Cloud Defense Logo

Products

Solutions

Company

Book A Live Demo

CVE-2021-26360 : What You Need to Know

Learn about CVE-2021-26360 affecting AMD Radeon RX 6000 Series & PRO W6000 Series products. Find out the impact, affected systems, versions, and mitigation strategies.

A security vulnerability has been identified as CVE-2021-26360 in AMD Radeon RX 6000 Series & PRO W6000 Series products. This CVE allows an attacker with local access to the system to make unauthorized modifications to the security configuration of the SOC registers, potentially leading to arbitrary code execution.

Understanding CVE-2021-26360

This section will cover the basics of the CVE-2021-26360 vulnerability, its impact, technical details, and mitigation strategies.

What is CVE-2021-26360?

CVE-2021-26360 involves unauthorized modifications of the security configuration of the SOC registers, posing a risk of potential corruption of AMD secure processor's encrypted memory contents and subsequent arbitrary code execution in ASP.

The Impact of CVE-2021-26360

The impact of this vulnerability is significant as it can allow an attacker to execute arbitrary code on the affected systems, potentially compromising sensitive data and system integrity.

Technical Details of CVE-2021-26360

In this section, we will delve into the specifics of the CVE-2021-26360 vulnerability, including its description, affected systems and versions, and exploitation mechanism.

Vulnerability Description

The vulnerability allows unauthorized modifications to the SOC registers, enabling attackers to corrupt AMD secure processor's encrypted memory contents and execute arbitrary code.

Affected Systems and Versions

AMD Radeon RX 6000 Series & PRO W6000 Series products are affected by this vulnerability, specifically versions less than or equal to 'AMD Radeon Software 22.5.2', 'AMD Radeon Pro Software Enterprise 22.Q2', and 'Enterprise Driver 22.10.20'.

Exploitation Mechanism

Attackers with local access to the system can exploit this vulnerability by making unauthorized modifications to the SOC registers, leading to potential corruption of the AMD secure processor's encrypted memory contents.

Mitigation and Prevention

This section outlines the immediate steps to take to mitigate the CVE-2021-26360 vulnerability, as well as long-term security practices and the importance of patching and updates.

Immediate Steps to Take

Users are advised to update their AMD Radeon Software, AMD Radeon Pro Software Enterprise, and Enterprise Driver to versions that are not affected by the vulnerability.

Long-Term Security Practices

In the long term, it is crucial to adhere to secure coding practices, implement least privilege access policies, and conduct regular security audits to prevent similar vulnerabilities.

Patching and Updates

AMD users should regularly check for security updates and patches provided by the vendor to address vulnerabilities like CVE-2021-26360.

Popular CVEs

CVE Id

Published Date

Is your System Free of Underlying Vulnerabilities?
Find Out Now