Incorrect default permissions in the AMD RyzenTM Master monitoring SDK installation directory could allow an attacker to achieve privilege escalation potentially resulting in arbitrary code execution.
Advisories
Source ID Title
EUVD EUVD EUVD-2024-19551 Incorrect default permissions in the AMD RyzenTM Master monitoring SDK installation directory could allow an attacker to achieve privilege escalation potentially resulting in arbitrary code execution.
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Thu, 19 Dec 2024 04:15:00 +0900

Type Values Removed Values Added
First Time appeared Amd ryzen Master Monitoring Software Development Kit
CPEs cpe:2.3:a:amd:ryzen_master_monitoring_software_development_kit:*:*:*:*:*:*:*:*
Vendors & Products Amd ryzen Master Monitoring Software Development Kit

Thu, 14 Nov 2024 06:15:00 +0900

Type Values Removed Values Added
First Time appeared Amd
Amd ryzen Master
CPEs cpe:2.3:o:amd:ryzen_master:*:*:*:*:*:*:*:*
Vendors & Products Amd
Amd ryzen Master
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Wed, 13 Nov 2024 02:30:00 +0900

Type Values Removed Values Added
Description Incorrect default permissions in the AMD RyzenTM Master monitoring SDK installation directory could allow an attacker to achieve privilege escalation potentially resulting in arbitrary code execution.
Weaknesses CWE-276
References
Metrics cvssV3_1

{'score': 7.3, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H'}


Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: AMD

Published:

Updated: 2024-11-13T20:18:46.240Z

Reserved: 2024-01-03T16:43:21.322Z

Link: CVE-2024-21945

cve-icon Vulnrichment

Updated: 2024-11-13T20:18:39.426Z

cve-icon NVD

Status : Analyzed

Published: 2024-11-12T18:15:18.450

Modified: 2024-12-18T18:58:24.397

Link: CVE-2024-21945

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses