Impact
The vulnerability stems from improper isolation of GPU hardware register space, which permits a privileged attacker operating within a malicious guest virtual machine to read or write to a restricted range of GPU MMIO registers. This unauthorized access can trigger a host operating system reboot, resulting in a denial‑of‑service condition. The weakness corresponds to a privilege escalation flaw outlined by CWE‑1189.
Affected Systems
AMD Radeon PRO V710 GPUs are affected. The issue is limited to the specific register range hardware for this GPU model, and no other AMD GPUs are confirmed to be impacted.
Risk and Exploitability
The CVSS score of 6.8 signals a moderate risk. No EPSS score is available, and the vulnerability is not listed in the CISA KEV catalog. The exploit requires a privileged guest VM environment. An attacker would need to run a malicious virtual machine with sufficient rights to target the vulnerable GPU registers, after which the host could reboot, causing a denial‑of‑service. There is no evidence of a publicly available exploit, but the impact would be significant if exploitation occurs.
OpenCVE Enrichment