Impact
Insufficient sanitization of a TEE SOC driver command allows an attacker to inject a malformed SRIOV_CHECK_TA_COMPAT request. This can cause the driver to map shared memory incorrectly, which in turn may lead to memory corruption, application crashes, or denial of service. The CVSS score indicates a low overall risk, but the lack of proper memory handling leaves the system vulnerable to unpredictable behavior.
Affected Systems
AMD Instinct MI210, AMD Instinct MI250, AMD Instinct MI300A, AMD Instinct MI300X, AMD Instinct MI308X, AMD Instinct MI325X, AMD Radeon PRO V620, AMD Radeon PRO V710, AMD Radeon PRO W6000 Series Graphics, AMD Radeon PRO W7000 Series Graphics, AMD Radeon RX 6000 Series Graphics, AMD Radeon RX 7000 Series Graphics
Risk and Exploitability
With a CVSS score of 1.8 and no EPSS data available, the exploitation likelihood is low but not negligible. The vulnerability is not listed in the CISA KEV catalog, suggesting no confirmed widespread exploitation. The attack likely requires local privileges or access to the TEE SOC driver, indicating a local or privileged attack vector. The impact is limited to driver stability and potential denial of service rather than remote code execution.
OpenCVE Enrichment