### [CVE-2021-46773](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46773) ![](https://img.shields.io/static/v1?label=Product&message=3rd%20Gen%20AMD%20Ryzen%E2%84%A2%20Threadripper%E2%84%A2%20Processors%20%E2%80%9CCastle%20Peak%E2%80%9D%20HEDT&color=blue) ![](https://img.shields.io/static/v1?label=Product&message=AMD%20Ryzen%E2%84%A2%205000%20Series%20Desktop%20Processors%20%E2%80%9CVermeer%E2%80%9D%20AM4&color=blue) ![](https://img.shields.io/static/v1?label=Product&message=Ryzen%E2%84%A2%202000%20Series%20Desktop%20Processors%20%E2%80%9CPinnacle%20Ridge%E2%80%9D&color=blue) ![](https://img.shields.io/static/v1?label=Product&message=Ryzen%E2%84%A2%202000%20Series%20Mobile%20Processors%20%E2%80%9CRaven%20Ridge%E2%80%9D%20FP5&color=blue) ![](https://img.shields.io/static/v1?label=Product&message=Ryzen%E2%84%A2%202000%20series%20Desktop%20Processors%20%E2%80%9CRaven%20Ridge%E2%80%9D%20AM4&color=blue) ![](https://img.shields.io/static/v1?label=Product&message=Ryzen%E2%84%A2%203000%20Series%20Desktop%20Processors%20%E2%80%9CMatisse%E2%80%9D%20AM4&color=blue) ![](https://img.shields.io/static/v1?label=Product&message=Ryzen%E2%84%A2%203000%20Series%20Mobile%20Processors%20with%20Radeon%E2%84%A2%20Graphics%20%E2%80%9CRenoir%E2%80%9D%20&color=blue) ![](https://img.shields.io/static/v1?label=Product&message=Ryzen%E2%84%A2%205000%20Series%20Desktop%20processor%20with%20Radeon%E2%84%A2%20Graphics%20%20%E2%80%9CCezanne%E2%80%9D%20AM4&color=blue) ![](https://img.shields.io/static/v1?label=Product&message=Ryzen%E2%84%A2%205000%20Series%20Mobile%20Processors%20with%20Radeon%E2%84%A2%20Graphics%20%E2%80%9CLucienne%E2%80%9D&color=blue) ![](https://img.shields.io/static/v1?label=Product&message=Ryzen%E2%84%A2%205000%20Series%20Mobile%20processors%20with%20Radeon%E2%84%A2%20Graphics%20%E2%80%9CCezanne%E2%80%9D&color=blue) ![](https://img.shields.io/static/v1?label=Product&message=Ryzen%E2%84%A2%20Threadripper%E2%84%A2%20PRO%20Processors%20%E2%80%9CCastle%20Peak%E2%80%9D%20WS&color=blue) ![](https://img.shields.io/static/v1?label=Product&message=Ryzen%E2%84%A2%20Threadripper%E2%84%A2%20PRO%20Processors%20%E2%80%9CChagall%E2%80%9D%20WS&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=Various%20%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Version&message=various%20%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Version&message=various%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=blue) ### Description Insufficient input validation in ABL may enablea privileged attacker to corrupt ASP memory, potentially resulting in a loss ofintegrity or code execution. ### POC #### Reference - https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-4001 #### Github No PoCs found on GitHub currently.