Improper Syscall Input Validation in AMD Secure Processor (ASP) Enables Kernel Memory Disclosure
CVE-2021-26410 Published on February 10, 2026

Improper syscall input validation in ASP (AMD Secure Processor) may force the kernel into reading syscall parameter values from its own memory space allowing an attacker to infer the contents of the kernel memory leading to potential information disclosure.

NVD

Weakness Type

Untrusted Pointer Dereference

The program obtains a value from an untrusted source, converts this value to a pointer, and dereferences the resulting pointer.


Affected Versions

AMD Ryzen™ 5000 Series Desktop Processors with Radeon™ Graphics: AMD Ryzen™ 4000 Series Mobile Processors with Radeon™ Graphics: AMD Ryzen™ 7030 Series Mobile Processors with Radeon™ Graphics: AMD Ryzen™ 5000 Series Mobile Processors with Radeon™ Graphics: AMD Ryzen™ 4000 Series Desktop Processors: AMD Ryzen™ Embedded R1000 Series Processors: AMD Ryzen™ Embedded R2000 Series Processors: AMD Ryzen™ Embedded V1000 Series Processors (formerly codenamed "Raven Ridge"): AMD Ryzen™ Embedded V1000 Series Processors (formerly codenamed "Picasso"): AMD Ryzen™ Embedded V2000 Series Processors: AMD Ryzen™ Embedded V3000 Series Processors: AMD Radeon™ RX 5000 Series Graphics Products: AMD Radeon™ PRO W5000 Series Graphics Products: AMD Radeon™ RX 6000 Series Graphics Products: AMD Radeon™ PRO W6000 Series Graphics Products: AMD Radeon™ PRO V520: AMD Radeon™ PRO V620:

Exploit Probability

EPSS
0.01%
Percentile
0.52%

EPSS (Exploit Prediction Scoring System) scores estimate the probability that a vulnerability will be exploited in the wild within the next 30 days. The percentile shows you how this score compares to all other vulnerabilities.