2023-08-21 18:00:42 +00:00

75 lines
2.0 KiB
JSON

{
"id": "CVE-2023-20586",
"sourceIdentifier": "psirt@amd.com",
"published": "2023-08-08T18:15:11.593",
"lastModified": "2023-08-21T17:25:49.017",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "\nA potential vulnerability was reported in Radeon\u2122 Software Crimson ReLive Edition which may allow escalation of privilege. Radeon\u2122 Software Crimson ReLive Edition falls outside of the security support lifecycle and AMD does not plan to release any mitigations\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:amd:radeon_software:-:*:*:*:crimson_relive:*:*:*",
"matchCriteriaId": "1B9B57CB-1D5E-4FE9-B03D-315A9B54650A"
}
]
}
]
}
],
"references": [
{
"url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-6007",
"source": "psirt@amd.com",
"tags": [
"Vendor Advisory"
]
}
]
}