#VU63729 Security features bypass in AMD products - CVE-2021-39298

 

#VU63729 Security features bypass in AMD products - CVE-2021-39298

Published: May 26, 2022


Vulnerability identifier: #VU63729
Vulnerability risk: Low
CVSSv4.0: CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear
CVE-ID: CVE-2021-39298
CWE-ID: CWE-254
Exploitation vector: Local access
Exploit availability: No public exploit available
Vulnerable software:
AMD Ryzen 2000 series Desktop processor
AMD Ryzen 5000 Series Desktop processor with Radeon graphics
3rd Gen AMD Ryzen Threadripper processors
AMD Ryzen Threadripper PRO processors
AMD Ryzen 2000 Series Mobile processor
AMD Ryzen 3000 Series Mobile processor
2nd Gen AMD Ryzen Mobile processor with Radeon graphics
AMD Athlon 3000 Series Mobile processors with Radeon Graphics
AMD Ryzen 3000 Series Mobile processor with Radeon graphics
AMD Ryzen 5000 Series Mobile processor with Radeon graphics
Software vendor:
AMD

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to unspecified error in AMD System Management Mode (SMM) interrupt handler. A local privileged user can bypass security mechanisms provided in the UEFI firmware and execute arbitrary code.


Remediation

Install updates from vendor's website.

External links