Description

Improper syscall input validation in ASP (AMD Secure Processor) may force the kernel into reading syscall parameter values from its own memory space allowing an attacker to infer the contents of the kernel memory leading to potential information disclosure.

INFO

Published Date :

2026-02-10T19:48:36.645Z

Last Modified :

2026-02-12T14:12:04.201Z

Source :

AMD
AFFECTED PRODUCTS

The following products are affected by CVE-2021-26410 vulnerability.

Vendors Products
Amd
  • Radeon Pro V520
  • Radeon Pro V620
  • Radeon Pro W5000 Series
  • Radeon Pro W6000 Series
  • Radeon Rx 5000 Series
  • Radeon Rx 6000 Series
  • Ryzen 5000 Series Desktop Processors
  • Ryzen 5000 Series Desktop Processors With Radeon Graphics
  • Ryzen 5000 Series Mobile Processors With Radeon Graphics
  • Ryzen 7030 Series Mobile Processors With Radeon Graphics
  • Ryzen Embedded R1000 Series Processors
  • Ryzen Embedded R2000 Series Processors
  • Ryzen Embedded V1000 Series Processors
  • Ryzen Embedded V2000 Series Processors
  • Ryzen Embedded V3000 Series Processors
REFERENCES

Here, you will find a curated list of external links that provide in-depth information to CVE-2021-26410.

CVSS Vulnerability Scoring System

Detailed values of each vector for above chart.
Attack Vector
Attack Complexity
Attack Requirements
Privileges Required
User Interaction
VS Confidentiality
VS Integrity
VS Availability
SS Confidentiality
SS Integrity
SS Availability