Impact
A time‑of‑check to time‑of‑use race condition in AMD graphics interfaces allows an attacker to repeatedly load registers, creating a race that may corrupt register values and cause loss of integrity. The weakness is classified as CWE‑367, indicating a race condition that could lead to inconsistent or unintended state changes in the graphics subsystem.
Affected Systems
Affected systems include a wide range of AMD products such as the Athlon 3000 Series Desktop and Mobile processors, the Instinct MI210 and MI250 accelerators, Radeon PRO V520, V620, VII, W5000 and W6000 series, WX 8000/9000 series, RX 5000 and RX 6000 series, Vega series, Radeon VII, Ryzen 3000 Series Mobile, and several Ryzen Embedded R1‑, R2‑, and V1000 series processors. No specific version information has been provided; all listed product families are considered affected.
Risk and Exploitability
The CVSS score of 1.8 indicates a low overall severity, and the EPSS score is not available, meaning the likelihood of exploitation is currently unknown. The vulnerability is not listed in the CISA KEV catalog, further suggesting a lower exploitation probability. Based on the description, it is inferred that a local user with the ability to perform privileged writes to the GPU registers could trigger the race condition; no remote exploitation vector is documented.
OpenCVE Enrichment