Tampering with SPI ROM Structure Headers Could Lead to Memory Corruption or Denial of Service
CVE-2021-46772

3.9LOW

Summary

An input validation flaw within AMD BIOS and UEFI firmware enables a privileged attacker with access to the BIOS menu or UEFI shell to manipulate structure headers in SPI ROM. This manipulation may lead to out-of-bounds memory read and write operations, resulting in potential memory corruption or denial of service. The vulnerability emphasizes the importance of securing access to BIOS settings and implementing stringent input validation measures to mitigate risk.

Affected Version(s)

AMD Athlon™ 3000 Series Desktop Processors with Radeon™ Graphics various

AMD Athlon™ 3000 Series Mobile Processors with Radeon™ Graphics various

AMD Athlon™ 3000 Series Mobile Processors with Radeon™ Graphics various

References

CVSS V3.1

Score:
3.9
Severity:
LOW
Confidentiality:
None
Integrity:
Low
Availability:
None
Attack Vector:
Local
Attack Complexity:
High
Privileges Required:
High
User Interaction:
None
Scope:
Changed

Timeline

  • Vulnerability published

  • Vulnerability Reserved

Collectors

NVD DatabaseMitre Database
.