CVEInsight.
TrendingZero-DayExploreBrowseSearchSaved
CVEInsight.

Free vulnerability intelligence for developers, security teams, and researchers. Data sourced from public databases for informational purposes only.

Explore

HomeTrendingZero-Day WatchAttack TypesBrowse CVEsSearch

Legal

Privacy PolicyTerms of ServiceData Disclaimer

© 2026CVEInsight. For informational use only — not a substitute for professional security advice.

CVE data sourced from NVD / NIST & public disclosures.

amd

ryzen_7_5800x3d_firmware

20 known vulnerabilities · sorted by CVSS score

CVE-2021-26365
HIGH8.2

Certain size values in firmware binary headers could trigger out of bounds reads during signature validation, leading to denial of service or potentially limited leakage of information about out-of-bounds memory contents.

amd / ryzen_5_2400g_firmware+53
Network
Published May 9, 2023
CVE-2020-12930
HIGH7.8

Improper parameters handling in AMD Secure Processor (ASP) drivers may allow a privileged attacker to elevate their privileges potentially leading to loss of integrity.

amd / enterprise_driver+108
Local
Published Nov 9, 2022
CVE-2021-26392
HIGH7.8

Insufficient verification of missing size check in 'LoadModule' may lead to an out-of-bounds write potentially allowing an attacker with privileges to gain code execution of the OS/kernel by loading a malicious TA.

amd / enterprise_driver+102
Local
Published Nov 9, 2022
CVE-2023-20555
HIGH7.8

Insufficient input validation in CpmDisplayFeatureSmm may allow an attacker to corrupt SMM memory by overwriting an arbitrary bit in an attacker-controlled pointer potentially leading to arbitrary code execution in SMM.

amd / ryzen_3_3300_firmware+131
Local
Published Aug 8, 2023
CVE-2021-26316
HIGH7.8

Failure to validate the communication buffer and communication service in the BIOS may allow an attacker to tamper with the buffer resulting in potential SMM (System Management Mode) arbitrary code execution.

amd / epyc_7h12_firmware+146
Local
Published Jan 11, 2023
CVE-2020-12931
HIGH7.8

Improper parameters handling in the AMD Secure Processor (ASP) kernel may allow a privileged attacker to elevate their privileges potentially leading to loss of integrity.

amd / enterprise_driver+106
Local
Published Nov 9, 2022
CVE-2021-26356
HIGH7.4

A TOCTOU in ASP bootloader may allow an attacker to tamper with the SPI ROM following data read to memory potentially resulting in S3 data corruption and information disclosure.

amd / epyc_7001_firmware+97
Network
Published May 9, 2023
CVE-2023-20589
MEDIUM6.8

An attacker with specialized hardware and physical access to an impacted device may be able to perform a voltage fault injection attack resulting in compromise of the ASP secure boot potentially leading to arbitrary code execution. 

amd / ryzen_5_pro_3400g_firmware+121
Physical
Published Aug 8, 2023
CVE-2021-46774
MEDIUM6.7

Insufficient DRAM address validation in System Management Unit (SMU) may allow an attacker to read/write from/to an invalid DRAM address, potentially resulting in denial-of-service.

amd / epyc_7001_firmware+136
Local
Published Nov 14, 2023
CVE-2023-20533
MEDIUM6.1

Insufficient DRAM address validation in System Management Unit (SMU) may allow an attacker to read/write from/to an invalid DRAM address, potentially resulting in denial-of-service.

amd / epyc_7232p_firmware+85
Local
Published Nov 14, 2023
CVE-2021-46778
MEDIUM5.6

Execution unit scheduler contention may lead to a side channel vulnerability found on AMD CPU microarchitectures codenamed “Zen 1”, “Zen 2” and “Zen 3” that use simultaneous multithreading (SMT). By measuring the contention level on scheduler queues an attacker may potentially leak sensitive information.

amd / athlon_3050ge_firmware+178
Local
Published Aug 10, 2022
CVE-2021-26378
MEDIUM5.5

Insufficient bound checks in the System Management Unit (SMU) may result in access to an invalid address space that could result in denial of service.

amd / epyc_7232p_firmware+123
Local
Published May 11, 2022
CVE-2021-26346
MEDIUM5.5

Failure to validate the integer operand in ASP (AMD Secure Processor) bootloader may allow an attacker to introduce an integer overflow in the L2 directory table in SPI flash resulting in a potential denial of service.

amd / ryzen_3_3100_firmware+103
Local
Published Jan 11, 2023
CVE-2021-26375
MEDIUM5.5

Insufficient General Purpose IO (GPIO) bounds check in System Management Unit (SMU) may result in access/updates from/to invalid address space that could result in denial of service.

amd / epyc_7232p_firmware+123
Local
Published May 11, 2022
CVE-2021-26371
MEDIUM5.5

A compromised or malicious ABL or UApp could send a SHA256 system call to the bootloader, which may result in exposure of ASP memory to userspace, potentially leading to information disclosure.

amd / epyc_7773x_firmware+127
Local
Published May 9, 2023
CVE-2021-26373
MEDIUM5.5

Insufficient bound checks in the System Management Unit (SMU) may result in a system voltage malfunction that could result in denial of resources and/or possibly denial of service.

amd / epyc_7232p_firmware+136
Local
Published May 11, 2022
CVE-2021-26388
MEDIUM5.5

Improper validation of the BIOS directory may allow for searches to read beyond the directory table copy in RAM, exposing out of bounds memory contents, resulting in a potential denial of service.

amd / epyc_7232p_firmware+159
Local
Published May 11, 2022
CVE-2021-26376
MEDIUM5.5

Insufficient checks in System Management Unit (SMU) FeatureConfig may result in reenabling features potentially resulting in denial of resources and/or denial of service.

amd / epyc_7232p_firmware+123
Local
Published May 11, 2022
CVE-2021-26354
MEDIUM5.5

Insufficient bounds checking in ASP may allow an attacker to issue a system call from a compromised ABL which may cause arbitrary memory values to be initialized to zero, potentially leading to a loss of integrity.

amd / epyc_7773x_firmware+151
Local
Published May 9, 2023
CVE-2023-20569
MEDIUM4.7

A side channel vulnerability on some of the AMD CPUs may allow an attacker to influence the return address prediction. This may result in speculative execution at an attacker-controlled address, potentially leading to information disclosure.

fedoraproject / fedora+159
Local
Published Aug 8, 2023