Amd

Radeon Pro V620

4 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.01%
  • Veröffentlicht 11.02.2026 14:33:19
  • Zuletzt bearbeitet 11.02.2026 15:27:26

Improper handling of parameters in the AMD Secure Processor (ASP) could allow a privileged attacker to pass an arbitrary memory value to functions in the trusted execution environment resulting in arbitrary code execution

  • EPSS 0.02%
  • Veröffentlicht 06.09.2025 16:26:58
  • Zuletzt bearbeitet 08.09.2025 16:25:38

Improper validation of an array index in the AMD graphics driver software could allow an attacker to pass malformed arguments to the dynamic power management (DPM) functions resulting in an out of bounds read and loss of availability.

  • EPSS 0.02%
  • Veröffentlicht 06.09.2025 16:13:36
  • Zuletzt bearbeitet 08.09.2025 16:25:38

Improper handling of insufficiency privileges in the ASP could allow a privileged attacker to modify Translation Map Registers (TMRs) potentially resulting in loss of confidentiality or integrity.

  • EPSS 0.05%
  • Veröffentlicht 12.02.2025 00:15:07
  • Zuletzt bearbeitet 12.02.2025 00:15:07

Improper access control in the ASP could allow a privileged attacker to perform an out-of-bounds write to a memory location not controlled by the attacker, potentially leading to loss of confidentiality, integrity, or availability.