Potential Mapping of DRAM Regions in Protected Areas Could Lead to Loss of Platform Integrity
CVE-2021-26387
Key Information:
- Vendor
- Amd
- Status
- Vendor
- CVE Published:
- 13 August 2024
Summary
An access control vulnerability within the ASP kernel of AMD products can be exploited by an attacker with privileged access. This scenario involves the attacker having access to AMD signing keys and the BIOS menu or UEFI shell. By leveraging this access, the attacker could potentially map DRAM regions in protected areas, which may compromise the integrity of the platform. It highlights a significant concern for users relying on AMD technologies who must ensure proper access controls are enforced to mitigate risks.
Affected Version(s)
AMD Athlon™ 3000 Series Desktop Processors with Radeon™ Graphics ComboAM4PI 1.0.0.9
AMD Athlon™ 3000 Series Mobile Processors with Radeon™ Graphics PicassoPI-FP5 1.0.0.E
AMD Athlon™ 3000 Series Mobile Processors with Radeon™ Graphics PollockPI-FT5 1.0.0.4
References
CVSS V3.1
Timeline
Vulnerability published
Vulnerability Reserved