6.3

CVE-2024-36319

Debug code left active in AMD's Video Decoder Engine Firmware (VCN FW) could allow a attacker to submit a maliciously crafted command causing the VCN FW to perform read/writes HW registers, potentially impacting confidentiality, integrity and availabilability of the system.
Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
Diese Information steht angemeldeten Benutzern zur Verfügung. Login Login
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
HerstellerAMD
Produkt AMD Ryzen™ 7040 Series Mobile Processors with Radeon™ Graphics; AMD Ryzen™ 8040 Series Mobile Processors with Radeon™ Graphics
Default Statusaffected
Version AMD Software: Adrenalin Edition 25.5.1, AMD Software: PRO Edition 25.Q2
Status unaffected
HerstellerAMD
Produkt AMD Ryzen™ AI MAX Series Processors
Default Statusaffected
Version AMD Software: Adrenalin Edition 25.5.1, AMD Software: PRO Edition 25.Q2
Status unaffected
HerstellerAMD
Produkt AMD Ryzen™ AI 300 Series Processors
Default Statusaffected
Version AMD Software: Adrenalin Edition 25.5.1, AMD Software: PRO Edition 25.Q2
Status unaffected
HerstellerAMD
Produkt AMD Ryzen™ 8000 Series Desktop Processors
Default Statusaffected
Version AMD Software: Adrenalin Edition 25.5.1, AMD Software: PRO Edition 25.Q2
Status unaffected
HerstellerAMD
Produkt AMD Ryzen™ Embedded 8000 Series Processors
Default Statusaffected
Version Q2 - 2025 AMD Embedded Ryzen[7000 8000 9000] Windows® Catalyst™ driver [25.6.1] (68926)
Status unaffected
HerstellerAMD
Produkt AMD Ryzen™ Embedded 7000 Series Processors
Default Statusaffected
Version Q2 - 2025 AMD Embedded Ryzen[7000 8000 9000] Windows® Catalyst™ driver [25.6.1] (68926)
Status unaffected
HerstellerAMD
Produkt AMD Ryzen™ Embedded 9000 Series Processors
Default Statusaffected
Version Q2 - 2025 AMD Embedded Ryzen[7000 8000 9000] Windows® Catalyst™ driver [25.6.1] (68926)
Status unaffected
HerstellerAMD
Produkt AMD Radeon™ RX 7000 Series Graphics Products
Default Statusaffected
Version 25.5.1 (25.10.01.09), AMD Software: PRO Edition 25.Q2(25.10.10), Radeon Software For Linux 25.10.1
Status unaffected
HerstellerAMD
Produkt AMD Radeon™ PRO W7000 Series Graphics Products
Default Statusaffected
Version 25.5.1 (25.10.01.09), AMD Software: PRO Edition 25.Q2(25.10.10), Radeon Software For Linux 25.10.1
Status unaffected
HerstellerAMD
Produkt AMD Instinct™ MI300X
Default Statusaffected
Version ROCm 6.2.4
Status unaffected
HerstellerAMD
Produkt AMD Instinct™ MI300A
Default Statusaffected
Version ROCm 6.2.4
Status unaffected
HerstellerAMD
Produkt AMD Instinct™ MI308X
Default Statusaffected
Version ROCm 6.2.4
Status unaffected
HerstellerAMD
Produkt AMD Instinct™ MI325X
Default Statusaffected
Version ROCm 6.2.4
Status unaffected
HerstellerAMD
Produkt AMD Radeon™ PRO V710
Default Statusaffected
Version Contact your AMD Customer Engineering representative
Status unaffected
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 0.01% 0.015
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String
psirt@amd.com 6.3 0 0
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:H/SI:H/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
CWE-1191 On-Chip Debug and Test Interface With Improper Access Control

The chip does not implement or does not correctly perform access control to check whether users are authorized to access internal registers and test modes through the physical debug/test interface.