Impact
The vulnerability arises when a compromised Trusted OS driver issues a malformed instruction allowing it to read or write memory beyond its allocated bounds. This can corrupt data, leading to integrity violations of system memory and critical structures. The weakness is a classic out‑of‑bounds access flaw (CWE‑190).
Affected Systems
AMD processors and graphics products in the 3000 to 7030 series, including Ryzen, Athlon and Radeon series listed in the CVE data. Versions affected are unspecified; any hardware with the documented Trusted OS driver is vulnerable until updated by a vendor release.
Risk and Exploitability
The CVSS score of 1.8 indicates a low overall severity. No EPSS data is available, and the vulnerability is not in the CISA KEV catalog, suggesting limited exploitation likelihood. The attack vector remains unclear; it is inferred that a local adversary with the ability to execute code within the Trusted OS space would need to construct the malformed call to exploit it.
OpenCVE Enrichment