AMD Embedded Vulnerabilities – August 2025
Summary
Potential vulnerabilities in AMD Embedded processors were reported, and mitigations are being provided through Platform Initialization (PI) firmware packages.
CVE Details
Refer to Glossary for explanation of terms
CVE |
CVE Description |
CVSS Score |
CVE-2024-36342 |
Improper input validation in the GPU driver could allow an attacker to exploit a heap overflow, potentially resulting in arbitrary code execution. |
8.8 (High) CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H 8.4 (High) CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N |
CVE-2024-36352 |
Improper input validation in the AMD Graphics Driver could allow an attacker to supply a specially crafted pointer, potentially leading to arbitrary writes or denial of service. |
8.4 (High) CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:H/A:H 6.2 (Medium) CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:H/SA:H |
CVE-2021-26383 |
Insufficient bounds checking in AMD Trusted Execution Environment (TEE) could allow an attacker with a compromised userspace to invoke a command with malformed arguments, leading to out of bounds memory access, potentially resulting in loss of integrity or availability. |
7.9 (High) CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:H/A:H 6.8 (Medium) CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N |
CVE-2024-21947 |
Improper input validation in the system management mode (SMM) could allow a privileged attacker to overwrite arbitrary memory, potentially resulting in arbitrary code execution at the SMM level. |
7.5 (High) CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H 7.1 (High) CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N |
CVE-2024-36354 |
Improper input validation in the boot loader could allow a privileged attacker to modify serial presence detect (SPD) metadata, potentially resulting in loss of integrity. |
7.5 (High) CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H 7.2 (High) CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N |
CVE-2025-0032 |
Improper cleanup in AMD CPU microcode patch loading could allow an attacker with local administrator privilege to load malicious CPU microcode, potentially resulting in loss of integrity of x86 instruction execution. |
7.2 (High) CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:N 7.0 (High) CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N |
CVE-2025-0009 |
A NULL pointer dereference in AMD Crash Defender could allow an attacker to write a NULL output to a log file, potentially resulting in a system crash and loss of availability. |
5.5 (Medium) CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H 6.8 (Medium) CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N |
CVE-2023-31351 |
Improper restriction of operations in the IOMMU could allow a malicious hypervisor to access guest private memory, resulting in loss of integrity. |
5.3 (Medium) CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:H/A:N 6.8 (Medium) CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:N/VI:H/VA:N/SC:N/SI:H/SA:N |
CVE-2024-21965 |
Improper access control in the IOMMU could allow an attacker to modify SNP configuration settings, potentially allowing writing to protected guest memory, resulting in loss of integrity. |
5.3 (Medium) CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:H/A:N 6.8 (Medium) CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:N/VI:H/VA:N/SC:N/SI:H/SA:N |
CVE-2023-20572 |
An observable timing discrepancy in the ASP could allow a privileged attacker to perform a brute-force attack against the hash message authentication code, allowing the input of an arbitrary message, potentially leading to a loss of data integrity. |
5.3 (Medium) CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:H/A:N 5.6 (Medium) CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N |
CVE-2021-46757 |
Failure to validate the integrity of firmware images read from SPI flash from the bootloader may allow an attacker to perform out-of-bounds memory reads, leading to a denial of service. |
4.7 (Medium) CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:L/I:N/A:H 5.6 (Medium) CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N |
|
Improper validation of an array index in the AMD Power Management Firmware could allow a privileged attacker to corrupt AGESA™ memory, potentially leading to a loss of integrity. |
4.4 (Medium) CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N 6.7 (Medium) CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N |
CVE-2021-26377 |
Insufficient parameter validation while allocating process space in the Trusted OS (TOS) may allow for a malicious userspace process to trigger an integer overflow, leading to a potential denial of service. |
4.1 (Medium) CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H 5.6 (Medium) CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N |
CVE-2025-0011 |
Improper removal of sensitive information before storage or transfer in AMD Crash Defender could allow an attacker to obtain kernel address information, potentially resulting in loss of confidentiality. |
3.3 (Low) CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N 4.8 (Medium) CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N |
CVE-2024-21977 |
Incomplete cleanup after loading a CPU microcode patch may allow a privileged attacker to degrade the entropy of the RDRAND instruction, potentially resulting in loss of integrity for SEV-SNP guests. |
3.2 (Low) 4.6 (Medium) CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N |
CVE-2024-36331 |
Improper management of cache coherency by the CPU could allow a privileged attacker with hypervisor access to overwrite SEV-SNP guest memory resulting in loss of data integrity. |
3.2 (Low) CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:L/A:N 4.6 (Medium) CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N |
CVE-2021-46750 |
Failure to validate the address and size in Trusted Execution Environment (TEE) may allow a malicious x86 attacker to send malformed messages to the graphics mailbox, resulting in an overlap of a Trusted Memory Region (TMR) that was previously allocated by the ASP bootloader, leading to a potential loss of integrity. |
3.0 (Low) CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:L/I:L/A:N 1.8 (Low) CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N |
CVE-2023-31326 |
Use of an uninitialized variable in the ASP could allow an attacker to access leftover data from a Trusted Execution Environment (TEE) driver, potentially leading to loss of confidentiality. |
2.8 (Low) CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:N/A:N 2.0 (Low) CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N |
CVE-2023-20540 |
An observable timing discrepancy in the ASP could allow a privileged attacker to perform a brute-force attack against the hash message authentication code, allowing arbitrary message input, potentially leading to a loss of data integrity. |
2.5 (Low) CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:L/A:N 1.8 (Low) CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N |
Specific CVSS scores may change subject to your implementation. We encourage you to calculate CVSS scores independently for your system.
Affected Products and Mitigation
AMD recommends updating to the Platform Initialization (PI) firmware version or AMD Software version indicated below.
AMD EPYC™ Embedded Series Processors
Program |
CVE ID |
Mitigation |
Date Fix Released |
AMD EPYC™ Embedded 3000 Series Processors |
CVE-2024-36354 |
SnowyOwl PI 1.1.0.F |
2025-04-30 |
AMD EPYC™ Embedded 7002 Series Processors |
CVE-2024-36354 |
EmbRomePI-SP3 1.0.0.E |
2025-04-14 |
AMD EPYC™ Embedded 7003 Series Processors |
CVE-2024-36354 |
EmbMilanPI-SP3 1.0.0.A |
2024-12-24 |
CVE-2024-21977 |
EmbMilanPI-SP3 1.0.0.9 |
2024-10-31 |
|
CVE-2023-31351 |
|||
AMD EPYC™ Embedded 9005 Series Processors |
CVE-2025-0032 |
EmbTurin PI 1.0.0.0 |
2025-05-31 |
AMD EPYC™ Embedded 900 Series Processors |
CVE-2024-36331 |
EmbGenoaPI 1.0.0.A |
2025-05-02 |
CVE-2024-21977 |
EmbGenoaPI-SP5 1.0.0.9 |
2024-12-27 |
|
CVE-2024-36354 |
EmbGenoaPI-SP5 1.0.0.8 |
2024-12-24 |
|
CVE-2024-21965 |
EmbGenoaPI-SP5 1.0.0.7 |
2024-07-31 |
|
CVE-2023-31351 |
|||
CVE-2021-26410 |
|||
CVE-2021-26377 |
AMD Ryzen™ Embedded Series Processors
Program |
CVE ID |
Mitigation |
Date Fix Released |
AMD Ryzen™ Embedded 5000 Series Processors |
CVE-2024-36342 |
Fixed – need version |
2025-07-31 |
CVE-2024-36354 |
EmbAM4PI 1.0.0.7 |
2025-01-31 |
|
CVE-2024-21977 |
|||
CVE-2024-21970 |
|||
CVE-2024-21947 |
EmbAM4PI 1.0.0.5
|
2024-04-15 | |
CVE-2023-20572 |
|||
CVE-2023-20540 |
|||
CVE-2021-26377 |
EmbAM4PI 1.0.0.2 |
2022-10-31 |
|
CVE-2021-46757 |
EmbAM4PI 1.0.0.0 |
2022-04-29 |
|
AMD Ryzen™ Embedded 7000 Series Processors |
CVE-2025-0011 |
Fixed – need version |
2025-07-31 |
CVE-2025-0009 |
|||
CVE-2024-36342 |
|||
CVE-2024-36354 |
EmbeddedAM5PI 1.0.0.3 |
2025-01-31 |
|
CVE-2024-21977 |
|||
CVE-2024-21970 |
|||
CVE-2023-20572 |
EmbeddedAM5PI 1.0.0.1 |
2024-07-31 |
|
AMD Ryzen™ Embedded 8000 Series Processors |
CVE-2024-36342 |
Fixed – need version |
2025-07-31 |
CVE-2025-0011 |
AMD Software: PRO Edition 25.Q1 (Embedded Driver branch 24.30.31.03) |
2022-04-30 |
|
CVE-2025-0009 |
|||
CVE-2024-21977 |
EmbeddedPhoenixPI-FP7r2 1.2.0.0 |
2024-12-31 |
|
AMD Ryzen™ Embedded R1000 Series Processors |
CVE-2024-36342 |
Fixed – need version |
2025-07-31 |
CVE-2024-21970 |
EmbeddedPI-FP5 1.2.0.E |
2025-02-28 |
|
CVE-2023-20572 |
EmbeddedPI-FP5 1.2.0.C |
2024-07-31 |
|
CVE-2024-21947 |
|||
CVE-2021-46750 |
EmbeddedPI-FP5 1.2.0.A |
2023-07-31 |
|
CVE-2021-26410 |
|||
CVE-2021-26377 |
|||
AMD Ryzen™ Embedded R2000 Series Processors |
CVE-2024-36342 |
Fixed – need version |
2025-07-31 |
CVE-2024-21970 |
EmbeddedR2KPI-FP 5 1.0.0.5 |
2025-02-28 |
|
CVE-2024-21947 |
EmbeddedR2KPI-FP5 1.0.0.3 |
2024-06-15 |
|
CVE-2023-20572 |
|||
CVE-2021-26410 |
EmbeddedR2KPI-FP5 1.0.0.2 |
2023-07-31 |
|
CVE-2021-46750 |
|||
CVE-2021-26377 |
|||
AMD Ryzen™ Embedded V1000 Series Processors |
CVE-2024-36342 |
Fixed – need version |
2025-07-31 |
CVE-2024-21970 |
EmbeddedPI-FP5 1.2.0.E |
2025-02-28 |
|
CVE-2023-20572 |
EmbeddedPI-FP5 1.2.0.C |
2024-07-31 |
|
CVE-2024-21947 |
|||
CVE-2021-46750 |
EmbeddedPI-FP5 1.2.0.A |
2023-07-31 |
|
CVE-2021-26410 |
|||
CVE-2021-26377 |
|||
CVE-2023-20540 |
No fix planned |
N/A |
|
AMD Ryzen™ Embedded V2000 Series Processors |
CVE-2024-36352 |
Fixed – need version |
2025-07-31 |
CVE-2024-36342 |
|||
CVE-2024-36354 |
EmbeddedPI-FP6 1.0.0.B |
2025-01-31 |
|
CVE-2024-21970 |
|||
CVE-2024-21947 |
EmbeddedPI-FP6 1.0.0.A |
2024-10-31 |
|
CVE-2023-31326 |
|||
CVE-2023-20572 |
EmbeddedPI-FP6 1.0.0.9 |
2024-04-15 |
|
CVE-2021-46750 |
EmbeddedPI-FP6 1.0.0.6 |
2022-04-29 |
|
CVE-2021-26410 |
|||
CVE-2021-26383 |
|||
CVE-2021-26377 |
|||
CVE-2023-20540 |
EmbeddedPI-FP6 1.0.0.0 |
2020-07-31 |
|
AMD Ryzen™ Embedded V3000 Series Processors |
CVE-2024-36342 |
Fixed – need version |
2025-07-31 |
CVE-2024-36354 |
Embedded-PI_FP7r2 1.0.0.A |
2024-12-31 |
|
CVE-2024-21977 |
|||
CVE-2024-21970 |
|||
CVE-2024-21947 |
Embedded-PI_FP7r2 1.0.0.9 |
2024-04-15 |
|
CVE-2023-31326 |
|||
CVE-2023-20572 |
|||
CVE-2021-46750 |
EmbeddedPI-FP7r2 1.0.0.0 |
2022-04-29 |
|
CVE-2021-26410 |
|||
CVE-2021-26377 |
Acknowledgement
AMD thanks researcher “vul_pwner” for participating in the AMD Bug Bounty Program: CVE-2024-21947
Internally found:
CVE-2021-26377, CVE-2021-26383, CVE-2021-46750, CVE-2021-46757, CVE-2023-20540, CVE-2023-20572, CVE-2023-31326, CVE-2023-31351, CVE-2024-21965, CVE-2024-21970, CVE-2024-21977, CVE-2024-36354, CVE-2025-0032
AMD thanks the following for subsequently reporting CVE-2024-36354 and engaging in coordinated vulnerability disclosure:
Jesse De Meulemeester (COSIC, KU Leuven)
Luca Wilke (University of Lubeck)
Lukas Gerlach (CISPA Helmholtz Center for Information Security)
David Oswald (University of Birmingham)
Jo Van Bulck (DistriNet, KU Leuven)
Revisions
Revision Date | Description |
2025-08-12 | Initial publication |
DISCLAIMER
The information contained herein is for informational purposes only and is subject to change without notice. While every precaution has been taken in the preparation of this document, it may contain technical inaccuracies, omissions and typographical errors, and AMD is under no obligation to update or otherwise correct this information. Advanced Micro Devices, Inc. makes no representations or warranties with respect to the accuracy or completeness of the contents of this document, and assumes no liability of any kind, including the implied warranties of noninfringement, merchantability or fitness for particular purposes, with respect to the operation or use of AMD hardware, software or other products described herein. Any computer system has risks of security vulnerabilities that cannot be completely prevented or mitigated. No license, including implied or arising by estoppel, to any intellectual property rights is granted by this document. Terms and limitations applicable to the purchase or use of AMD’s products are as set forth in a signed agreement between the parties or in AMD's Standard Terms and Conditions of Sale.
AMD, the AMD Arrow logo, AGESA, EYPC, Ryzen and combinations thereof are trademarks of Advanced Micro Devices, Inc. CVE and the CVE logo are registered trademarks of The MITRE Corporation. Other product names used in this publication are for identification purposes only and may be trademarks of their respective companies.
Third party content may be licensed to you directly by the third party that owns the content and is not licensed to you by AMD. ALL LINKED THIRD-PARTY CONTENT IS PROVIDED ‘AS IS’ WITHOUT A WARRANTY OF ANY KIND. USE OF SUCH THIRD-PARTY CONTENT IS DONE AT YOUR SOLE DISCRETION AND UNDER NO CIRCUMSTANCES WILL AMD BE LIABLE TO YOU FOR ANY THIRD PARTY CONTENT. YOU ASSUME ALL RISK AND ARE SOLELY RESPONSIBILITY FOR ANY DAMAGES THAT MAY ARISE FROM YOUR USE OF THIRD-PARTY CONTENT.
© 2025 Advanced Micro Devices, Inc. All rights reserved.