Impact
A flaw in the default file system permissions applied to the AMD chipset driver's installation directory permits a local user with reduced privileges to write or execute files as a privileged user. This mis‑permission vulnerability falls under CWE‑276 and could allow an attacker to replace or execute binaries, ultimately enabling arbitrary code execution with higher privileges. The description indicates the primary impact is privilege escalation rather than denial of service or information disclosure.
Affected Systems
The vulnerability affects a broad range of AMD processors and chipsets, including Athlon, Ryzen, EPYC, Threadripper, and Ryzen Embedded families. It impacts desktop, mobile, server, and embedded systems that install the affected AMD chipset driver.
Risk and Exploitability
The CVSS score of 8.5 reflects a high severity impact. The EPSS score is not available, so the current likelihood of exploitation cannot be quantified, and the vulnerability is not listed in CISA KEV. The likely attack vector is local; an attacker must gain access to the target machine in order to modify files in the driver’s installation directory. No public exploits are documented at this time, but the high impact warrants timely remediation.
OpenCVE Enrichment