Improper syscall input validation in ASP (AMD Secure Processor) may force the kernel into reading syscall parameter values from its own memory space allowing an attacker to infer the contents of the kernel memory leading to potential information disclosure.
History

Tue, 10 Feb 2026 21:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Tue, 10 Feb 2026 20:00:00 +0000

Type Values Removed Values Added
Description Improper syscall input validation in ASP (AMD Secure Processor) may force the kernel into reading syscall parameter values from its own memory space allowing an attacker to infer the contents of the kernel memory leading to potential information disclosure.
Weaknesses CWE-822
References
Metrics cvssV4_0

{'score': 1.8, 'vector': 'CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: AMD

Published:

Updated: 2026-02-10T20:50:34.974Z

Reserved: 2021-01-29T21:24:26.172Z

Link: CVE-2021-26410

cve-icon Vulnrichment

Updated: 2026-02-10T20:50:13.363Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-02-10T20:16:42.227

Modified: 2026-02-10T21:51:48.077

Link: CVE-2021-26410

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.