First published: Tue Nov 12 2024(Updated: )
Incorrect default permissions in the AMD RyzenTM Master monitoring SDK installation directory could allow an attacker to achieve privilege escalation potentially resulting in arbitrary code execution.
Credit: psirt@amd.com
Affected Software | Affected Version | How to fix |
---|---|---|
AMD Ryzen Master Monitoring SDK | <2.13.0.2915 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-21945 is considered a high-severity vulnerability due to its potential for privilege escalation and arbitrary code execution.
To fix CVE-2024-21945, update to the latest version of the AMD Ryzen Master monitoring SDK that addresses the improper default permissions.
CVE-2024-21945 is caused by incorrect default permissions in the installation directory of the AMD Ryzen Master monitoring SDK.
Users of the AMD Ryzen Master monitoring SDK versions up to 2.13.0.2915 are affected by CVE-2024-21945.
CVE-2024-21945 can allow an attacker to escalate privileges and execute arbitrary code on an affected system.