### [CVE-2021-46749](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46749) ![](https://img.shields.io/static/v1?label=Product&message=3rd%20Gen%20AMD%20Ryzen%E2%84%A2%20Threadripper%E2%84%A2%20Processors%20%E2%80%9CCastle%20Peak%E2%80%9D%20HEDT&color=blue) ![](https://img.shields.io/static/v1?label=Product&message=AMD%20Ryzen%E2%84%A2%205000%20Series%20Desktop%20Processors%20%E2%80%9CVermeer%E2%80%9D%20AM4&color=blue) ![](https://img.shields.io/static/v1?label=Product&message=Athlon%E2%84%A2%203000%20Series%20Mobile%20Processors%20with%20Radeon%E2%84%A2%20Graphics%20%20%20%E2%80%9CPollock%E2%80%9D&color=blue) ![](https://img.shields.io/static/v1?label=Product&message=Athlon%E2%84%A2%203000%20Series%20Mobile%20Processors%20with%20Radeon%E2%84%A2%20Graphics%20%E2%80%9CDali%E2%80%9D%2F%E2%80%9DDali%E2%80%9D%20ULP&color=blue) ![](https://img.shields.io/static/v1?label=Product&message=Ryzen%E2%84%A2%202000%20Series%20Desktop%20Processors%20%E2%80%9CPinnacle%20Ridge%E2%80%9D&color=blue) ![](https://img.shields.io/static/v1?label=Product&message=Ryzen%E2%84%A2%202000%20Series%20Mobile%20Processors%20%E2%80%9CRaven%20Ridge%E2%80%9D%20FP5&color=blue) ![](https://img.shields.io/static/v1?label=Product&message=Ryzen%E2%84%A2%203000%20Series%20Desktop%20Processors%20%E2%80%9CMatisse%E2%80%9D%20AM4&color=blue) ![](https://img.shields.io/static/v1?label=Product&message=Ryzen%E2%84%A2%203000%20Series%20Mobile%20Processors%20with%20Radeon%E2%84%A2%20Graphics%20%E2%80%9CRenoir%E2%80%9D%20&color=blue) ![](https://img.shields.io/static/v1?label=Product&message=Ryzen%E2%84%A2%203000%20Series%20Mobile%20processor%2C%202nd%20Gen%20AMD%20Ryzen%E2%84%A2%20Mobile%20Processors%20with%20Radeon%E2%84%A2%20Graphics%20%E2%80%9CPicasso%E2%80%9D&color=blue) ![](https://img.shields.io/static/v1?label=Product&message=Ryzen%E2%84%A2%205000%20Series%20Desktop%20processor%20with%20Radeon%E2%84%A2%20Graphics%20%20%E2%80%9CCezanne%E2%80%9D%20AM4&color=blue) ![](https://img.shields.io/static/v1?label=Product&message=Ryzen%E2%84%A2%205000%20Series%20Mobile%20Processors%20with%20Radeon%E2%84%A2%20Graphics%20%E2%80%9CLucienne%E2%80%9D&color=blue) ![](https://img.shields.io/static/v1?label=Product&message=Ryzen%E2%84%A2%205000%20Series%20Mobile%20processors%20with%20Radeon%E2%84%A2%20Graphics%20%E2%80%9CCezanne%E2%80%9D&color=blue) ![](https://img.shields.io/static/v1?label=Product&message=Ryzen%E2%84%A2%20Threadripper%E2%84%A2%20PRO%20Processors%20%E2%80%9CCastle%20Peak%E2%80%9D%20WS&color=blue) ![](https://img.shields.io/static/v1?label=Product&message=Ryzen%E2%84%A2%20Threadripper%E2%84%A2%20PRO%20Processors%20%E2%80%9CChagall%E2%80%9D%20WS&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=various%20%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Version&message=various%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=blue) ### Description Insufficient bounds checking in ASP (AMD SecureProcessor) may allow for an out of bounds read in SMI (System ManagementInterface) mailbox checksum calculation triggering a data abort, resulting in apotential denial of service. ### POC #### Reference - https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-4001 #### Github No PoCs found on GitHub currently.