CVEInsight.
TrendingZero-DayExploreBrowseSearchSaved
CVEInsight.

Free vulnerability intelligence for developers, security teams, and researchers. Data sourced from public databases for informational purposes only.

Explore

HomeTrendingZero-Day WatchAttack TypesBrowse CVEsSearch

Legal

Privacy PolicyTerms of ServiceData Disclaimer

© 2026CVEInsight. For informational use only — not a substitute for professional security advice.

CVE data sourced from NVD / NIST & public disclosures.

amd

ryzen_9_6900hx_firmware

13 known vulnerabilities · sorted by CVSS score

CVE-2023-20596
CRITICAL9.8

Improper input validation in the SMM Supervisor may allow an attacker with a compromised SMI handler to gain Ring0 access potentially leading to arbitrary code execution.

amd / ryzen_7_5700g_firmware+63
Network
Published Nov 14, 2023
CVE-2022-23821
CRITICAL9.8

Improper access control in System Management Mode (SMM) may allow an attacker to write to SPI ROM potentially leading to arbitrary code execution.

amd / ryzen_9_3900_firmware+126
Network
Published Nov 14, 2023
CVE-2021-26365
HIGH8.2

Certain size values in firmware binary headers could trigger out of bounds reads during signature validation, leading to denial of service or potentially limited leakage of information about out-of-bounds memory contents.

amd / ryzen_5_2400g_firmware+53
Network
Published May 9, 2023
CVE-2023-20571
HIGH8.1

A race condition in System Management Mode (SMM) code may allow an attacker using a compromised user space to leverage CVE-2018-8897 potentially resulting in privilege escalation.

amd / ryzen_3_5100_firmware+71
Network
Published Nov 14, 2023
CVE-2023-20565
HIGH7.8

Insufficient protections in System Management Mode (SMM) code may allow an attacker to potentially enable escalation of privilege via local access.

amd / ryzen_3_5100_firmware+71
Local
Published Nov 14, 2023
CVE-2023-20555
HIGH7.8

Insufficient input validation in CpmDisplayFeatureSmm may allow an attacker to corrupt SMM memory by overwriting an arbitrary bit in an attacker-controlled pointer potentially leading to arbitrary code execution in SMM.

amd / ryzen_3_3300_firmware+131
Local
Published Aug 8, 2023
CVE-2023-20563
HIGH7.8

Insufficient protections in System Management Mode (SMM) code may allow an attacker to potentially enable escalation of privilege via local access.

amd / ryzen_3_5100_firmware+71
Local
Published Nov 14, 2023
CVE-2022-23820
HIGH7.5

Failure to validate the AMD SMM communication buffer may allow an attacker to corrupt the SMRAM potentially leading to arbitrary code execution.

amd / ryzen_9_3900_firmware+123
Local
Published Nov 14, 2023
CVE-2023-20589
MEDIUM6.8

An attacker with specialized hardware and physical access to an impacted device may be able to perform a voltage fault injection attack resulting in compromise of the ASP secure boot potentially leading to arbitrary code execution. 

amd / ryzen_5_pro_3400g_firmware+121
Physical
Published Aug 8, 2023
CVE-2023-4969
MEDIUM6.5

A GPU kernel can read sensitive data from another GPU kernel (even from another user or app) through an optimized GPU memory region called _local memory_ on various architectures.

khronos / opencl+139
Local
Published Jan 16, 2024
CVE-2021-46758
MEDIUM6.1

Insufficient validation of SPI flash addresses in the ASP (AMD Secure Processor) bootloader may allow an attacker to read data in memory mapped beyond SPI flash resulting in a potential loss of availability and integrity.

amd / ryzen_7_5700g_firmware+60
Physical
Published Nov 14, 2023
CVE-2023-20579
MEDIUM6.0

Improper Access Control in the AMD SPI protection feature may allow a user with Ring0 (kernel mode) privileged access to bypass protections potentially resulting in loss of integrity and availability.

amd / ryzen_7_5700g_firmware+128
Local
Published Feb 13, 2024
CVE-2023-20569
MEDIUM4.7

A side channel vulnerability on some of the AMD CPUs may allow an attacker to influence the return address prediction. This may result in speculative execution at an attacker-controlled address, potentially leading to information disclosure.

fedoraproject / fedora+159
Local
Published Aug 8, 2023