Improper validation of array index in Power Management Firmware (PMFW) may allow a privileged attacker to cause an out-of-bounds memory read within PMFW, potentially leading to a denial of service.
Advisories
Source ID Title
EUVD EUVD EUVD-2023-35618 Improper validation of array index in Power Management Firmware (PMFW) may allow a privileged attacker to cause an out-of-bounds memory read within PMFW, potentially leading to a denial of service.
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Sat, 14 Dec 2024 02:00:00 +0900

Type Values Removed Values Added
First Time appeared Amd
Amd radeon Pro W6300
Amd radeon Pro W6400
Amd radeon Pro W6600
Amd radeon Pro W6800
Amd radeon Rx 6300m
Amd radeon Rx 6400
Amd radeon Rx 6450m
Amd radeon Rx 6500 Xt
Amd radeon Rx 6500m
Amd radeon Rx 6550m
Amd radeon Rx 6550s
Amd radeon Rx 6600
Amd radeon Rx 6600 Xt
Amd radeon Rx 6600m
Amd radeon Rx 6600s
Amd radeon Rx 6650 Xt
Amd radeon Rx 6650m
Amd radeon Rx 6650m Xt
Amd radeon Rx 6700
Amd radeon Rx 6700 Xt
Amd radeon Rx 6700m
Amd radeon Rx 6700s
Amd radeon Rx 6750 Gre
Amd radeon Rx 6750 Xt
Amd radeon Rx 6800
Amd radeon Rx 6800 Xt
Amd radeon Rx 6800m
Amd radeon Rx 6800s
Amd radeon Rx 6850m Xt
Amd radeon Rx 6900 Xt
Amd radeon Rx 6950 Xt
Amd radeon Software
CPEs cpe:2.3:a:amd:radeon_software:*:*:*:*:adrenalin:*:*:*
cpe:2.3:a:amd:radeon_software:*:*:*:*:pro:*:*:*
cpe:2.3:h:amd:radeon_pro_w6300:-:*:*:*:*:*:*:*
cpe:2.3:h:amd:radeon_pro_w6400:-:*:*:*:*:*:*:*
cpe:2.3:h:amd:radeon_pro_w6600:-:*:*:*:*:*:*:*
cpe:2.3:h:amd:radeon_pro_w6800:-:*:*:*:*:*:*:*
cpe:2.3:h:amd:radeon_rx_6300m:-:*:*:*:*:*:*:*
cpe:2.3:h:amd:radeon_rx_6400:-:*:*:*:*:*:*:*
cpe:2.3:h:amd:radeon_rx_6450m:-:*:*:*:*:*:*:*
cpe:2.3:h:amd:radeon_rx_6500_xt:-:*:*:*:*:*:*:*
cpe:2.3:h:amd:radeon_rx_6500m:-:*:*:*:*:*:*:*
cpe:2.3:h:amd:radeon_rx_6550m:-:*:*:*:*:*:*:*
cpe:2.3:h:amd:radeon_rx_6550s:-:*:*:*:*:*:*:*
cpe:2.3:h:amd:radeon_rx_6600:-:*:*:*:*:*:*:*
cpe:2.3:h:amd:radeon_rx_6600_xt:-:*:*:*:*:*:*:*
cpe:2.3:h:amd:radeon_rx_6600m:-:*:*:*:*:*:*:*
cpe:2.3:h:amd:radeon_rx_6600s:-:*:*:*:*:*:*:*
cpe:2.3:h:amd:radeon_rx_6650_xt:-:*:*:*:*:*:*:*
cpe:2.3:h:amd:radeon_rx_6650m:-:*:*:*:*:*:*:*
cpe:2.3:h:amd:radeon_rx_6650m_xt:-:*:*:*:*:*:*:*
cpe:2.3:h:amd:radeon_rx_6700:-:*:*:*:*:*:*:*
cpe:2.3:h:amd:radeon_rx_6700_xt:-:*:*:*:*:*:*:*
cpe:2.3:h:amd:radeon_rx_6700m:-:*:*:*:*:*:*:*
cpe:2.3:h:amd:radeon_rx_6700s:-:*:*:*:*:*:*:*
cpe:2.3:h:amd:radeon_rx_6750_gre:-:*:*:*:*:*:*:*
cpe:2.3:h:amd:radeon_rx_6750_xt:-:*:*:*:*:*:*:*
cpe:2.3:h:amd:radeon_rx_6800:-:*:*:*:*:*:*:*
cpe:2.3:h:amd:radeon_rx_6800_xt:-:*:*:*:*:*:*:*
cpe:2.3:h:amd:radeon_rx_6800m:-:*:*:*:*:*:*:*
cpe:2.3:h:amd:radeon_rx_6800s:-:*:*:*:*:*:*:*
cpe:2.3:h:amd:radeon_rx_6850m_xt:-:*:*:*:*:*:*:*
cpe:2.3:h:amd:radeon_rx_6900_xt:-:*:*:*:*:*:*:*
cpe:2.3:h:amd:radeon_rx_6950_xt:-:*:*:*:*:*:*:*
Vendors & Products Amd
Amd radeon Pro W6300
Amd radeon Pro W6400
Amd radeon Pro W6600
Amd radeon Pro W6800
Amd radeon Rx 6300m
Amd radeon Rx 6400
Amd radeon Rx 6450m
Amd radeon Rx 6500 Xt
Amd radeon Rx 6500m
Amd radeon Rx 6550m
Amd radeon Rx 6550s
Amd radeon Rx 6600
Amd radeon Rx 6600 Xt
Amd radeon Rx 6600m
Amd radeon Rx 6600s
Amd radeon Rx 6650 Xt
Amd radeon Rx 6650m
Amd radeon Rx 6650m Xt
Amd radeon Rx 6700
Amd radeon Rx 6700 Xt
Amd radeon Rx 6700m
Amd radeon Rx 6700s
Amd radeon Rx 6750 Gre
Amd radeon Rx 6750 Xt
Amd radeon Rx 6800
Amd radeon Rx 6800 Xt
Amd radeon Rx 6800m
Amd radeon Rx 6800s
Amd radeon Rx 6850m Xt
Amd radeon Rx 6900 Xt
Amd radeon Rx 6950 Xt
Amd radeon Software

Wed, 04 Dec 2024 02:15:00 +0900

Type Values Removed Values Added
Weaknesses CWE-129

Wed, 14 Aug 2024 03:30:00 +0900

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 14 Aug 2024 02:00:00 +0900

Type Values Removed Values Added
Description Improper validation of array index in Power Management Firmware (PMFW) may allow a privileged attacker to cause an out-of-bounds memory read within PMFW, potentially leading to a denial of service.
References
Metrics cvssV3_1

{'score': 2.3, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L'}


Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: AMD

Published:

Updated: 2024-12-03T16:30:08.173Z

Reserved: 2023-04-27T15:25:41.422Z

Link: CVE-2023-31307

cve-icon Vulnrichment

Updated: 2024-08-13T18:03:27.707Z

cve-icon NVD

Status : Analyzed

Published: 2024-08-13T17:15:20.500

Modified: 2024-12-13T16:30:30.840

Link: CVE-2023-31307

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses