7.8
HIGH
CVE-2023-20598
AMD Radeon Graphics IOCTL Privilege Escalation Vulnerability
Description

An improper privilege management in the AMD Radeon™ Graphics driver may allow an authenticated attacker to craft an IOCTL request to gain I/O control over arbitrary hardware ports or physical addresses resulting in a potential arbitrary code execution.

INFO

Published Date :

Oct. 17, 2023, 2:15 p.m.

Last Modified :

July 3, 2024, 1:39 a.m.

Remotely Exploitable :

No

Impact Score :

5.9

Exploitability Score :

1.8
Public PoC/Exploit Available at Github

CVE-2023-20598 has a 6 public PoC/Exploit available at Github. Go to the Public Exploits tab to see the list.

Affected Products

The following products are affected by CVE-2023-20598 vulnerability. Even if cvefeed.io is aware of the exact versions of the products that are affected, the information is not represented in the table below.

ID Vendor Product Action
1 Amd radeon_software
2 Amd ryzen_5_7600x
3 Amd ryzen_9_7950x3d
4 Amd ryzen_9_7950x
5 Amd ryzen_9_7900x3d
6 Amd ryzen_9_7900x
7 Amd ryzen_9_7900
8 Amd ryzen_9_pro_7945
9 Amd ryzen_7_7800x3d
10 Amd ryzen_7_7700x
11 Amd ryzen_7_7700
12 Amd ryzen_7_pro_7745
13 Amd ryzen_5_7600
14 Amd ryzen_5_pro_7645
15 Amd ryzen_5_7500f
16 Amd ryzen_9_6980hx
17 Amd ryzen_9_6980hs
18 Amd ryzen_9_6900hx
19 Amd ryzen_9_6900hs
20 Amd ryzen_7_6800h
21 Amd ryzen_7_6800hs
22 Amd ryzen_7_6800u
23 Amd ryzen_5_6600h
24 Amd ryzen_5_6600hs
25 Amd ryzen_5_6600u
26 Amd ryzen_7_7735hs
27 Amd ryzen_7_7736u
28 Amd ryzen_7_7735u
29 Amd ryzen_5_7535hs
30 Amd ryzen_5_7535u
31 Amd ryzen_3_7335u
32 Amd ryzen_9_7940h
33 Amd ryzen_7_pro_7840hs
34 Amd ryzen_7_7840h
35 Amd ryzen_7_7840u
36 Amd ryzen_5_pro_7640hs
37 Amd ryzen_5_7640h
38 Amd ryzen_5_7640u
39 Amd ryzen_5_7540u
40 Amd ryzen_3_7440u
41 Amd ryzen_9_7945hx3d
42 Amd ryzen_9_7945hx
43 Amd ryzen_9_7845hx
44 Amd ryzen_7_7745hx
45 Amd ryzen_5_7645hx
46 Amd ryzen_5_7520u
47 Amd ryzen_3_7320u
48 Amd radeon_rx_5300
49 Amd radeon_rx_5300_xt
50 Amd radeon_rx_5300m
51 Amd radeon_rx_5500
52 Amd radeon_rx_5500_xt
53 Amd radeon_rx_5500m
54 Amd radeon_rx_5600
55 Amd radeon_rx_5600_xt
56 Amd radeon_rx_5600m
57 Amd radeon_rx_5700
58 Amd radeon_rx_5700_xt
59 Amd radeon_rx_5700m
60 Amd radeon_rx_6300m
61 Amd radeon_rx_6400
62 Amd radeon_rx_6450m
63 Amd radeon_rx_6500_xt
64 Amd radeon_rx_6500m
65 Amd radeon_rx_6550m
66 Amd radeon_rx_6550s
67 Amd radeon_rx_6600
68 Amd radeon_rx_6600_xt
69 Amd radeon_rx_6600m
70 Amd radeon_rx_6600s
71 Amd radeon_rx_6650_xt
72 Amd radeon_rx_6650m
73 Amd radeon_rx_6650m_xt
74 Amd radeon_rx_6700
75 Amd radeon_rx_6700_xt
76 Amd radeon_rx_6700m
77 Amd radeon_rx_6700s
78 Amd radeon_rx_6750_gre_10gb
79 Amd radeon_rx_6750_gre_12gb
80 Amd radeon_rx_6750_xt
81 Amd radeon_rx_6800
82 Amd radeon_rx_6800_xt
83 Amd radeon_rx_6800s
84 Amd radeon_rx_6900_xt
85 Amd radeon_rx_6950_xt
86 Amd radeon_rx_7600
87 Amd radeon_rx_7600m
88 Amd radeon_rx_7600m_xt
89 Amd radeon_rx_7600s
90 Amd radeon_rx_7700_xt
91 Amd radeon_rx_7700s
92 Amd radeon_rx_7800_xt
93 Amd radeon_rx_7900_gre
94 Amd radeon_rx_7900_xt
95 Amd radeon_rx_7900_xtx
96 Amd radeon_rx_7900m
97 Amd radeon_pro_w5500
98 Amd radeon_pro_w5700
99 Amd radeon_pro_w6300
100 Amd radeon_pro_w6400
101 Amd radeon_pro_w6600
102 Amd radeon_pro_w6800
103 Amd radeon_pro_w7500
104 Amd radeon_pro_w7600
105 Amd radeon_pro_w7800
106 Amd radeon_pro_w7900
107 Amd ryzen_9_pro_7940hs
References to Advisories, Solutions, and Tools

Here, you will find a curated list of external links that provide in-depth information, practical solutions, and valuable tools related to CVE-2023-20598.

URL Resource
https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-6009 Vendor Advisory

We scan GitHub repositories to detect new proof-of-concept exploits. Following list is a collection of public exploits and proof-of-concepts, which have been published on GitHub (sorted by the most recently updated).

This repository is designed to provide a comprehensive collection of study materials, notes, and resources for the Offensive Security Certified Professional (OSCP) exam. It covers all key topics from basic to advanced, helping aspiring penetration testers to prepare efficiently for the exam.

cybersecurity hacking oscp oscp-guide oscp-journey oscp-prep

Updated: 4 weeks ago
1 stars 0 fork 0 watcher
Born at : Oct. 4, 2024, 4:43 p.m. This repo has been linked 75 different CVEs too.

None

Python C Shell PHP PowerShell ASP.NET

Updated: 1 month ago
0 stars 0 fork 0 watcher
Born at : Oct. 1, 2024, 2:21 p.m. This repo has been linked 66 different CVEs too.

CVE-2023-20598 Kernel Driver - Elevation of Privilege

C++

Updated: 3 months ago
4 stars 0 fork 0 watcher
Born at : June 11, 2024, 10:03 p.m. This repo has been linked 1 different CVEs too.

OSCP Cheat Sheet

oscp oscp-guide cheat-sheet cheatsheet offensive offensive-security offsec penetration-testing pentesting security

Python Shell C PHP PowerShell ASP.NET

Updated: 1 month, 4 weeks ago
2639 stars 544 fork 544 watcher
Born at : Oct. 22, 2021, 9:36 a.m. This repo has been linked 66 different CVEs too.

Kernel Driver Utility

loader driver-loader dse byovd

C C++ Assembly

Updated: 1 month, 4 weeks ago
1906 stars 411 fork 411 watcher
Born at : Feb. 2, 2020, 5:28 a.m. This repo has been linked 24 different CVEs too.

📡 PoC auto collect from GitHub. ⚠️ Be careful Malware.

security cve exploit poc vulnerability

Updated: 1 month, 4 weeks ago
6375 stars 1107 fork 1107 watcher
Born at : Dec. 8, 2019, 1:03 p.m. This repo has been linked 904 different CVEs too.

Results are limited to the first 15 repositories due to potential performance issues.

The following list is the news that have been mention CVE-2023-20598 vulnerability anywhere in the article.

The following table lists the changes that have been made to the CVE-2023-20598 vulnerability over time.

Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability's severity, exploitability, or other characteristics.

  • CVE Modified by 134c704f-9b21-4f2e-91b3-4a467353bcc0

    Jul. 03, 2024

    Action Type Old Value New Value
    Added CWE CISA-ADP CWE-269
    Added CVSS V3.1 CISA-ADP AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  • CVE Modified by [email protected]

    May. 14, 2024

    Action Type Old Value New Value
  • Initial Analysis by [email protected]

    Oct. 28, 2023

    Action Type Old Value New Value
    Added CVSS V3.1 NIST AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
    Changed Reference Type https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-6009 No Types Assigned https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-6009 Vendor Advisory
    Added CWE NIST NVD-CWE-noinfo
    Added CPE Configuration AND OR *cpe:2.3:a:amd:radeon_software:*:*:*:*:adrenalin:*:*:* versions up to (excluding) 23.9.2 OR cpe:2.3:h:amd:radeon_rx_5300:-:*:*:*:*:*:*:* cpe:2.3:h:amd:radeon_rx_5300_xt:-:*:*:*:*:*:*:* cpe:2.3:h:amd:radeon_rx_5300m:-:*:*:*:*:*:*:* cpe:2.3:h:amd:radeon_rx_5500:-:*:*:*:*:*:*:* cpe:2.3:h:amd:radeon_rx_5500_xt:-:*:*:*:*:*:*:* cpe:2.3:h:amd:radeon_rx_5500m:-:*:*:*:*:*:*:* cpe:2.3:h:amd:radeon_rx_5600:-:*:*:*:*:*:*:* cpe:2.3:h:amd:radeon_rx_5600_xt:-:*:*:*:*:*:*:* cpe:2.3:h:amd:radeon_rx_5600m:-:*:*:*:*:*:*:* cpe:2.3:h:amd:radeon_rx_5700:-:*:*:*:*:*:*:* cpe:2.3:h:amd:radeon_rx_5700_xt:-:*:*:*:*:*:*:* cpe:2.3:h:amd:radeon_rx_5700m:-:*:*:*:*:*:*:* cpe:2.3:h:amd:radeon_rx_6300m:-:*:*:*:*:*:*:* cpe:2.3:h:amd:radeon_rx_6400:-:*:*:*:*:*:*:* cpe:2.3:h:amd:radeon_rx_6450m:-:*:*:*:*:*:*:* cpe:2.3:h:amd:radeon_rx_6500_xt:-:*:*:*:*:*:*:* cpe:2.3:h:amd:radeon_rx_6500m:-:*:*:*:*:*:*:* cpe:2.3:h:amd:radeon_rx_6550m:-:*:*:*:*:*:*:* cpe:2.3:h:amd:radeon_rx_6550s:-:*:*:*:*:*:*:* cpe:2.3:h:amd:radeon_rx_6600:-:*:*:*:*:*:*:* cpe:2.3:h:amd:radeon_rx_6600_xt:-:*:*:*:*:*:*:* cpe:2.3:h:amd:radeon_rx_6600m:-:*:*:*:*:*:*:* cpe:2.3:h:amd:radeon_rx_6600s:-:*:*:*:*:*:*:* cpe:2.3:h:amd:radeon_rx_6650_xt:-:*:*:*:*:*:*:* cpe:2.3:h:amd:radeon_rx_6650m:-:*:*:*:*:*:*:* cpe:2.3:h:amd:radeon_rx_6650m_xt:-:*:*:*:*:*:*:* cpe:2.3:h:amd:radeon_rx_6700:-:*:*:*:*:*:*:* cpe:2.3:h:amd:radeon_rx_6700_xt:-:*:*:*:*:*:*:* cpe:2.3:h:amd:radeon_rx_6700m:-:*:*:*:*:*:*:* cpe:2.3:h:amd:radeon_rx_6700s:-:*:*:*:*:*:*:* cpe:2.3:h:amd:radeon_rx_6750_gre_10gb:-:*:*:*:*:*:*:* cpe:2.3:h:amd:radeon_rx_6750_gre_12gb:-:*:*:*:*:*:*:* cpe:2.3:h:amd:radeon_rx_6750_xt:-:*:*:*:*:*:*:* cpe:2.3:h:amd:radeon_rx_6800:-:*:*:*:*:*:*:* cpe:2.3:h:amd:radeon_rx_6800_xt:-:*:*:*:*:*:*:* cpe:2.3:h:amd:radeon_rx_6800s:-:*:*:*:*:*:*:* cpe:2.3:h:amd:radeon_rx_6900_xt:-:*:*:*:*:*:*:* cpe:2.3:h:amd:radeon_rx_6950_xt:-:*:*:*:*:*:*:* cpe:2.3:h:amd:radeon_rx_7600:-:*:*:*:*:*:*:* cpe:2.3:h:amd:radeon_rx_7600m:-:*:*:*:*:*:*:* cpe:2.3:h:amd:radeon_rx_7600m_xt:-:*:*:*:*:*:*:* cpe:2.3:h:amd:radeon_rx_7600s:-:*:*:*:*:*:*:* cpe:2.3:h:amd:radeon_rx_7700_xt:-:*:*:*:*:*:*:* cpe:2.3:h:amd:radeon_rx_7700s:-:*:*:*:*:*:*:* cpe:2.3:h:amd:radeon_rx_7800_xt:-:*:*:*:*:*:*:* cpe:2.3:h:amd:radeon_rx_7900_gre:-:*:*:*:*:*:*:* cpe:2.3:h:amd:radeon_rx_7900_xt:-:*:*:*:*:*:*:* cpe:2.3:h:amd:radeon_rx_7900_xtx:-:*:*:*:*:*:*:* cpe:2.3:h:amd:radeon_rx_7900m:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:a:amd:radeon_software:*:*:*:*:pro:*:*:* versions up to (excluding) 23.q4 OR cpe:2.3:h:amd:radeon_pro_w5500:-:*:*:*:*:*:*:* cpe:2.3:h:amd:radeon_pro_w5700:-:*:*:*:*:*:*:* cpe:2.3:h:amd:radeon_pro_w6300:-:*:*:*:*:*:*:* cpe:2.3:h:amd:radeon_pro_w6400:-:*:*:*:*:*:*:* cpe:2.3:h:amd:radeon_pro_w6600:-:*:*:*:*:*:*:* cpe:2.3:h:amd:radeon_pro_w6800:-:*:*:*:*:*:*:* cpe:2.3:h:amd:radeon_pro_w7500:-:*:*:*:*:*:*:* cpe:2.3:h:amd:radeon_pro_w7600:-:*:*:*:*:*:*:* cpe:2.3:h:amd:radeon_pro_w7800:-:*:*:*:*:*:*:* cpe:2.3:h:amd:radeon_pro_w7900:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:a:amd:radeon_software:*:*:*:*:adrenalin:*:*:* versions up to (excluding) 23.9.2 *cpe:2.3:a:amd:radeon_software:*:*:*:*:pro:*:*:* versions up to (excluding) 23.q4 OR cpe:2.3:h:amd:ryzen_3_7320u:-:*:*:*:*:*:*:* cpe:2.3:h:amd:ryzen_3_7335u:-:*:*:*:*:*:*:* cpe:2.3:h:amd:ryzen_3_7440u:-:*:*:*:*:*:*:* cpe:2.3:h:amd:ryzen_5_6600h:-:*:*:*:*:*:*:* cpe:2.3:h:amd:ryzen_5_6600hs:-:*:*:*:*:*:*:* cpe:2.3:h:amd:ryzen_5_6600u:-:*:*:*:*:*:*:* cpe:2.3:h:amd:ryzen_5_7500f:-:*:*:*:*:*:*:* cpe:2.3:h:amd:ryzen_5_7520u:-:*:*:*:*:*:*:* cpe:2.3:h:amd:ryzen_5_7535hs:-:*:*:*:*:*:*:* cpe:2.3:h:amd:ryzen_5_7535u:-:*:*:*:*:*:*:* cpe:2.3:h:amd:ryzen_5_7540u:-:*:*:*:*:*:*:* cpe:2.3:h:amd:ryzen_5_7600:-:*:*:*:*:*:*:* cpe:2.3:h:amd:ryzen_5_7600x:-:*:*:*:*:*:*:* cpe:2.3:h:amd:ryzen_5_7640h:-:*:*:*:*:*:*:* cpe:2.3:h:amd:ryzen_5_7640u:-:*:*:*:*:*:*:* cpe:2.3:h:amd:ryzen_5_7645hx:-:*:*:*:*:*:*:* cpe:2.3:h:amd:ryzen_5_pro_7640hs:-:*:*:*:*:*:*:* cpe:2.3:h:amd:ryzen_5_pro_7645:-:*:*:*:*:*:*:* cpe:2.3:h:amd:ryzen_7_6800h:-:*:*:*:*:*:*:* cpe:2.3:h:amd:ryzen_7_6800hs:-:*:*:*:*:*:*:* cpe:2.3:h:amd:ryzen_7_6800u:-:*:*:*:*:*:*:* cpe:2.3:h:amd:ryzen_7_7700:-:*:*:*:*:*:*:* cpe:2.3:h:amd:ryzen_7_7700x:-:*:*:*:*:*:*:* cpe:2.3:h:amd:ryzen_7_7735hs:-:*:*:*:*:*:*:* cpe:2.3:h:amd:ryzen_7_7735u:-:*:*:*:*:*:*:* cpe:2.3:h:amd:ryzen_7_7736u:-:*:*:*:*:*:*:* cpe:2.3:h:amd:ryzen_7_7745hx:-:*:*:*:*:*:*:* cpe:2.3:h:amd:ryzen_7_7800x3d:-:*:*:*:*:*:*:* cpe:2.3:h:amd:ryzen_7_7840h:-:*:*:*:*:*:*:* cpe:2.3:h:amd:ryzen_7_7840u:-:*:*:*:*:*:*:* cpe:2.3:h:amd:ryzen_7_pro_7745:-:*:*:*:*:*:*:* cpe:2.3:h:amd:ryzen_7_pro_7840hs:-:*:*:*:*:*:*:* cpe:2.3:h:amd:ryzen_9_6900hs:-:*:*:*:*:*:*:* cpe:2.3:h:amd:ryzen_9_6900hx:-:*:*:*:*:*:*:* cpe:2.3:h:amd:ryzen_9_6980hs:-:*:*:*:*:*:*:* cpe:2.3:h:amd:ryzen_9_6980hx:-:*:*:*:*:*:*:* cpe:2.3:h:amd:ryzen_9_7845hx:-:*:*:*:*:*:*:* cpe:2.3:h:amd:ryzen_9_7900:-:*:*:*:*:*:*:* cpe:2.3:h:amd:ryzen_9_7900x:-:*:*:*:*:*:*:* cpe:2.3:h:amd:ryzen_9_7900x3d:-:*:*:*:*:*:*:* cpe:2.3:h:amd:ryzen_9_7940h:-:*:*:*:*:*:*:* cpe:2.3:h:amd:ryzen_9_7945hx:-:*:*:*:*:*:*:* cpe:2.3:h:amd:ryzen_9_7945hx3d:-:*:*:*:*:*:*:* cpe:2.3:h:amd:ryzen_9_7950x:-:*:*:*:*:*:*:* cpe:2.3:h:amd:ryzen_9_7950x3d:-:*:*:*:*:*:*:* cpe:2.3:h:amd:ryzen_9_pro_7940hs:-:*:*:*:*:*:*:* cpe:2.3:h:amd:ryzen_9_pro_7945:-:*:*:*:*:*:*:*
EPSS is a daily estimate of the probability of exploitation activity being observed over the next 30 days. Following chart shows the EPSS score history of the vulnerability.
CWE - Common Weakness Enumeration

While CVE identifies specific instances of vulnerabilities, CWE categorizes the common flaws or weaknesses that can lead to vulnerabilities. CVE-2023-20598 is associated with the following CWEs:

Common Attack Pattern Enumeration and Classification (CAPEC)

Common Attack Pattern Enumeration and Classification (CAPEC) stores attack patterns, which are descriptions of the common attributes and approaches employed by adversaries to exploit the CVE-2023-20598 weaknesses.

Exploit Prediction

EPSS is a daily estimate of the probability of exploitation activity being observed over the next 30 days.

0.04 }} 0.00%

score

0.05671

percentile

CVSS31 - Vulnerability Scoring System
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality
Integrity
Availability