CVEInsight.
TrendingZero-DayExploreBrowseSearchSaved
CVEInsight.

Free vulnerability intelligence for developers, security teams, and researchers. Data sourced from public databases for informational purposes only.

Explore

HomeTrendingZero-Day WatchAttack TypesBrowse CVEsSearch

Legal

Privacy PolicyTerms of ServiceData Disclaimer

© 2026CVEInsight. For informational use only — not a substitute for professional security advice.

CVE data sourced from NVD / NIST & public disclosures.

amd

ryzen_3_5300u_firmware

18 known vulnerabilities · sorted by CVSS score

CVE-2021-26365
HIGH8.2

Certain size values in firmware binary headers could trigger out of bounds reads during signature validation, leading to denial of service or potentially limited leakage of information about out-of-bounds memory contents.

amd / ryzen_5_2400g_firmware+53
Network
Published May 9, 2023
CVE-2020-12930
HIGH7.8

Improper parameters handling in AMD Secure Processor (ASP) drivers may allow a privileged attacker to elevate their privileges potentially leading to loss of integrity.

amd / enterprise_driver+108
Local
Published Nov 9, 2022
CVE-2021-26316
HIGH7.8

Failure to validate the communication buffer and communication service in the BIOS may allow an attacker to tamper with the buffer resulting in potential SMM (System Management Mode) arbitrary code execution.

amd / epyc_7h12_firmware+146
Local
Published Jan 11, 2023
CVE-2021-26392
HIGH7.8

Insufficient verification of missing size check in 'LoadModule' may lead to an out-of-bounds write potentially allowing an attacker with privileges to gain code execution of the OS/kernel by loading a malicious TA.

amd / enterprise_driver+102
Local
Published Nov 9, 2022
CVE-2023-20555
HIGH7.8

Insufficient input validation in CpmDisplayFeatureSmm may allow an attacker to corrupt SMM memory by overwriting an arbitrary bit in an attacker-controlled pointer potentially leading to arbitrary code execution in SMM.

amd / ryzen_3_3300_firmware+131
Local
Published Aug 8, 2023
CVE-2020-12931
HIGH7.8

Improper parameters handling in the AMD Secure Processor (ASP) kernel may allow a privileged attacker to elevate their privileges potentially leading to loss of integrity.

amd / enterprise_driver+106
Local
Published Nov 9, 2022
CVE-2021-26391
HIGH7.8

Insufficient verification of multiple header signatures while loading a Trusted Application (TA) may allow an attacker with privileges to gain code execution in that TA or the OS/kernel.

amd / enterprise_driver+25
Local
Published Nov 9, 2022
CVE-2023-20589
MEDIUM6.8

An attacker with specialized hardware and physical access to an impacted device may be able to perform a voltage fault injection attack resulting in compromise of the ASP secure boot potentially leading to arbitrary code execution. 

amd / ryzen_5_pro_3400g_firmware+121
Physical
Published Aug 8, 2023
CVE-2023-4969
MEDIUM6.5

A GPU kernel can read sensitive data from another GPU kernel (even from another user or app) through an optimized GPU memory region called _local memory_ on various architectures.

khronos / opencl+139
Local
Published Jan 16, 2024
CVE-2021-46758
MEDIUM6.1

Insufficient validation of SPI flash addresses in the ASP (AMD Secure Processor) bootloader may allow an attacker to read data in memory mapped beyond SPI flash resulting in a potential loss of availability and integrity.

amd / ryzen_7_5700g_firmware+60
Physical
Published Nov 14, 2023
CVE-2021-46778
MEDIUM5.6

Execution unit scheduler contention may lead to a side channel vulnerability found on AMD CPU microarchitectures codenamed “Zen 1”, “Zen 2” and “Zen 3” that use simultaneous multithreading (SMT). By measuring the contention level on scheduler queues an attacker may potentially leak sensitive information.

amd / athlon_3050ge_firmware+178
Local
Published Aug 10, 2022
CVE-2021-26388
MEDIUM5.5

Improper validation of the BIOS directory may allow for searches to read beyond the directory table copy in RAM, exposing out of bounds memory contents, resulting in a potential denial of service.

amd / epyc_7232p_firmware+159
Local
Published May 11, 2022
CVE-2023-20593
MEDIUM5.5

An issue in “Zen 2” CPUs, under specific microarchitectural circumstances, may allow an attacker to potentially access sensitive information.

xen / xen+75
Local
Published Jul 24, 2023
CVE-2021-26346
MEDIUM5.5

Failure to validate the integer operand in ASP (AMD Secure Processor) bootloader may allow an attacker to introduce an integer overflow in the L2 directory table in SPI flash resulting in a potential denial of service.

amd / ryzen_3_3100_firmware+103
Local
Published Jan 11, 2023
CVE-2021-26393
MEDIUM5.5

Insufficient memory cleanup in the AMD Secure Processor (ASP) Trusted Execution Environment (TEE) may allow an authenticated attacker with privileges to generate a valid signed TA and potentially poison the contents of the process memory with attacker controlled data resulting in a loss of confidentiality.

amd / enterprise_driver+66
Local
Published Nov 9, 2022
CVE-2021-26354
MEDIUM5.5

Insufficient bounds checking in ASP may allow an attacker to issue a system call from a compromised ABL which may cause arbitrary memory values to be initialized to zero, potentially leading to a loss of integrity.

amd / epyc_7773x_firmware+151
Local
Published May 9, 2023
CVE-2022-27672
MEDIUM4.7

When SMT is enabled, certain AMD processors may speculatively execute instructions using a target from the sibling thread after an SMT mode switch potentially resulting in information disclosure.

amd / athlon_x4_750_firmware+169
Local
Published Mar 1, 2023
CVE-2023-20569
MEDIUM4.7

A side channel vulnerability on some of the AMD CPUs may allow an attacker to influence the return address prediction. This may result in speculative execution at an attacker-controlled address, potentially leading to information disclosure.

fedoraproject / fedora+159
Local
Published Aug 8, 2023