First published: Tue Aug 13 2024(Updated: )
An insufficient DRAM address validation in PMFW may allow a privileged attacker to read from an invalid DRAM address to SRAM, potentially resulting in data corruption or denial of service.
Credit: psirt@amd.com
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
AMD Radeon Software | <23.12.1 | |
Any of | ||
AMD Radeon RX 6300M | ||
AMD Radeon RX 6400 | ||
AMD Radeon RX 6450M | ||
AMD Radeon RX 6500 XT | ||
AMD Radeon RX 6500M | ||
AMD Radeon RX 6550M | ||
AMD Radeon RX 6550S | ||
AMD Radeon RX 6600 | ||
AMD Radeon RX 6600 XT | ||
AMD Radeon RX 6600M | ||
AMD Radeon RX 6600s | ||
AMD Radeon RX 6650 XT | ||
AMD Radeon RX 6650M | ||
AMD Radeon RX 6650M XT | ||
AMD Radeon RX 6700 | ||
AMD Radeon RX 6700 XT | ||
AMD Radeon RX 6700M | ||
AMD Radeon RX 6700s | ||
AMD Radeon RX 6750 GRE 10GB | ||
amd radeon rx 6750 xt | ||
AMD Radeon RX 6800 | ||
AMD Radeon RX 6800 XT Firmware | ||
AMD Radeon RX 6800m | ||
AMD Radeon RX 6800s | ||
AMD Radeon RX 6850M XT | ||
AMD Radeon RX 6900 XT | ||
AMD Radeon RX 6950XT Firmware | ||
All of | ||
AMD Radeon Software | <=23.q4 | |
Any of | ||
AMD Radeon Pro W6300 | ||
AMD Radeon Pro W6400 Firmware | ||
AMD Radeon Pro W6600 | ||
amd Radeon pro w6800 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-20510 is classified as a high-severity vulnerability due to its potential to cause data corruption and denial of service.
To fix CVE-2023-20510, update to the latest version of AMD Radeon Software that addresses this vulnerability.
CVE-2023-20510 affects users of AMD Radeon Software versions prior to 23.12.1.
CVE-2023-20510 can be exploited by a privileged attacker to read from an invalid DRAM address, leading to potential data corruption.
The consequences of CVE-2023-20510 include data corruption and potential denial of service on affected systems.