This is not the latest report. Click
here to view the latest report.
CVSS v3.1 Statistics for Advanced Micro Devices Inc. as of 11/16/2024
44
112
14
65
Reference
0-69.9%
|
|
Reference |
58.0
Contributor
70-94.9%
Provider
95-100%
| CVE | CNA Value | Alignment | NIST Value | Reason |
|---|---|---|---|---|
|
CVE-2021-26345
(5 of 8)
|
Attack Vector (AV) Local | ≠ | Attack Vector (AV) Network | |
| Attack Complexity (AC) High | ≠ | Attack Complexity (AC) Low | ||
| Privileges Required (PR) High | Privileges Required (PR) High | |||
| User Interaction (UI) None | User Interaction (UI) None | |||
| Scope (S) Unchanged | Scope (S) Unchanged | |||
| Confidentiality (C) None | Confidentiality (C) None | |||
| Integrity (I) None | Integrity (I) None | |||
| Availability (A) Low | ≠ | Availability (A) High | ||
|
CVE-2021-46762
(2 of 8)
|
Attack Vector (AV) Local | ≠ | Attack Vector (AV) Network | |
| Attack Complexity (AC) High | ≠ | Attack Complexity (AC) Low | ||
| Privileges Required (PR) High | ≠ | Privileges Required (PR) None | ||
| User Interaction (UI) None | User Interaction (UI) None | |||
| Scope (S) Changed | ≠ | Scope (S) Unchanged | ||
| Confidentiality (C) None | Confidentiality (C) None | |||
| Integrity (I) Low | ≠ | Integrity (I) High | ||
| Availability (A) Low | ≠ | Availability (A) High | ||
|
CVE-2021-46766
(4 of 8)
|
Attack Vector (AV) Local | Attack Vector (AV) Local | ||
| Attack Complexity (AC) High | ≠ | Attack Complexity (AC) Low | ||
| Privileges Required (PR) High | ≠ | Privileges Required (PR) Low | ||
| User Interaction (UI) None | User Interaction (UI) None | |||
| Scope (S) Changed | ≠ | Scope (S) Unchanged | ||
| Confidentiality (C) Low | ≠ | Confidentiality (C) High | ||
| Integrity (I) None | Integrity (I) None | |||
| Availability (A) None | Availability (A) None | |||
|
CVE-2021-46774
(1 of 8)
|
Attack Vector (AV) Local | ≠ | Attack Vector (AV) Network | |
| Attack Complexity (AC) High | ≠ | Attack Complexity (AC) Low | ||
| Privileges Required (PR) High | ≠ | Privileges Required (PR) None | ||
| User Interaction (UI) None | User Interaction (UI) None | |||
| Scope (S) Changed | ≠ | Scope (S) Unchanged | ||
| Confidentiality (C) Low | ≠ | Confidentiality (C) None | ||
| Integrity (I) High | ≠ | Integrity (I) None | ||
| Availability (A) Low | ≠ | Availability (A) High | ||
|
CVE-2022-23820
(4 of 8)
|
Attack Vector (AV) Local | ≠ | Attack Vector (AV) Network | |
| Attack Complexity (AC) High | ≠ | Attack Complexity (AC) Low | ||
| Privileges Required (PR) High | ≠ | Privileges Required (PR) None | ||
| User Interaction (UI) None | User Interaction (UI) None | |||
| Scope (S) Changed | ≠ | Scope (S) Unchanged | ||
| Confidentiality (C) High | Confidentiality (C) High | |||
| Integrity (I) High | Integrity (I) High | |||
| Availability (A) High | Availability (A) High | |||
|
CVE-2022-23830
(5 of 8)
|
Attack Vector (AV) Local | ≠ | Attack Vector (AV) Network | |
| Attack Complexity (AC) High | ≠ | Attack Complexity (AC) Low | ||
| Privileges Required (PR) High | ≠ | Privileges Required (PR) None | ||
| User Interaction (UI) None | User Interaction (UI) None | |||
| Scope (S) Unchanged | Scope (S) Unchanged | |||
| Confidentiality (C) None | Confidentiality (C) None | |||
| Integrity (I) Low | Integrity (I) Low | |||
| Availability (A) None | Availability (A) None | |||
|
CVE-2023-20521
(4 of 8)
|
Attack Vector (AV) Physical | Attack Vector (AV) Physical | ||
| Attack Complexity (AC) High | Attack Complexity (AC) High | |||
| Privileges Required (PR) High | ≠ | Privileges Required (PR) None | ||
| User Interaction (UI) None | User Interaction (UI) None | |||
| Scope (S) Changed | ≠ | Scope (S) Unchanged | ||
| Confidentiality (C) Low | ≠ | Confidentiality (C) High | ||
| Integrity (I) None | Integrity (I) None | |||
| Availability (A) Low | ≠ | Availability (A) High | ||
|
CVE-2023-20526
(4 of 8)
|
Attack Vector (AV) Physical | Attack Vector (AV) Physical | ||
| Attack Complexity (AC) High | ≠ | Attack Complexity (AC) Low | ||
| Privileges Required (PR) High | ≠ | Privileges Required (PR) None | ||
| User Interaction (UI) None | User Interaction (UI) None | |||
| Scope (S) Changed | ≠ | Scope (S) Unchanged | ||
| Confidentiality (C) Low | ≠ | Confidentiality (C) High | ||
| Integrity (I) None | Integrity (I) None | |||
| Availability (A) None | Availability (A) None | |||
|
CVE-2023-20533
(3 of 8)
|
Attack Vector (AV) Local | ≠ | Attack Vector (AV) Network | |
| Attack Complexity (AC) High | ≠ | Attack Complexity (AC) Low | ||
| Privileges Required (PR) High | ≠ | Privileges Required (PR) None | ||
| User Interaction (UI) None | User Interaction (UI) None | |||
| Scope (S) Changed | ≠ | Scope (S) Unchanged | ||
| Confidentiality (C) None | Confidentiality (C) None | |||
| Integrity (I) Low | ≠ | Integrity (I) None | ||
| Availability (A) High | Availability (A) High | |||
|
CVE-2023-20566
(4 of 8)
|
Attack Vector (AV) Local | ≠ | Attack Vector (AV) Network | |
| Attack Complexity (AC) High | ≠ | Attack Complexity (AC) Low | ||
| Privileges Required (PR) High | ≠ | Privileges Required (PR) None | ||
| User Interaction (UI) None | User Interaction (UI) None | |||
| Scope (S) Changed | ≠ | Scope (S) Unchanged | ||
| Confidentiality (C) None | Confidentiality (C) None | |||
| Integrity (I) High | Integrity (I) High | |||
| Availability (A) None | Availability (A) None | |||
| CVE-2023-20578 (7 of 8) | Attack Vector (AV) Local | Attack Vector (AV) Local | ||
| Attack Complexity (AC) High | Attack Complexity (AC) High | |||
| Privileges Required (PR) High | Privileges Required (PR) High | |||
| User Interaction (UI) None | User Interaction (UI) None | |||
| Scope (S) Changed | ≠ | Scope (S) Unchanged | Unclear if Scope change occurs. No identification of security boundaries being crossed. | |
| Confidentiality (C) High | Confidentiality (C) High | |||
| Integrity (I) High | Integrity (I) High | |||
| Availability (A) High | Availability (A) High | |||
| CVE-2024-21949 (8 of 8) | Attack Vector (AV) Local | Attack Vector (AV) Local | ||
| Attack Complexity (AC) Low | Attack Complexity (AC) Low | |||
| Privileges Required (PR) Low | Privileges Required (PR) Low | |||
| User Interaction (UI) None | User Interaction (UI) None | |||
| Scope (S) Unchanged | Scope (S) Unchanged | |||
| Confidentiality (C) None | Confidentiality (C) None | |||
| Integrity (I) None | Integrity (I) None | |||
| Availability (A) High | Availability (A) High | |||
| CVE-2024-21974 (7 of 8) | Attack Vector (AV) Local | Attack Vector (AV) Local | ||
| Attack Complexity (AC) Low | Attack Complexity (AC) Low | |||
| Privileges Required (PR) Low | Privileges Required (PR) Low | |||
| User Interaction (UI) None | User Interaction (UI) None | |||
| Scope (S) Changed | ≠ | Scope (S) Unchanged | Unclear if Scope change occurs. No identification of security boundaries being crossed. | |
| Confidentiality (C) High | Confidentiality (C) High | |||
| Integrity (I) High | Integrity (I) High | |||
| Availability (A) High | Availability (A) High | |||
| CVE-2024-21975 (7 of 8) | Attack Vector (AV) Local | Attack Vector (AV) Local | ||
| Attack Complexity (AC) Low | Attack Complexity (AC) Low | |||
| Privileges Required (PR) Low | Privileges Required (PR) Low | |||
| User Interaction (UI) None | User Interaction (UI) None | |||
| Scope (S) Changed | ≠ | Scope (S) Unchanged | Unclear if Scope change occurs. No identification of security boundaries being crossed. | |
| Confidentiality (C) High | Confidentiality (C) High | |||
| Integrity (I) High | Integrity (I) High | |||
| Availability (A) High | Availability (A) High |