Improper syscall input validation in AMD TEE (Trusted Execution Environment) may allow an attacker with physical access and control of a Uapp that runs under the bootloader to reveal the contents of the ASP (AMD Secure Processor) bootloader accessible memory to a serial port, resulting in a potential loss of integrity.
History

Mon, 27 Jan 2025 18:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


cve-icon MITRE

Status: PUBLISHED

Assigner: AMD

Published:

Updated: 2025-01-27T17:34:38.069Z

Reserved: 2022-03-31T16:50:27.869Z

Link: CVE-2021-46759

cve-icon Vulnrichment

Updated: 2024-08-04T05:17:42.644Z

cve-icon NVD

Status : Modified

Published: 2023-05-09T20:15:12.240

Modified: 2025-01-27T18:15:28.957

Link: CVE-2021-46759

cve-icon Redhat

No data.