5.5
MEDIUM
CVE-2021-26393
AMD Secure Processor TEE Memory Corruption Vulnerability
Description

Insufficient memory cleanup in the AMD Secure Processor (ASP) Trusted Execution Environment (TEE) may allow an authenticated attacker with privileges to generate a valid signed TA and potentially poison the contents of the process memory with attacker controlled data resulting in a loss of confidentiality.

INFO

Published Date :

Nov. 9, 2022, 9:15 p.m.

Last Modified :

Sept. 16, 2024, 10:15 p.m.

Remotely Exploitable :

No

Impact Score :

3.6

Exploitability Score :

1.8
Affected Products

The following products are affected by CVE-2021-26393 vulnerability. Even if cvefeed.io is aware of the exact versions of the products that are affected, the information is not represented in the table below.

ID Vendor Product Action
1 Amd athlon_gold_3150c_firmware
2 Amd athlon_gold_3150u_firmware
3 Amd athlon_pro_3045b_firmware
4 Amd athlon_pro_3145b_firmware
5 Amd athlon_silver_3050c_firmware
6 Amd athlon_silver_3050e_firmware
7 Amd athlon_silver_3050u_firmware
8 Amd ryzen_3_2200g_firmware
9 Amd ryzen_3_2200ge_firmware
10 Amd ryzen_3_2200u_firmware
11 Amd ryzen_3_2300u_firmware
12 Amd ryzen_3_5300g_firmware
13 Amd ryzen_3_5300ge_firmware
14 Amd ryzen_3_5300u_firmware
15 Amd ryzen_3_5400u_firmware
16 Amd ryzen_5_2400g_firmware
17 Amd ryzen_5_2400ge_firmware
18 Amd ryzen_5_2500u_firmware
19 Amd ryzen_5_2600h_firmware
20 Amd ryzen_5_5500u_firmware
21 Amd ryzen_5_5560u_firmware
22 Amd ryzen_5_5600g_firmware
23 Amd ryzen_5_5600ge_firmware
24 Amd ryzen_5_5600h_firmware
25 Amd ryzen_5_5600hs_firmware
26 Amd ryzen_5_5600u_firmware
27 Amd ryzen_7_2700u_firmware
28 Amd ryzen_7_2800h_firmware
29 Amd ryzen_7_5700g_firmware
30 Amd ryzen_7_5700ge_firmware
31 Amd ryzen_7_5700u_firmware
32 Amd ryzen_7_5800h_firmware
33 Amd ryzen_7_5800hs_firmware
34 Amd ryzen_7_5800u_firmware
35 Amd ryzen_9_5900hs_firmware
36 Amd ryzen_9_5900hx_firmware
37 Amd ryzen_9_5980hs_firmware
38 Amd ryzen_9_5980hx_firmware
39 Amd ryzen_3_3200g_firmware
40 Amd ryzen_3_3250c_firmware
41 Amd ryzen_3_3250u_firmware
42 Amd ryzen_3_3300u_firmware
43 Amd ryzen_3_3350u_firmware
44 Amd ryzen_3_pro_3200g_firmware
45 Amd ryzen_3_pro_3200ge_firmware
46 Amd ryzen_5_3400g_firmware
47 Amd ryzen_5_3450u_firmware
48 Amd ryzen_5_3500c_firmware
49 Amd ryzen_5_3500u_firmware
50 Amd ryzen_5_3550h_firmware
51 Amd ryzen_5_3580u_firmware
52 Amd ryzen_5_pro_3350g_firmware
53 Amd ryzen_5_pro_3350ge_firmware
54 Amd ryzen_5_pro_3400g_firmware
55 Amd ryzen_5_pro_3400ge_firmware
56 Amd ryzen_7_3700c_firmware
57 Amd ryzen_7_3700u_firmware
58 Amd ryzen_7_3750h_firmware
59 Amd ryzen_7_3780u_firmware
60 Amd radeon_pro_software
61 Amd radeon_software
62 Amd amd_3015e_firmware
63 Amd amd_3015ce_firmware
64 Amd enterprise_driver
65 Amd radeon_rx_vega_56_firmware
66 Amd radeon_rx_vega_64_firmware
67 Amd amd_3020e_firmware
68 Amd ryzen_7_5700g
69 Amd ryzen_7_5700ge
70 Amd ryzen_5_5600g
71 Amd ryzen_5_5600ge
72 Amd ryzen_3_5300g
73 Amd ryzen_3_5300ge
74 Amd ryzen_7_5700u
75 Amd ryzen_5_5500u
76 Amd ryzen_3_5300u
77 Amd ryzen_9_5980hx
78 Amd ryzen_9_5980hs
79 Amd ryzen_9_5900hx
80 Amd ryzen_9_5900hs
81 Amd ryzen_7_5800h
82 Amd ryzen_7_5800hs
83 Amd ryzen_7_5800u
84 Amd ryzen_5_5600h
85 Amd ryzen_5_5600hs
86 Amd ryzen_5_5600u
87 Amd ryzen_5_5560u
88 Amd ryzen_3_5400u
89 Amd ryzen_5_pro_3400g
90 Amd ryzen_5_3400g
91 Amd ryzen_5_pro_3400ge
92 Amd ryzen_5_pro_3350g
93 Amd ryzen_5_pro_3350ge
94 Amd ryzen_3_pro_3200g
95 Amd ryzen_3_3200g
96 Amd ryzen_3_pro_3200ge
97 Amd ryzen_7_3780u
98 Amd ryzen_7_3750h
99 Amd ryzen_7_3700c
100 Amd ryzen_7_3700u
101 Amd ryzen_5_3580u
102 Amd ryzen_5_3550h
103 Amd ryzen_5_3500c
104 Amd ryzen_5_3500u
105 Amd ryzen_5_3450u
106 Amd ryzen_3_3350u
107 Amd ryzen_3_3300u
108 Amd ryzen_3_3250u
109 Amd ryzen_3_3250c
110 Amd amd_3015e
111 Amd amd_3015ce
112 Amd radeon_rx_5300
113 Amd radeon_rx_5300_xt
114 Amd radeon_rx_5300m
115 Amd radeon_rx_5500
116 Amd radeon_rx_5500_xt
117 Amd radeon_rx_5500m
118 Amd radeon_rx_5600
119 Amd radeon_rx_5600_xt
120 Amd radeon_rx_5600m
121 Amd radeon_rx_5700
122 Amd radeon_rx_5700_xt
123 Amd radeon_rx_5700m
124 Amd radeon_rx_6300m
125 Amd radeon_rx_6400
126 Amd radeon_rx_6500_xt
127 Amd radeon_rx_6500m
128 Amd radeon_rx_6600
129 Amd radeon_rx_6600_xt
130 Amd radeon_rx_6600m
131 Amd radeon_rx_6600s
132 Amd radeon_rx_6650_xt
133 Amd radeon_rx_6650m
134 Amd radeon_rx_6650m_xt
135 Amd radeon_rx_6700
136 Amd radeon_rx_6700_xt
137 Amd radeon_rx_6700m
138 Amd radeon_rx_6700s
139 Amd radeon_rx_6750_xt
140 Amd radeon_rx_6800
141 Amd radeon_rx_6800_xt
142 Amd radeon_rx_6800s
143 Amd radeon_rx_6900_xt
144 Amd radeon_rx_6950_xt
145 Amd radeon_pro_w5500
146 Amd radeon_pro_w5700
147 Amd radeon_pro_w6400
148 Amd radeon_pro_w6600
149 Amd radeon_pro_w6800
150 Amd radeon_pro_w5500x
151 Amd radeon_pro_w5700x
152 Amd radeon_pro_w6300m
153 Amd radeon_pro_w6500m
154 Amd radeon_pro_w6600m
155 Amd radeon_pro_w6600x
156 Amd radeon_pro_w6800x
157 Amd radeon_pro_w6800x_duo
158 Amd radeon_pro_w6900x
159 Amd radeon_rx_6800m
160 Amd radeon_rx_6850m_xt
161 Amd radeon_rx_vega_56
162 Amd radeon_rx_vega_64
163 Amd ryzen_3_2200ge
164 Amd ryzen_3_2200g
165 Amd ryzen_5_2400ge
166 Amd ryzen_5_2400g
167 Amd athlon_silver_3050e
168 Amd athlon_pro_3045b
169 Amd athlon_silver_3050u
170 Amd athlon_silver_3050c
171 Amd athlon_pro_3145b
172 Amd athlon_gold_3150u
173 Amd athlon_gold_3150c
174 Amd amd_3020e
175 Amd ryzen_3_2200u
176 Amd ryzen_3_2300u
177 Amd ryzen_5_2500u
178 Amd ryzen_5_2600h
179 Amd ryzen_7_2700u
180 Amd ryzen_7_2800h
References to Advisories, Solutions, and Tools

Here, you will find a curated list of external links that provide in-depth information, practical solutions, and valuable tools related to CVE-2021-26393.

URL Resource
https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1029 Vendor Advisory
https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-5001

We scan GitHub repositories to detect new proof-of-concept exploits. Following list is a collection of public exploits and proof-of-concepts, which have been published on GitHub (sorted by the most recently updated).

Results are limited to the first 15 repositories due to potential performance issues.

The following list is the news that have been mention CVE-2021-26393 vulnerability anywhere in the article.

The following table lists the changes that have been made to the CVE-2021-26393 vulnerability over time.

Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability's severity, exploitability, or other characteristics.

  • CVE Modified by [email protected]

    Sep. 16, 2024

    Action Type Old Value New Value
    Changed Description Insufficient memory cleanup in the AMD Secure Processor (ASP) Trusted Execution Environment (TEE) may allow an authenticated attacker with privileges to generate a valid signed TA and potentially poison the contents of the process memory with attacker controlled data resulting in a loss of confidentiality. Insufficient memory cleanup in the AMD Secure Processor (ASP) Trusted Execution Environment (TEE) may allow an authenticated attacker with privileges to generate a valid signed TA and potentially poison the contents of the process memory with attacker controlled data resulting in a loss of confidentiality.
  • CVE Modified by [email protected]

    May. 14, 2024

    Action Type Old Value New Value
  • CVE Modified by [email protected]

    Feb. 13, 2024

    Action Type Old Value New Value
    Changed Description Insufficient memory cleanup in the AMD Secure Processor (ASP) Trusted Execution Environment (TEE) may allow an authenticated attacker with privileges to generate a valid signed TA and potentially poison the contents of the process memory with attacker controlled data resulting in a loss of confidentiality. Insufficient memory cleanup in the AMD Secure Processor (ASP) Trusted Execution Environment (TEE) may allow an authenticated attacker with privileges to generate a valid signed TA and potentially poison the contents of the process memory with attacker controlled data resulting in a loss of confidentiality.
    Added Reference Advanced Micro Devices Inc. https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-5001 [No types assigned]
  • Initial Analysis by [email protected]

    Nov. 23, 2022

    Action Type Old Value New Value
    Added CVSS V3.1 NIST AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
    Changed Reference Type https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1029 No Types Assigned https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1029 Vendor Advisory
    Added CWE NIST CWE-401
    Added CPE Configuration AND OR *cpe:2.3:a:amd:enterprise_driver:*:*:*:*:*:*:*:* versions up to (excluding) 22.10.20 *cpe:2.3:a:amd:radeon_pro_software:*:*:*:*:enterprise:*:*:* versions up to (excluding) 22.q2 *cpe:2.3:a:amd:radeon_software:*:*:*:*:*:*:*:* versions up to (excluding) 22.5.2 OR cpe:2.3:h:amd:radeon_pro_w5500:-:*:*:*:*:*:*:* cpe:2.3:h:amd:radeon_pro_w5500x:-:*:*:*:*:*:*:* cpe:2.3:h:amd:radeon_pro_w5700:-:*:*:*:*:*:*:* cpe:2.3:h:amd:radeon_pro_w5700x:-:*:*:*:*:*:*:* cpe:2.3:h:amd:radeon_pro_w6300m:-:*:*:*:*:*:*:* cpe:2.3:h:amd:radeon_pro_w6400:-:*:*:*:*:*:*:* cpe:2.3:h:amd:radeon_pro_w6500m:-:*:*:*:*:*:*:* cpe:2.3:h:amd:radeon_pro_w6600:-:*:*:*:*:*:*:* cpe:2.3:h:amd:radeon_pro_w6600m:-:*:*:*:*:*:*:* cpe:2.3:h:amd:radeon_pro_w6600x:-:*:*:*:*:*:*:* cpe:2.3:h:amd:radeon_pro_w6800:-:*:*:*:*:*:*:* cpe:2.3:h:amd:radeon_pro_w6800x:-:*:*:*:*:*:*:* cpe:2.3:h:amd:radeon_pro_w6800x_duo:-:*:*:*:*:*:*:* cpe:2.3:h:amd:radeon_pro_w6900x:-:*:*:*:*:*:*:* cpe:2.3:h:amd:radeon_rx_5300:-:*:*:*:*:*:*:* cpe:2.3:h:amd:radeon_rx_5300_xt:-:*:*:*:*:*:*:* cpe:2.3:h:amd:radeon_rx_5300m:-:*:*:*:*:*:*:* cpe:2.3:h:amd:radeon_rx_5500:-:*:*:*:*:*:*:* cpe:2.3:h:amd:radeon_rx_5500_xt:-:*:*:*:*:*:*:* cpe:2.3:h:amd:radeon_rx_5500m:-:*:*:*:*:*:*:* cpe:2.3:h:amd:radeon_rx_5600:-:*:*:*:*:*:*:* cpe:2.3:h:amd:radeon_rx_5600_xt:-:*:*:*:*:*:*:* cpe:2.3:h:amd:radeon_rx_5600m:-:*:*:*:*:*:*:* cpe:2.3:h:amd:radeon_rx_5700:-:*:*:*:*:*:*:* cpe:2.3:h:amd:radeon_rx_5700_xt:-:*:*:*:*:*:*:* cpe:2.3:h:amd:radeon_rx_5700m:-:*:*:*:*:*:*:* cpe:2.3:h:amd:radeon_rx_6300m:-:*:*:*:*:*:*:* cpe:2.3:h:amd:radeon_rx_6400:-:*:*:*:*:*:*:* cpe:2.3:h:amd:radeon_rx_6500_xt:-:*:*:*:*:*:*:* cpe:2.3:h:amd:radeon_rx_6500m:-:*:*:*:*:*:*:* cpe:2.3:h:amd:radeon_rx_6600:-:*:*:*:*:*:*:* cpe:2.3:h:amd:radeon_rx_6600_xt:-:*:*:*:*:*:*:* cpe:2.3:h:amd:radeon_rx_6600m:-:*:*:*:*:*:*:* cpe:2.3:h:amd:radeon_rx_6600s:-:*:*:*:*:*:*:* cpe:2.3:h:amd:radeon_rx_6650_xt:-:*:*:*:*:*:*:* cpe:2.3:h:amd:radeon_rx_6650m:-:*:*:*:*:*:*:* cpe:2.3:h:amd:radeon_rx_6650m_xt:-:*:*:*:*:*:*:* cpe:2.3:h:amd:radeon_rx_6700:-:*:*:*:*:*:*:* cpe:2.3:h:amd:radeon_rx_6700_xt:-:*:*:*:*:*:*:* cpe:2.3:h:amd:radeon_rx_6700m:-:*:*:*:*:*:*:* cpe:2.3:h:amd:radeon_rx_6700s:-:*:*:*:*:*:*:* cpe:2.3:h:amd:radeon_rx_6750_xt:-:*:*:*:*:*:*:* cpe:2.3:h:amd:radeon_rx_6800:-:*:*:*:*:*:*:* cpe:2.3:h:amd:radeon_rx_6800_xt:-:*:*:*:*:*:*:* cpe:2.3:h:amd:radeon_rx_6800m:-:*:*:*:*:*:*:* cpe:2.3:h:amd:radeon_rx_6800s:-:*:*:*:*:*:*:* cpe:2.3:h:amd:radeon_rx_6850m_xt:-:*:*:*:*:*:*:* cpe:2.3:h:amd:radeon_rx_6900_xt:-:*:*:*:*:*:*:* cpe:2.3:h:amd:radeon_rx_6950_xt:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:amd:radeon_rx_vega_56_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:amd:radeon_rx_vega_56:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:amd:radeon_rx_vega_64_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:amd:radeon_rx_vega_64:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:amd:ryzen_3_2200ge_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:amd:ryzen_3_2200ge:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:amd:ryzen_3_2200g_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:amd:ryzen_3_2200g:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:amd:ryzen_5_2400ge_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:amd:ryzen_5_2400ge:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:amd:ryzen_5_2400g_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:amd:ryzen_5_2400g:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:amd:ryzen_3_5300ge_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:amd:ryzen_3_5300ge:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:amd:ryzen_3_5300g_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:amd:ryzen_3_5300g:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:amd:ryzen_5_5600ge_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:amd:ryzen_5_5600ge:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:amd:ryzen_5_5600g_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:amd:ryzen_5_5600g:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:amd:ryzen_7_5700ge_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:amd:ryzen_7_5700ge:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:amd:ryzen_7_5700g_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:amd:ryzen_7_5700g:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:amd:athlon_silver_3050e_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:amd:athlon_silver_3050e:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:amd:athlon_pro_3045b_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:amd:athlon_pro_3045b:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:amd:athlon_silver_3050u_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:amd:athlon_silver_3050u:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:amd:athlon_silver_3050c_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:amd:athlon_silver_3050c:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:amd:athlon_pro_3145b_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:amd:athlon_pro_3145b:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:amd:athlon_gold_3150u_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:amd:athlon_gold_3150u:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:amd:athlon_gold_3150c_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:amd:athlon_gold_3150c:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:amd:ryzen_3_3250u_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:amd:ryzen_3_3250u:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:amd:ryzen_3_3250c_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:amd:ryzen_3_3250c:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:amd:amd_3020e_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:amd:amd_3020e:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:amd:amd_3015e_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:amd:amd_3015e:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:amd:amd_3015ce_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:amd:amd_3015ce:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:amd:ryzen_3_2200u_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:amd:ryzen_3_2200u:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:amd:ryzen_3_2300u_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:amd:ryzen_3_2300u:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:amd:ryzen_5_2500u_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:amd:ryzen_5_2500u:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:amd:ryzen_5_2600h_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:amd:ryzen_5_2600h:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:amd:ryzen_7_2700u_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:amd:ryzen_7_2700u:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:amd:ryzen_7_2800h_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:amd:ryzen_7_2800h:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:amd:ryzen_3_3300u_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:amd:ryzen_3_3300u:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:amd:ryzen_3_3350u_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:amd:ryzen_3_3350u:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:amd:ryzen_5_3450u_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:amd:ryzen_5_3450u:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:amd:ryzen_5_3500u_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:amd:ryzen_5_3500u:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:amd:ryzen_5_3500c_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:amd:ryzen_5_3500c:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:amd:ryzen_5_3550h_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:amd:ryzen_5_3550h:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:amd:ryzen_5_3580u_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:amd:ryzen_5_3580u:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:amd:ryzen_7_3700u_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:amd:ryzen_7_3700u:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:amd:ryzen_7_3700c_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:amd:ryzen_7_3700c:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:amd:ryzen_7_3750h_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:amd:ryzen_7_3750h:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:amd:ryzen_7_3780u_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:amd:ryzen_7_3780u:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:amd:ryzen_3_pro_3200ge_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:amd:ryzen_3_pro_3200ge:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:amd:ryzen_3_3200g_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:amd:ryzen_3_3200g:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:amd:ryzen_3_pro_3200g_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:amd:ryzen_3_pro_3200g:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:amd:ryzen_5_pro_3350ge_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:amd:ryzen_5_pro_3350ge:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:amd:ryzen_5_pro_3350g_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:amd:ryzen_5_pro_3350g:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:amd:ryzen_5_pro_3400ge_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:amd:ryzen_5_pro_3400ge:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:amd:ryzen_5_pro_3400g_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:amd:ryzen_5_pro_3400g:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:amd:ryzen_5_3400g_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:amd:ryzen_5_3400g:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:amd:ryzen_3_5300u_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:amd:ryzen_3_5300u:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:amd:ryzen_5_5500u_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:amd:ryzen_5_5500u:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:amd:ryzen_7_5700u_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:amd:ryzen_7_5700u:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:amd:ryzen_3_5400u_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:amd:ryzen_3_5400u:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:amd:ryzen_5_5560u_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:amd:ryzen_5_5560u:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:amd:ryzen_5_5600u_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:amd:ryzen_5_5600u:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:amd:ryzen_5_5600h_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:amd:ryzen_5_5600h:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:amd:ryzen_5_5600hs_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:amd:ryzen_5_5600hs:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:amd:ryzen_7_5800u_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:amd:ryzen_7_5800u:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:amd:ryzen_7_5800h_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:amd:ryzen_7_5800h:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:amd:ryzen_7_5800hs_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:amd:ryzen_7_5800hs:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:amd:ryzen_9_5900hs_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:amd:ryzen_9_5900hs:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:amd:ryzen_9_5900hx_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:amd:ryzen_9_5900hx:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:amd:ryzen_9_5980hs_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:amd:ryzen_9_5980hs:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:amd:ryzen_9_5980hx_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:amd:ryzen_9_5980hx:-:*:*:*:*:*:*:*
EPSS is a daily estimate of the probability of exploitation activity being observed over the next 30 days. Following chart shows the EPSS score history of the vulnerability.
CWE - Common Weakness Enumeration

While CVE identifies specific instances of vulnerabilities, CWE categorizes the common flaws or weaknesses that can lead to vulnerabilities. CVE-2021-26393 is associated with the following CWEs:

Common Attack Pattern Enumeration and Classification (CAPEC)

Common Attack Pattern Enumeration and Classification (CAPEC) stores attack patterns, which are descriptions of the common attributes and approaches employed by adversaries to exploit the CVE-2021-26393 weaknesses.

Exploit Prediction

EPSS is a daily estimate of the probability of exploitation activity being observed over the next 30 days.

0.04 }} 0.00%

score

0.12319

percentile

CVSS31 - Vulnerability Scoring System
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality
Integrity
Availability