Description
Lack of stack protection exploit mechanisms in ASP Secure OS Trusted Execution Environment (TEE) may allow a privileged attacker with access to AMD signing keys to c006Frrupt the return address, causing a stack-based buffer overrun, potentially leading to a denial of service.
References (1)
Core 1
Core References
Vendor Advisory vendor-advisory
https://www.amd.com/en/resources/product-security/bulletin/amd-sb-3003.html
Scores
CVSS v3
5.2
EPSS
0.0003
EPSS Percentile
7.8%
Attack Vector
LOCAL
CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:L/I:L/A:H
CISA SSVC
Vulnrichment
Exploitation
none
Automatable
no
Technical Impact
partial
Details
CWE
CWE-120
Status
published
Products (38)
AMD/AMD Athlon™ 3000 Series Desktop Processors with Radeon™ Graphics
ComboAM4PI 1.0.0.9
AMD/AMD Athlon™ 3000 Series Desktop Processors with Radeon™ Graphics
ComboAM4v2 PI 1.2.0.8
AMD/AMD Athlon™ 3000 Series Mobile Processors with Radeon™ Graphics
PicassoPI-FP5 1.0.0.E
AMD/AMD Athlon™ 3000 Series Mobile Processors with Radeon™ Graphics
PollockPI-FT5 1.0.0.4
AMD/AMD EPYC™ 7001 Processors
various
AMD/AMD EPYC™ 7002 Processors
various
AMD/AMD EPYC™ 7003 Processors
various
AMD/AMD EPYC™ 9004 Processors
various
AMD/AMD EPYC™ Embedded 3000 Series Processors
various
AMD/AMD EPYC™ Embedded 7002 Series Processors
various
... and 28 more
Published
Aug 13, 2024
Tracked Since
Feb 18, 2026