Impact
The vulnerability arises from an improper privilege check within AMD’s Secure Processor (ASP), allowing an attacker to supply a value to a function without the necessary permissions and successfully write data. This can lead to loss of integrity and availability of the affected system, as the attacker can modify protected data or behavior. It is an instance of CWE‑274, Incorrect Privilege Assignment.
Affected Systems
Affected GPUs and accelerators include AMD Instinct MI210, MI250, Radeon PRO V520, V620, and the MI‑25 series. Specific revision or firmware versions are not listed in the advisory, so all current models that contain the vulnerable ASP logic may be impacted.
Risk and Exploitability
The CVSS score of 5.3 indicates a moderate severity vulnerability. The EPSS score is not provided, and the vulnerability is not listed in the CISA KEV catalog, suggesting that large‑scale exploitation is not currently documented. The likely attack vector is a local or privileged attacker who can interface with the Secure Processor, as the flaw requires invoking an ASP function with elevated privileges, and should be considered when assessing internal threat models.
OpenCVE Enrichment