mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-30 10:10:41 +00:00
48 lines
1.5 KiB
JSON
48 lines
1.5 KiB
JSON
![]() |
{
|
||
|
"id": "CVE-2021-26387",
|
||
|
"sourceIdentifier": "psirt@amd.com",
|
||
|
"published": "2024-08-13T17:15:17.563",
|
||
|
"lastModified": "2024-08-13T17:15:17.563",
|
||
|
"vulnStatus": "Received",
|
||
|
"cveTags": [],
|
||
|
"descriptions": [
|
||
|
{
|
||
|
"lang": "en",
|
||
|
"value": "Insufficient access controls in ASP kernel may allow a\nprivileged attacker with access to AMD signing keys and the BIOS menu or UEFI\nshell to map DRAM regions in protected areas,\u00a0potentially leading to a loss of platform integrity."
|
||
|
}
|
||
|
],
|
||
|
"metrics": {
|
||
|
"cvssMetricV31": [
|
||
|
{
|
||
|
"source": "psirt@amd.com",
|
||
|
"type": "Secondary",
|
||
|
"cvssData": {
|
||
|
"version": "3.1",
|
||
|
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:L/A:L",
|
||
|
"attackVector": "LOCAL",
|
||
|
"attackComplexity": "HIGH",
|
||
|
"privilegesRequired": "HIGH",
|
||
|
"userInteraction": "NONE",
|
||
|
"scope": "CHANGED",
|
||
|
"confidentialityImpact": "NONE",
|
||
|
"integrityImpact": "LOW",
|
||
|
"availabilityImpact": "LOW",
|
||
|
"baseScore": 3.9,
|
||
|
"baseSeverity": "LOW"
|
||
|
},
|
||
|
"exploitabilityScore": 0.8,
|
||
|
"impactScore": 2.7
|
||
|
}
|
||
|
]
|
||
|
},
|
||
|
"references": [
|
||
|
{
|
||
|
"url": "https://www.amd.com/en/resources/product-security/bulletin/amd-sb-3003.html",
|
||
|
"source": "psirt@amd.com"
|
||
|
},
|
||
|
{
|
||
|
"url": "https://www.amd.com/en/resources/product-security/bulletin/amd-sb-5002.html",
|
||
|
"source": "psirt@amd.com"
|
||
|
}
|
||
|
]
|
||
|
}
|