Description
Improper input validation in the GPU driver could allow an attacker to exploit a heap overflow potentially resulting in arbitrary code execution.
Published: 2025-09-06
Score: 8.8 High
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

No analysis available yet.

Remediation

No remediation available yet.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2024-54972 Improper input validation in the GPU driver could allow an attacker to exploit a heap overflow potentially resulting in arbitrary code execution.
History

Tue, 23 Sep 2025 22:30:00 +0000

Type Values Removed Values Added
Weaknesses CWE-20

Tue, 23 Sep 2025 21:45:00 +0000

Type Values Removed Values Added
Weaknesses CWE-1285

Tue, 09 Sep 2025 21:45:00 +0000

Type Values Removed Values Added
First Time appeared Amd
Amd athlon
Amd athlon 3000
Amd instinct Mi210
Amd instinct Mi250
Amd instinct Mi300a
Amd instinct Mi300x
Amd instinct Mi308x
Amd instinct Mi325x
Amd radeon Pro V520
Amd radeon Pro V620
Vendors & Products Amd
Amd athlon
Amd athlon 3000
Amd instinct Mi210
Amd instinct Mi250
Amd instinct Mi300a
Amd instinct Mi300x
Amd instinct Mi308x
Amd instinct Mi325x
Amd radeon Pro V520
Amd radeon Pro V620

Mon, 08 Sep 2025 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Sat, 06 Sep 2025 18:00:00 +0000

Type Values Removed Values Added
Description Improper input validation in the GPU driver could allow an attacker to exploit a heap overflow potentially resulting in arbitrary code execution.
Weaknesses CWE-20
References
Metrics cvssV3_1

{'score': 8.8, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H'}


Subscriptions

Amd Athlon Athlon 3000 Instinct Mi210 Instinct Mi250 Instinct Mi300a Instinct Mi300x Instinct Mi308x Instinct Mi325x Radeon Pro V520 Radeon Pro V620
cve-icon MITRE

Status: PUBLISHED

Assigner: AMD

Published:

Updated: 2026-02-26T17:49:09.671Z

Reserved: 2024-05-23T19:44:47.200Z

Link: CVE-2024-36342

cve-icon Vulnrichment

Updated: 2025-09-08T14:49:42.424Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2025-09-06T18:15:39.793

Modified: 2025-09-23T22:15:33.657

Link: CVE-2024-36342

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2025-09-09T21:32:01Z

Weaknesses