Impact
A vulnerability in the AMD Platform Management Framework permits an out‑of‑bounds write that could give an attacker the ability to execute code with elevated privileges. This flaw can compromise the confidentiality, integrity, and availability of the affected system, as privileged code execution could allow the attacker to tamper with firmware, disable security features, or gain total system control.
Affected Systems
Vulnerable devices include AMD Ryzen 6000, 7035, 7040, 8040, and Embedded R8000 Series processors that incorporate Radeon graphics. The list covers both desktop and mobile platforms that use the AMD Platform Management Framework, and the bug affects all listed processor models unless a vendor update has been applied.
Risk and Exploitability
The CVSS base score of 8.4 indicates a high severity for this data‑critical flaw. While the EPSS score is not available, the lack of exploitation data does not reduce the risk; this type of out‑of‑bounds write is a well‑known exploitation vector. The vulnerability is not yet listed in CISA's KEV catalog, but the potential for privileged code execution suggests that it could be actively leveraged. The likely attack vector is local or proximity based, but the lack of documented exploitation makes the exact method uncertain. Cleanup or mitigation should rely on official vendor firmware patches once they are released.
OpenCVE Enrichment