AMD Embedded Vulnerabilities – August 2025

Summary

Potential vulnerabilities in AMD Embedded processors were reported, and mitigations are being provided through Platform Initialization (PI) firmware packages.

CVE Details

Refer to Glossary for explanation of terms

CVE

CVE Description

CVSS Score

CVE-2024-36342

Improper input validation in the GPU driver could allow an attacker to exploit a heap overflow, potentially resulting in arbitrary code execution.

8.8 (High)

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H

8.4 (High)

CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N

CVE-2024-36352

Improper input validation in the AMD Graphics Driver could allow an attacker to supply a specially crafted pointer, potentially leading to arbitrary writes or denial of service.

8.4 (High)

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:H/A:H

6.2 (Medium)

CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:H/SA:H

CVE-2021-26383

Insufficient bounds checking in AMD Trusted Execution Environment (TEE) could allow an attacker with a compromised userspace to invoke a command with malformed arguments, leading to out of bounds memory access, potentially resulting in loss of integrity or availability.

7.9 (High)

CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:H/A:H

6.8 (Medium)

CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N

CVE-2024-21947

Improper input validation in the system management mode (SMM) could allow a privileged attacker to overwrite arbitrary memory, potentially resulting in arbitrary code execution at the SMM level.

7.5 (High)

CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H

7.1 (High)

CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N

CVE-2024-36354

Improper input validation in the boot loader could allow a privileged attacker to modify serial presence detect (SPD) metadata, potentially resulting in loss of integrity.

7.5 (High)

CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H

7.2 (High)

CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N

CVE-2025-0032

Improper cleanup in AMD CPU microcode patch loading could allow an attacker with local administrator privilege to load malicious CPU microcode, potentially resulting in loss of integrity of x86 instruction execution.

7.2 (High)

CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:N

7.0 (High)

CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N

CVE-2025-0009

A NULL pointer dereference in AMD Crash Defender could allow an attacker to write a NULL output to a log file, potentially resulting in a system crash and loss of availability.

5.5 (Medium)

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

6.8 (Medium)

CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N

CVE-2023-31351

Improper restriction of operations in the IOMMU could allow a malicious hypervisor to access guest private memory, resulting in loss of integrity.

5.3 (Medium)

CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:H/A:N

6.8 (Medium)

CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:N/VI:H/VA:N/SC:N/SI:H/SA:N

CVE-2024-21965

Improper access control in the IOMMU could allow an attacker to modify SNP configuration settings, potentially allowing writing to protected guest memory, resulting in loss of integrity.

5.3 (Medium)

CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:H/A:N

6.8 (Medium)

CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:N/VI:H/VA:N/SC:N/SI:H/SA:N

CVE-2023-20572

An observable timing discrepancy in the ASP could allow a privileged attacker to perform a brute-force attack against the hash message authentication code, allowing the input of an arbitrary message, potentially leading to a loss of data integrity.

5.3 (Medium)

CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:H/A:N

5.6 (Medium)

CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N

CVE-2021-46757

Failure to validate the integrity of firmware images read from SPI flash from the bootloader may allow an attacker to perform out-of-bounds memory reads, leading to a denial of service.

4.7 (Medium)

CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:L/I:N/A:H

5.6 (Medium)

CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N


CVE-2024-21970

Improper validation of an array index in the AMD Power Management Firmware could allow a privileged attacker to corrupt AGESA™ memory, potentially leading to a loss of integrity.

4.4 (Medium)

CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N

6.7 (Medium)

CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N

CVE-2021-26377

Insufficient parameter validation while allocating process space in the Trusted OS (TOS) may allow for a malicious userspace process to trigger an integer overflow, leading to a potential denial of service.

4.1 (Medium)

CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H

5.6 (Medium)

CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N

CVE-2025-0011

Improper removal of sensitive information before storage or transfer in AMD Crash Defender could allow an attacker to obtain kernel address information, potentially resulting in loss of confidentiality.

3.3 (Low)

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N

4.8 (Medium)

CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N

CVE-2024-21977

Incomplete cleanup after loading a CPU microcode patch may allow a privileged attacker to degrade the entropy of the RDRAND instruction, potentially resulting in loss of integrity for SEV-SNP guests.

3.2 (Low)
CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:L/A:N

4.6 (Medium)

CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N

CVE-2024-36331

Improper management of cache coherency by the CPU could allow a privileged attacker with hypervisor access to overwrite SEV-SNP guest memory resulting in loss of data integrity.

3.2 (Low)

CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:L/A:N

4.6 (Medium)

CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N

CVE-2021-46750

Failure to validate the address and size in Trusted Execution Environment (TEE) may allow a malicious x86 attacker to send malformed messages to the graphics mailbox, resulting in an overlap of a Trusted Memory Region (TMR) that was previously allocated by the ASP bootloader, leading to a potential loss of integrity.

3.0 (Low)

CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:L/I:L/A:N

1.8 (Low)

CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N

CVE-2023-31326

Use of an uninitialized variable in the ASP could allow an attacker to access leftover data from a Trusted Execution Environment (TEE) driver, potentially leading to loss of confidentiality.

2.8 (Low)

CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:N/A:N

2.0 (Low)

CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N

CVE-2023-20540

An observable timing discrepancy in the ASP could allow a privileged attacker to perform a brute-force attack against the hash message authentication code, allowing arbitrary message input, potentially leading to a loss of data integrity.

2.5 (Low)

CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:L/A:N

1.8 (Low)

CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N

Specific CVSS scores may change subject to your implementation. We encourage you to calculate CVSS scores independently for your system.

Affected Products and Mitigation

AMD recommends updating to the Platform Initialization (PI) firmware version or AMD Software version indicated below.

AMD EPYC™ Embedded Series Processors

Program

CVE ID

Mitigation

Date Fix Released

AMD EPYC™ Embedded 3000 Series Processors

CVE-2024-36354

SnowyOwl PI

1.1.0.F

2025-04-30

AMD EPYC™ Embedded 7002 Series Processors

CVE-2024-36354

EmbRomePI-SP3

1.0.0.E

2025-04-14

AMD EPYC™ Embedded 7003 Series Processors

CVE-2024-36354

EmbMilanPI-SP3

1.0.0.A

2024-12-24

CVE-2024-21977

EmbMilanPI-SP3

1.0.0.9

2024-10-31

CVE-2023-31351

AMD EPYC™ Embedded 9005 Series Processors

CVE-2025-0032

EmbTurin PI

1.0.0.0

2025-05-31

AMD EPYC™ Embedded 900 Series Processors

CVE-2024-36331

EmbGenoaPI

1.0.0.A

2025-05-02

CVE-2024-21977

EmbGenoaPI-SP5

1.0.0.9

2024-12-27

CVE-2024-36354

EmbGenoaPI-SP5

1.0.0.8

2024-12-24

CVE-2024-21965

EmbGenoaPI-SP5

1.0.0.7

2024-07-31

CVE-2023-31351

CVE-2021-26410

CVE-2021-26377

AMD Ryzen™ Embedded Series Processors

Program

CVE ID

Mitigation

Date Fix Released

AMD Ryzen™ Embedded 5000 Series Processors

CVE-2024-36342

Fixed – need version

2025-07-31

CVE-2024-36354

EmbAM4PI

1.0.0.7

2025-01-31

CVE-2024-21977

CVE-2024-21970

CVE-2024-21947

EmbAM4PI

1.0.0.5

 

2024-04-15

CVE-2023-20572

CVE-2023-20540

CVE-2021-26377

EmbAM4PI

1.0.0.2

2022-10-31

CVE-2021-46757

EmbAM4PI

1.0.0.0

2022-04-29

AMD Ryzen™ Embedded 7000 Series Processors

CVE-2025-0011

Fixed – need version

2025-07-31

CVE-2025-0009

CVE-2024-36342

CVE-2024-36354

EmbeddedAM5PI

1.0.0.3

2025-01-31

CVE-2024-21977

CVE-2024-21970

CVE-2023-20572

EmbeddedAM5PI

1.0.0.1

2024-07-31

AMD Ryzen™ Embedded 8000 Series Processors

CVE-2024-36342

Fixed – need version

2025-07-31

CVE-2025-0011

AMD Software: PRO Edition 25.Q1

(Embedded Driver branch 24.30.31.03)

2022-04-30

CVE-2025-0009

CVE-2024-21977

EmbeddedPhoenixPI-FP7r2

1.2.0.0

2024-12-31

AMD Ryzen™ Embedded R1000 Series Processors

CVE-2024-36342

Fixed – need version

2025-07-31

CVE-2024-21970

EmbeddedPI-FP5

1.2.0.E

2025-02-28

CVE-2023-20572

EmbeddedPI-FP5

1.2.0.C

2024-07-31

CVE-2024-21947

CVE-2021-46750

EmbeddedPI-FP5

1.2.0.A

2023-07-31

CVE-2021-26410

CVE-2021-26377

AMD Ryzen™ Embedded R2000 Series Processors

CVE-2024-36342

Fixed – need version

2025-07-31

CVE-2024-21970

EmbeddedR2KPI-FP

5 1.0.0.5

2025-02-28

CVE-2024-21947

EmbeddedR2KPI-FP5

1.0.0.3

2024-06-15

CVE-2023-20572

CVE-2021-26410

EmbeddedR2KPI-FP5

1.0.0.2

2023-07-31

CVE-2021-46750

CVE-2021-26377

AMD Ryzen™ Embedded V1000 Series Processors

CVE-2024-36342

Fixed – need version

2025-07-31

CVE-2024-21970

EmbeddedPI-FP5

1.2.0.E

2025-02-28

CVE-2023-20572

EmbeddedPI-FP5

1.2.0.C

2024-07-31

CVE-2024-21947

CVE-2021-46750

EmbeddedPI-FP5

1.2.0.A

2023-07-31

CVE-2021-26410

CVE-2021-26377

CVE-2023-20540

No fix planned

N/A

AMD Ryzen™ Embedded V2000 Series Processors

CVE-2024-36352

Fixed – need version

2025-07-31

CVE-2024-36342

CVE-2024-36354

EmbeddedPI-FP6

1.0.0.B

2025-01-31

CVE-2024-21970

CVE-2024-21947

EmbeddedPI-FP6

1.0.0.A

2024-10-31

CVE-2023-31326

CVE-2023-20572

EmbeddedPI-FP6

1.0.0.9

2024-04-15

CVE-2021-46750

EmbeddedPI-FP6

1.0.0.6

2022-04-29

CVE-2021-26410

CVE-2021-26383

CVE-2021-26377

CVE-2023-20540

EmbeddedPI-FP6

1.0.0.0

2020-07-31

AMD Ryzen™ Embedded V3000 Series Processors

CVE-2024-36342

Fixed – need version

2025-07-31

CVE-2024-36354

Embedded-PI_FP7r2

1.0.0.A

2024-12-31

CVE-2024-21977

CVE-2024-21970

CVE-2024-21947

Embedded-PI_FP7r2

1.0.0.9

2024-04-15

CVE-2023-31326

CVE-2023-20572

CVE-2021-46750

EmbeddedPI-FP7r2

1.0.0.0

2022-04-29

CVE-2021-26410

CVE-2021-26377

Acknowledgement 

AMD thanks researcher “vul_pwner” for participating in the AMD Bug Bounty Program:  CVE-2024-21947

Internally found:
CVE-2021-26377, CVE-2021-26383, CVE-2021-46750, CVE-2021-46757, CVE-2023-20540, CVE-2023-20572, CVE-2023-31326, CVE-2023-31351, CVE-2024-21965, CVE-2024-21970, CVE-2024-21977, CVE-2024-36354, CVE-2025-0032

AMD thanks the following for subsequently reporting CVE-2024-36354 and engaging in coordinated vulnerability disclosure:
Jesse De Meulemeester (COSIC, KU Leuven)
Luca Wilke (University of Lubeck)
Lukas Gerlach (CISPA Helmholtz Center for Information Security)
David Oswald (University of Birmingham)
Jo Van Bulck (DistriNet, KU Leuven)

Revisions 

Revision Date Description
2025-08-12 Initial publication

DISCLAIMER

The information contained herein is for informational purposes only and is subject to change without notice. While every precaution has been taken in the preparation of this document, it may contain technical inaccuracies, omissions and typographical errors, and AMD is under no obligation to update or otherwise correct this information. Advanced Micro Devices, Inc. makes no representations or warranties with respect to the accuracy or completeness of the contents of this document, and assumes no liability of any kind, including the implied warranties of noninfringement, merchantability or fitness for particular purposes, with respect to the operation or use of AMD hardware, software or other products described herein. Any computer system has risks of security vulnerabilities that cannot be completely prevented or mitigated. No license, including implied or arising by estoppel, to any intellectual property rights is granted by this document. Terms and limitations applicable to the purchase or use of AMD’s products are as set forth in a signed agreement between the parties or in AMD's Standard Terms and Conditions of Sale. 

AMD, the AMD Arrow logo, AGESA, EYPC, Ryzen and combinations thereof are trademarks of Advanced Micro Devices, Inc. CVE and the CVE logo are registered trademarks of The MITRE Corporation. Other product names used in this publication are for identification purposes only and may be trademarks of their respective companies.

Third party content may be licensed to you directly by the third party that owns the content and is not licensed to you by AMD. ALL LINKED THIRD-PARTY CONTENT IS PROVIDED ‘AS IS’ WITHOUT A WARRANTY OF ANY KIND. USE OF SUCH THIRD-PARTY CONTENT IS DONE AT YOUR SOLE DISCRETION AND UNDER NO CIRCUMSTANCES WILL AMD BE LIABLE TO YOU FOR ANY THIRD PARTY CONTENT. YOU ASSUME ALL RISK AND ARE SOLELY RESPONSIBILITY FOR ANY DAMAGES THAT MAY ARISE FROM YOUR USE OF THIRD-PARTY CONTENT.

© 2025 Advanced Micro Devices, Inc. All rights reserved.