First published: Tue Jan 10 2023(Updated: )
Insufficient input validation in SVC_ECC_PRIMITIVE system call in a compromised user application or ABL may allow an attacker to corrupt ASP (AMD Secure Processor) OS memory which may lead to potential loss of integrity and availability.
Credit: psirt@amd.com
Affected Software | Affected Version | How to fix |
---|---|---|
Amd Romepi Firmware | <1.0.0.c | |
Amd Romepi | ||
Amd Milanpi Firmware | <1.0.0.4 | |
Amd Milanpi | ||
Amd Naplespi Firmware | <1.0.0.g | |
Amd Naplespi |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-46779 is a vulnerability that allows an attacker to corrupt ASP (AMD Secure Processor) OS memory, potentially leading to loss of integrity and availability.
CVE-2021-46779 has a severity rating of 7.1 (high).
AMD Romepi Firmware versions up to exclusive 1.0.0.c, AMD Milanpi Firmware versions up to exclusive 1.0.0.4, and AMD Naplespi Firmware versions up to exclusive 1.0.0.g are affected by CVE-2021-46779.
An attacker can exploit CVE-2021-46779 through a compromised user application or ABL by manipulating the SVC_ECC_PRIMITIVE system call to corrupt ASP OS memory.
AMD Romepi, AMD Milanpi, and AMD Naplespi are not vulnerable to CVE-2021-46779.
To fix CVE-2021-46779, it is recommended to apply the necessary firmware updates provided by AMD.
More information about CVE-2021-46779 can be found on the AMD Product Security Bulletin at https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-1032.