### [CVE-2021-46750](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46750) ![](https://img.shields.io/static/v1?label=Product&message=AMD%20Athlon%E2%84%A2%203000%20Series%20Mobile%20Processors%20with%20Radeon%E2%84%A2%20Graphics&color=blue) ![](https://img.shields.io/static/v1?label=Product&message=AMD%20Radeon%E2%84%A2%20PRO%20V620%20Graphics%20Products&color=blue) ![](https://img.shields.io/static/v1?label=Product&message=AMD%20Radeon%E2%84%A2%20PRO%20W6000%20Series%20Graphics%20Products&color=blue) ![](https://img.shields.io/static/v1?label=Product&message=AMD%20Radeon%E2%84%A2%20RX%206000%20Series%20Graphics%20Products&color=blue) ![](https://img.shields.io/static/v1?label=Product&message=AMD%20Ryzen%E2%84%A2%203000%20Series%20Mobile%20Processors%20with%20Radeon%E2%84%A2%20Graphics&color=blue) ![](https://img.shields.io/static/v1?label=Product&message=AMD%20Ryzen%E2%84%A2%204000%20Series%20Desktop%20Processors&color=blue) ![](https://img.shields.io/static/v1?label=Product&message=AMD%20Ryzen%E2%84%A2%204000%20Series%20Mobile%20Processors%20with%20Radeon%E2%84%A2%20Graphics&color=blue) ![](https://img.shields.io/static/v1?label=Product&message=AMD%20Ryzen%E2%84%A2%205000%20Series%20Mobile%20Processors%20with%20Radeon%E2%84%A2%20Graphics&color=blue) ![](https://img.shields.io/static/v1?label=Product&message=AMD%20Ryzen%E2%84%A2%206000%20Series%20Processors%20with%20Radeon%E2%84%A2%20Graphics&color=blue) ![](https://img.shields.io/static/v1?label=Product&message=AMD%20Ryzen%E2%84%A2%207030%20Series%20Mobile%20Processors%20with%20Radeon%E2%84%A2%20Graphics&color=blue) ![](https://img.shields.io/static/v1?label=Product&message=AMD%20Ryzen%E2%84%A2%207035%20Series%20Processors%20with%20Radeon%E2%84%A2%20Graphics&color=blue) ![](https://img.shields.io/static/v1?label=Product&message=AMD%20Ryzen%E2%84%A2%20Embedded%20R1000%20Series%20Processors&color=blue) ![](https://img.shields.io/static/v1?label=Product&message=AMD%20Ryzen%E2%84%A2%20Embedded%20R2000%20Series%20Processors&color=blue) ![](https://img.shields.io/static/v1?label=Product&message=AMD%20Ryzen%E2%84%A2%20Embedded%20V1000%20Series%20Processors&color=blue) ![](https://img.shields.io/static/v1?label=Product&message=AMD%20Ryzen%E2%84%A2%20Embedded%20V2000%20Series%20Processors&color=blue) ![](https://img.shields.io/static/v1?label=Product&message=AMD%20Ryzen%E2%84%A2%20Embedded%20V3000%20Series&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=&color=brightgreen) ![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-190%20%20Integer%20Overflow%20or%20Wraparound&color=brightgreen) ### Description Failure to validate the address and size in TEE (Trusted Execution Environment) may allow a malicious x86 attacker to send malformed messages to the graphics mailbox resulting in an overlap of a TMR (Trusted Memory Region) that was previously allocated by the ASP bootloader leading to a potential loss of integrity. ### POC #### Reference No PoCs from references. #### Github - https://github.com/fkie-cad/nvd-json-data-feeds