concept instructions, or attack methodologies—only defensive intelligence necessary for patch management, risk assessment, and security operations.