Impact
AMD Secure Processor fails to properly preserve hardware configuration state across power‑save and restore cycles. The flaw allows an attacker with the ability to write memory outside the trusted memory range (TMR) to alter the execution path of Video Core Next firmware, potentially compromising confidential data, modifying system behavior, or disrupting availability. The weakness is a classic configuration integrity violation (CWE‑1304).
Affected Systems
The vulnerability affects a wide range of AMD products, including the Instinct MI210 and MI250 accelerators, Radeon PRO V620, W6000 and W7000 series graphics cards, RX 6000 and RX 7000 series GPUs, and various Ryzen 4000‑ to 7000‑series processors, both desktop and mobile, as well as embedded V2000 and V3000 lines. No specific firmware or BIOS version information is provided, so all current models are considered potentially impacted.
Risk and Exploitability
The CVSS score of 7.1 indicates a moderate to high severity vulnerability. EPSS is not available, and the issue is not listed in CISA’s KEV catalog. The attack requires the attacker to have the capability to write to memory beyond the trusted memory range, implying a local or privileged privilege level. Remote exploitation through a network interface is not indicated by the description. Because the flaw manipulates firmware execution flow, a successful exploit could lead to severe confidentiality, integrity, or availability impacts on affected devices.
OpenCVE Enrichment