Amd

Instinct Mi300x

10 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.02%
  • Veröffentlicht 12.02.2026 17:45:12
  • Zuletzt bearbeitet 13.02.2026 14:23:48

Type confusion in the AMD Secure Processor (ASP) could allow an attacker to pass a malformed argument to the External Global Memory Interconnect Trusted Agent (XGMI TA) leading to a memory safety violation potentially resulting in loss of confidentia...

  • EPSS 0.01%
  • Veröffentlicht 12.02.2026 17:41:06
  • Zuletzt bearbeitet 13.02.2026 14:23:48

Debug code left active in AMD's Video Decoder Engine Firmware (VCN FW) could allow a attacker to submit a maliciously crafted command causing the VCN FW to perform read/writes HW registers, potentially impacting confidentiality, integrity and availab...

  • EPSS 0.01%
  • Veröffentlicht 11.02.2026 14:35:16
  • Zuletzt bearbeitet 05.03.2026 17:44:49

A Time-of-check time-of-use (TOCTOU) race condition in the AMD Secure Processor (ASP) could allow an attacker to corrupt memory resulting in loss of integrity, confidentiality, or availability.

  • EPSS 0.01%
  • Veröffentlicht 11.02.2026 14:34:54
  • Zuletzt bearbeitet 05.03.2026 17:45:32

A Time-of-check time-of-use (TOCTOU) race condition in the AMD Secure Processor (ASP) could allow an attacker to modify External Global Memory Interconnect Trusted Agent (XGMI TA) commands as they are processed potentially resulting in loss of confid...

  • EPSS 0.07%
  • Veröffentlicht 23.09.2025 22:15:33
  • Zuletzt bearbeitet 24.09.2025 18:11:24

Improper input validation in Satellite Management Controller (SMC) may allow an attacker with privileges to use certain special characters in manipulated Redfish® API commands, causing service processes like OpenBMC to crash and reset, potentially re...

  • EPSS 0.04%
  • Veröffentlicht 23.09.2025 22:15:33
  • Zuletzt bearbeitet 24.09.2025 18:11:24

Improper input validation in Satellite Management Controller (SMC) may allow an attacker with privileges to manipulate Redfish® API commands to remove files from the local root directory, potentially resulting in data corruption.

  • EPSS 0.02%
  • Veröffentlicht 06.09.2025 18:35:44
  • Zuletzt bearbeitet 08.09.2025 16:25:38

Insufficient parameter sanitization in TEE SOC Driver could allow an attacker to issue a malformed DRV_SOC_CMD_ID_SRIOV_SPATIAL_PART and cause read or write past the end of allocated arrays, potentially resulting in a loss of platform integrity or de...

  • EPSS 0.01%
  • Veröffentlicht 06.09.2025 18:26:15
  • Zuletzt bearbeitet 08.09.2025 16:25:38

An out of bounds write in the Linux graphics driver could allow an attacker to overflow the buffer potentially resulting in loss of confidentiality, integrity, or availability.

  • EPSS 0.03%
  • Veröffentlicht 06.09.2025 17:43:14
  • Zuletzt bearbeitet 08.09.2025 16:25:38

Improper input validation in AMD Power Management Firmware (PMFW) could allow a privileged attacker from Guest VM to send arbitrary input data potentially causing a GPU Reset condition.

  • EPSS 0.05%
  • Veröffentlicht 12.02.2025 00:15:07
  • Zuletzt bearbeitet 12.02.2025 00:15:07

Improper access control in the ASP could allow a privileged attacker to perform an out-of-bounds write to a memory location not controlled by the attacker, potentially leading to loss of confidentiality, integrity, or availability.