Incorrect default permissions in the AMD Cloud Manageability Service (ACMS) Software installation directory could allow an attacker to achieve privilege escalation potentially resulting in arbitrary code execution.
Metrics
Affected Vendors & Products
References
History
Wed, 18 Dec 2024 19:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Amd cloud Manageability Service
|
|
CPEs | cpe:2.3:a:amd:cloud_manageability_service:*:*:*:*:*:*:*:* | |
Vendors & Products |
Amd cloud Manageability Service
|
Wed, 13 Nov 2024 21:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Amd
Amd cloud Manageability Service Acms Software |
|
CPEs | cpe:2.3:a:amd:cloud_manageability_service_acms_software:*:*:*:*:*:*:*:* | |
Vendors & Products |
Amd
Amd cloud Manageability Service Acms Software |
|
Metrics |
ssvc
|
Tue, 12 Nov 2024 17:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | Incorrect default permissions in the AMD Cloud Manageability Service (ACMS) Software installation directory could allow an attacker to achieve privilege escalation potentially resulting in arbitrary code execution. | |
Weaknesses | CWE-276 | |
References |
| |
Metrics |
cvssV3_1
|

Status: PUBLISHED
Assigner: AMD
Published:
Updated: 2024-11-13T20:37:39.656Z
Reserved: 2024-01-03T16:43:14.977Z
Link: CVE-2024-21939

Updated: 2024-11-13T20:37:33.729Z

Status : Analyzed
Published: 2024-11-12T18:15:18.263
Modified: 2024-12-18T18:59:15.457
Link: CVE-2024-21939

No data.