AMD Graphics Driver Vulnerabilities – February 2026
Summary
AMD received reports of vulnerabilities potentially affecting some AMD Graphics products. Refer to the CVE Details section for information about each CVE.
CVE Details
Refer to Glossary for explanation of terms
| CVE | CVE Description |
CVSS Score |
| CVE-2024-36324 | Improper input validation in the AMD Graphics Driver could allow an attacker to supply a specially crafted pointer, potentially leading to arbitrary code execution. | 8.8 High CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H 8.5 High CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N |
| CVE-2024-36319 | Debug code left active in AMD's Video Decoder Engine Firmware (VCN FW) could allow an attacker to submit a maliciously crafted command causing the VCN FW to perform read/writes HW registers, potentially impacting confidentiality, integrity and availability of the system. | 8.8 High CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H 6.3 Medium CVSS:4.0:AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:H/SI:H/SA:H |
| CVE-2023-31323 | Type confusion in the AMD Secure Processor (ASP) could allow an attacker to pass a malformed argument to the External Global Memory Interconnect Trusted Agent (XGMI TA), leading to a memory safety violation, potentially resulting in loss of confidentiality, integrity, or availability. | 7.9 High CVSS:3.1/ AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:H/A:L 8.4 High CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:L/VI:H/VA:L/SC:L/SI:H/SA:LN |
| CVE-2025-48503 | A DLL hijacking vulnerability in the AMD software installer could allow an attacker to achieve privilege escalation, potentially resulting in arbitrary code execution. | 7.8 High CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H 7.3 High CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N |
| CVE-2025-48508 | A DLL hijacking vulnerability in the AMD Cleanup Utility could allow an attacker to achieve privilege escalation potentially resulting in arbitrary code execution. | 7.3 High CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H 7.0 High CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N |
| CVE-2024-36320 | Integer overflow within atihdwt6.sys can allow a local attacker to cause an out of bound read/write, potentially leading to loss of confidentiality, integrity and availability. | 7.3 High CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H 7.0 High CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:L/VA:H/SC:N/SI:N/SA:N |
| CVE-2025-48518 | Improper input validation in AMD Graphics Driver could allow a local attacker to write out of bounds, potentially resulting in loss of integrity or denial of service. | 7.3 High CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:L/A:H 6.9 Medium CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N |
| CVE-2023-31313 | An unintended proxy or intermediary in the AMD power management firmware (PMFW) could allow a privileged attacker to send malformed messages to the system management unit (SMU,) potentially resulting in arbitrary code execution. | 7.2 High CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:N 7.0 High CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N |
| CVE-2023-20548 | A time-of-check time-of-use (TOCTOU) race condition in the AMD Secure Processor (ASP) could allow an attacker to corrupt memory resulting in loss of integrity, confidentiality, or availability. | 7.0 High CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:H/A:L CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:H/VA:L/SC:L/SI:H/SA:L |
| CVE-2023-31324 | A time-of-check time-of-use (TOCTOU) race condition in the AMD Secure Processor (ASP) could allow an attacker to modify External Global Memory Interconnect Trusted Agent (XGMI TA) commands as they are processed, potentially resulting in loss of confidentiality, integrity, or availability. | 7.0 High CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:H/A:L 7.1 High CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:H/VA:L/SC:L/SI:H/SA:L |
| CVE-2021-26381 | Improper system call parameter validation in the Trusted Operating System (TOS) may allow a malicious driver to perform mapping or un-mapping operations on a large number of pages, potentially resulting in kernel memory corruption. | 6.4 Medium CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H 7.1 High CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N |
| CVE-2024-36316 | The integer overflow vulnerability within AMD Graphics driver could allow an attacker to bypass size checks, potentially resulting in a denial of service. | 5.5 Medium CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H 6.8 Medium CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N |
| CVE-2025-21940 (non-AMD) | In the Linux® kernel, the following vulnerability has been resolved: drm/amdkfd: Fix NULL Pointer Dereference in KFD queue Through KFD IOCTL Fuzzing we encountered a NULL pointer derefrence when calling kfd_queue_acquire_buffers. (cherry picked from commit 049e5bf3c8406f87c3d8e1958e0a16804fa1d530) | 5.5 Medium CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H *Linux Kernel did not provide CVSS4.0 score |
| CVE-2023-20601 | Improper input validation within RAS TA Driver can allow a local attacker to access out-of-bounds memory, potentially resulting in a denial-of-service condition. | 2.3 Low CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L 4.6 Medium CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N |
| CVE-2021-26410 | Improper syscall input validation in AMD Secure Processor (ASP) may force the kernel into reading syscall parameter values from its own memory space, potentially allowing an attacker to infer the contents of the kernel memory, and potentially leading to information disclosure. | 1.8 Low CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N |
Affected Products and Mitigation
AMD recommends updating to the AMD graphics driver version (or later) indicated below.
AMD Instinct™ Accelerators
| Program | CVE | Mitigation | Mitigation Release Date |
| AMD Instinct™ MI210 AMD Instinct™ MI250 |
CVE-2025-21940 (non-AMD) |
ROCm 6.4.2 | 2025-07-21 |
| CVE-2023-31313 | |||
| CVE-2023-31324 | ROCm 6.4 | 2025-04-11 | |
| CVE-2023-20548 | ROCm 6.2 | 2024-08-02 | |
| CVE-2023-31323 | |||
| AMD Instinct™ MI300A | CVE-2025-21940 (non-AMD) |
ROCm 6.4.2 | 2025-07-21 |
| CVE-2023-31324 | ROCm 6.4 | 2025-04-11 | |
| CVE-2024-36319 | ROCm 6.2.4 | 2024-11-06 | |
| CVE-2023-31323 | ROCm 6.2 | 2024-08-02 | |
| CVE-2023-20548 | |||
| AMD Instinct™ MI300X | CVE-2025-21940 (non-AMD) |
ROCm 6.4.2 | 2025-07-21 |
| CVE-2023-31324 | ROCm 6.4 | 2025-04-11 | |
| CVE-2024-36319 | ROCm 6.2.4 | 2024-11-06 | |
| CVE-2023-20548 | ROCm 6.2 | 2024-08-02 | |
| CVE-2023-31323 | |||
| AMD Instinct™ MI308X | CVE-2024-36319 | ROCm 6.2.4 | 2024-11-06 |
| AMD Instinct™ MI325X | CVE-2025-21940 (non-AMD) |
ROCm 6.4.2 | 2025-07-21 |
| CVE-2024-36319 | ROCm 6.2.4 | 2024-11-06 |
Note: If you need support for MI100 products, contact your AMD Customer Engineering representative.
AMD Radeon™ PRO V Series Graphics Products
| Program | CVE | Mitigation |
| AMD Radeon™ Instinct™ MI25 | CVE-2025-48503 | Contact your AMD Customer Engineering representative |
| AMD Radeon™ PRO V520 | CVE-2021-26381 | Contact your AMD Customer Engineering representative |
| CVE-2021-26410 | ||
| CVE-2024-36316 | ||
| CVE-2024-36324 | ||
| CVE-2025-21940 (non-AMD) |
||
| CVE-2025-48503 | ||
| AMD Radeon™ PRO V620 | CVE-2021-26381 | Contact your AMD Customer Engineering representative |
| CVE-2021-26410 | ||
| CVE-2024-36316 | ||
| CVE-2024-36324 | ||
| CVE-2025-21940 (non-AMD) |
||
| CVE-2025-48503 | ||
| AMD Radeon™ PRO V710 | CVE-2024-36316 | Contact your AMD Customer Engineering representative |
| CVE-2024-36319 | ||
| CVE-2024-36324 | ||
| CVE-2025-21940 (non-AMD) |
||
| CVE-2025-48503 | ||
| CVE-2025-48508 | ||
| CVE-2025-48518 |
AMD Radeon™ PRO Series Graphics Products
| Program | CVE | Mitigation | Mitigation Release Date |
| AMD Radeon™ PRO W5000 Series Graphics Products | CVE-2021-26410 | AMD Software: PRO Edition 25.Q2 (25.10.10) | 2025-06-05 |
| Radeon Software for Linux (25.10.1) | 2025-06-05 | ||
| CVE-2025-21940 (non-AMD) |
Radeon™ Software for Linux® 25.10.2 | 2025-07-21 | |
| CVE-2021-26381 | AMD Software: PRO Edition 25.Q2 (25.10.10) | 2025-06-03 | |
| CVE-2023-20548 | |||
| CVE-2023-31323 | |||
| CVE-2023-31324 | |||
| CVE-2024-36320 | |||
| CVE-2024-36324 | |||
| CVE-2025-48503 | Auto Detect and Install 25.5.1 or later | 2025-05-13 | |
| AMD Radeon™ PRO W6000 Series Graphics Products | CVE-2021-26410 | AMD Software: PRO Edition 25.Q2 (25.10.10) | 2025-06-05 |
| Radeon Software for Linux (25.10.1) | 2025-06-05 | ||
| CVE-2025-21940 (non-AMD) |
Radeon™ Software for Linux® 25.10.2 | 2025-07-21 | |
| CVE-2021-26381 | AMD Software: PRO Edition 25.Q2 (25.10.10) | 2025-06-03 | |
| CVE-2024-36316 | |||
| CVE-2024-36320 | |||
| CVE-2024-36324 | |||
| CVE-2025-48503 | Auto Detect and Install 25.5.1 or later | 2025-05-13 | |
| AMD Radeon™ PRO W7000 Series Graphics Products | CVE-2025-21940 (non-AMD) |
Radeon™ Software for Linux® 25.10.2 | 2025-07-21 |
| CVE-2024-36316 | AMD Software: PRO Edition 25.Q2 (25.10.10) | 2025-06-03 | |
| CVE-2024-36320 | 2025-06-03 | ||
| CVE-2024-36324 | 2025-06-05 | ||
| CVE-2025-48518 | 2025-06-05 | ||
| CVE-2024-36319 | AMD Software: PRO Edition 25.Q2 (25.10.10) | 2025-06-03 | |
| Radeon Software for Linux 25.10.1 | 2025-06-03 | ||
| CVE-2025-48503 | Auto Detect and Install 25.5.1 or later | 2025-05-13 | |
| AMD Radeon™ PRO WX 8000 Series Graphics Cards | CVE-2024-36320 | AMD Software: PRO Edition 25.Q2 (23.19.23.01 pre-RDNA) | 2025-06-03 |
| AMD Radeon™ PRO VII | CVE-2024-36320 | AMD Software: PRO Edition 25.Q2 (23.19.23.01 pre-RDNA) | 2025-06-03 |
| CVE-2023-20601 | |||
| CVE-2023-31323 | No planned fix*1 | N/A | |
| CVE-2023-20548 | No planned fix*1 | N/A |
[1] Mitigation may introduce stability issues.
AMD Radeon™ Series Graphics Products
| Program | CVE | Mitigation | Mitigation Release Date |
| AMD Radeon™ RX 5000 Series Graphics Products | CVE-2021-26410 | AMD Software: PRO Edition 25.Q2 (25.10.10) | 2025-06-05 |
| Radeon Software for Linux (25.10.1) | 2025-06-05 | ||
| CVE-2025-21940 (non-AMD) |
Radeon™ Software for Linux® 25.10.2 | 2025-07-21 | |
| CVE-2023-20548 | AMD Software: Adrenalin Edition 25.6.1 (25.10.13.01) | 2025-06-05 | |
| CVE-2023-31323 | |||
| CVE-2023-31324 | |||
| CVE-2024-36324 | |||
| CVE-2024-36320 | AMD Software: Adrenalin Edition 25.5.1 (25.10.01.09) | 2025-06-03 | |
| CVE-2021-26381 | AMD Software: Adrenalin Edition 25.4.1 (24.30.31.08) | 2025-06-03 | |
| CVE-2025-48503 | Auto Detect and Install 25.5.1 or later | 2025-05-13 | |
| AMD Radeon™ RX 6000 Series Graphics Products | CVE-2021-26410 | AMD Software: PRO Edition 25.Q2 (25.10.10) | 2025-06-05 |
| Radeon Software for Linux (25.10.1) | 2025-06-05 | ||
| CVE-2025-21940 (non-AMD) |
Radeon™ Software for Linux® 25.10.2 | 2025-07-21 | |
| CVE-2024-36324 | AMD Software: Adrenalin Edition 25.6.1 (25.10.13.01) | 2025-06-05 | |
| CVE-2024-36316 | AMD Software: Adrenalin Edition 25.5.1 (25.10.01.09) | 2025-06-03 | |
| CVE-2024-36320 | |||
| CVE-2021-26381 | AMD Software: Adrenalin Edition 25.4.1 (24.30.31.08) | 2025-06-03 | |
| CVE-2025-48503 | Auto Detect and Install 25.5.1 or later | 2025-05-13 | |
| AMD Radeon™ RX 7000 Series Graphics Products | CVE-2024-36324 | AMD Software: Adrenalin Edition 25.6.1 (25.10.13.01) | 2025-06-05 |
| CVE-2025-48518 | |||
| CVE-2024-36316 | AMD Software: Adrenalin Edition 25.5.1 (25.10.01.09) | 2025-06-03 | |
| CVE-2024-36320 | 2025-06-03 | ||
| CVE-2024-36319 | AMD Software: Adrenalin Edition 25.5.1 (25.10.01.09) | 2025-06-03 | |
| Radeon Software for Linux 25.10.1 | 2025-06-03 | ||
| CVE-2025-21940 (non-AMD) |
Radeon™ Software for Linux® 25.10.2 | 2025-07-21 | |
| CVE-2025-48503 | Auto Detect and Install 25.5.1 or later | 2025-05-13 | |
| AMD Radeon™ RX 9000 Series Graphics Products | CVE-2024-36324 | AMD Software: Adrenalin Edition 25.6.1 (25.10.13.01) | 2025-06-05 |
| CVE-2025-48518 | |||
| CVE-2025-21940 (non-AMD) |
Radeon™ Software for Linux® 25.10.2 | 2025-07-21 | |
| CVE-2024-36320 | AMD Software: Adrenalin Edition 25.5.1 (23.19.23.01 pre-RDNA) |
2025-06-03 | |
| CVE-2025-48503 | Auto Detect and Install 25.5.1 or later | 2025-05-13 | |
| AMD Radeon™ AI PRO 9000 Series Graphics Products | CVE-2025-21940 (non-AMD) |
Radeon™ Software for Linux® 25.10.2 | 2025-07-21 |
| AMD Radeon™ RX Vega Series Graphics Cards | CVE-2024-36320 | AMD Software: Adrenalin Edition 25.5.1 (23.19.23.01 pre-RDNA) |
2025-06-03 |
| AMD Radeon™ VII | CVE-2024-36320 | AMD Software: Adrenalin Edition 25.5.1 (23.19.23.01 pre-RDNA) |
2025-06-03 |
| CVE-2023-20601 | |||
| CVE-2023-31323 | No planned fix*1 | N/A | |
| CVE-2023-20548 | No planned fix*1 | N/A |
[1] Mitigation may introduce stability issues.
Client Processors
The below Client processors include integrated graphics. To apply the recommended graphics mitigations for your AMD Client processor, locate the graphics architecture supported by your processor below and then refer to the table linked below for the mitigated version appropriate for your system.
AMD Athlon™ and AMD Ryzen™ Series Desktop Processors
| Product | Integrated AMD Radeon™ Graphics | Mitigation |
| AMD Athlon™ 3000 Series Desktop Processors with Radeon™ Graphics | AMD Radeon™ RX Vega Series | AMD Software: Refer to the AMD PRO Series RadeonTM Graphics Products tables above for the mitigated version appropriate for your system. |
| AMD Ryzen™ 4000 Series Desktop Processors with Radeon™ Graphics | AMD Radeon™ RX Vega Series AMD Radeon™ PRO VII Series |
|
| AMD Ryzen™ 5000 Series Desktop Processor with Radeon™ Graphics | AMD Radeon™ RX Vega Series | |
| AMD Ryzen™ 7000 Series Desktop Processors | AMD Radeon™ RX 6000 Series | |
| AMD Ryzen™ 8000 Series Processors with Radeon™ Graphics | AMD Radeon™ RX 7000 Series AMD Radeon™ PRO W7000 Series |
|
| AMD Ryzen™ 9000 Series Desktop Processors | AMD Radeon™ RX 6000 Series |
AMD Athlon™ and AMD Ryzen™Mobile Processors
| Product | Integrated AMD Radeon™ Graphics | Mitigation |
| AMD Athlon™ 3000 Series Mobile Processors with Radeon™ Graphics | AMD Radeon™ RX Vega Series | AMD Software: Refer to the AMD RadeonTM Series Graphics Products tables above for the mitigated version appropriate for your system. |
| AMD Athlon™ 3000 Series Mobile Processors with Radeon™ Graphics | AMD Radeon™ RX Vega Series | |
| AMD Ryzen™ 3000 Series Mobile Processors with Radeon™ Graphics | AMD Radeon™ RX Vega Series | |
| AMD Ryzen™ 4000 Series Mobile Processors with Radeon™ Graphics | AMD Radeon™ RX Vega Series AMD Radeon™ PRO VII Cards |
|
| AMD Ryzen™ 5000 Series Processors with Radeon™ Graphics | AMD Radeon™ RX Vega Series | |
| AMD Ryzen™ 5000 Series Mobile Processors with Radeon™ Graphics | AMD Radeon™ RX Vega Series | |
| AMD Ryzen™ 5000 Series Mobile Processors with Radeon™ Graphics | AMD Radeon™ RX Vega Series | |
| AMD Ryzen™ 6000 Series Processors with Radeon™ Graphics | AMD Radeon™ RX 6000 Series AMD Radeon™ PRO W6000 Series |
|
| AMD Ryzen™ 7020 Series Processors with Radeon™ Graphics | AMD Radeon™ RX 6000 Series | |
| AMD Ryzen™ 7030 Series Mobile Processors with Radeon™ Graphics | AMD Radeon™ RX Vega Series | |
| AMD Ryzen™ 7035 Series Processors with Radeon™ Graphics | AMD Radeon™ RX 6000 Series AMD Radeon™ PRO W6000 Series |
|
| AMD Ryzen™ 7040 Series Processors with Radeon™ Graphics | AMD Radeon™ RX 7000 Series AMD Radeon™ PRO W7000 Series |
|
| AMD Ryzen™ 7045 Series Mobile Processors | AMD Radeon™ RX 6000 Series | |
| AMD Ryzen™ AI 300 Series Processor | AMD Radeon™ RX 7000 Series AMD Radeon™ PRO W7000 Series |
|
| AMD Ryzen™ AI Max 300 Series Processors | AMD Radeon™ RX 7000 Series AMD Radeon™ PRO W7000 Series |
|
| AMD Ryzen™ 9000HX Series Processors | AMD Radeon™ RX 6000 Series | |
| AMD Ryzen™ 8040 Series Mobile Processors with Radeon™ Graphics | AMD Radeon™ RX 7000 Series AMD Radeon™ PRO W7000 Series |
|
| AMD Ryzen™ Z1 Series Processors | AMD Radeon™ RX 7000 Series | |
| AMD Ryzen™ Z2 Series Processors | AMD Radeon™ RX 7000 Series | |
| AMD Ryzen™ Z2 Series Processors | AMD Radeon™ RX 6000 Series |
AMD Ryzen™ Embedded Series Processors
| Program | CVE | Mitigation | Mitigation Release Date |
| AMD Ryzen™ Embedded 7000 Series Processors | CVE-2024-36320 | Q2 - 2025 AMD Embedded Ryzen[7000 8000 9000] Windows® Catalyst™ driver [25.6.1] (68926) | 2025-07-31 |
| CVE-2024-36319 | Q2 - 2025 AMD Embedded Ryzen[7000 8000 9000] Windows® Catalyst™ driver [25.6.1] (68926) | 2025-07-31 | |
| CVE-2024-36316 | AMD Software: Adrenalin Edition 25.6.1/ AMD Software: PRO Edition 25.Q2 (25.10.10) | 2025-07-31 | |
| CVE-2024-36324 | Q2 - 2025 AMD Embedded Ryzen[7000 8000 9000] Windows® Catalyst™ driver [25.6.1] (68926) | 2025-07-31 | |
| AMD Ryzen™ Embedded 8000 Series Processors | CVE-2025-48518 | AMD Software: Adrenalin Edition 25.6.1/ AMD Software: PRO Edition 25.Q2 (25.10.10) | 2025-07-31 |
| CVE-2024-36320 | Q2 - 2025 AMD Embedded Ryzen[7000 8000 9000] Windows® Catalyst™ driver [25.6.1] (68926) | 2025-07-31 | |
| CVE-2024-36319 | Q2 - 2025 AMD Embedded Ryzen[7000 8000 9000] Windows® Catalyst™ driver [25.6.1] (68926) | 2025-07-31 | |
| CVE-2024-36324 | Q2 - 2025 AMD Embedded Ryzen[7000 8000 9000] Windows® Catalyst™ driver [25.6.1] (68926) | 2025-07-31 | |
| CVE-2024-36316 | AMD Software: Adrenalin Edition 25.6.1/ AMD Software: PRO Edition 25.Q2 (25.10.10) | 2025-07-31 | |
| AMD Ryzen™ Embedded 9000 Series Processors | CVE-2024-36320 | Q2 - 2025 AMD Embedded Ryzen[7000 8000 9000] Windows® Catalyst™ driver [25.6.1] (68926) | 2025-07-31 |
| CVE-2024-36324 | Q2 - 2025 AMD Embedded Ryzen[7000 8000 9000] Windows® Catalyst™ driver [25.6.1] (68926) | 2025-07-31 | |
| CVE-2024-36319 | Q2 - 2025 AMD Embedded Ryzen[7000 8000 9000] Windows® Catalyst™ driver [25.6.1] (68926) | 2025-07-31 | |
| AMD Ryzen™ Embedded R1000 Series Processors | CVE-2024-36320 | 25Q3 AMD Emb [R1000 V1000] Win® Catalyst™ WHQL certified driver (71251) | 2025-10-31 |
| AMD Ryzen™ Embedded R2000 Series Processors | CVE-2024-36320 | Q2- 2025 AMD Embedded R2000, V2000 Windows® Catalyst™ WHQL certified driver (68914) | 2025-07-31 |
| AMD Ryzen™ Embedded V1000 Series Processors (formerly codenamed "Raven Ridge") |
CVE-2024-36320 | 25Q3 AMD Emb [R1000 V1000] Win® Catalyst™ WHQL certified driver (71251) | 2025-10-31 |
| AMD Ryzen™ Embedded V2000 Series Processors | CVE-2024-36320 | Q2- 2025 AMD Embedded R2000, V2000 Windows® Catalyst™ WHQL certified driver (68914) | 2025-07-31 |
Acknowledgement
AMD thanks the following researchers for participating in the AMD Bug Bounty Program:
- Daniel Jampen and Nicola Stauffer: CVE-2024-36324, CVE-2025-48518, CVE-2024-36316
- Aobo Wang(@M4x_1997): CVE-2024-36320
- Sandro Poppi: CVE-2025-48503
AMD thanks Microsoft for reporting this issue and engaging in coordinated vulnerability disclosure: CVE-2025-48508
Internally found: CVE-2021-26410, CVE-2024-36319, CVE-2023-20601, CVE-2021-26381, CVE-2023-31323, CVE-2023-31313, CVE-2023-20548, CVE-2023-31324
Revisions
| Revision Date | Description |
| 2026-02-10 | Initial publication |
DISCLAIMER
The information contained herein is for informational purposes only and is subject to change without notice. While every precaution has been taken in the preparation of this document, it may contain technical inaccuracies, omissions and typographical errors, and AMD is under no obligation to update or otherwise correct this information. Advanced Micro Devices, Inc. makes no representations or warranties with respect to the accuracy or completeness of the contents of this document, and assumes no liability of any kind, including the implied warranties of noninfringement, merchantability or fitness for particular purposes, with respect to the operation or use of AMD hardware, software or other products described herein. Any computer system has risks of security vulnerabilities that cannot be completely prevented or mitigated. No license, including implied or arising by estoppel, to any intellectual property rights is granted by this document. Terms and limitations applicable to the purchase or use of AMD’s products are as set forth in a signed agreement between the parties or in AMD's Standard Terms and Conditions of Sale.
AMD, the AMD Arrow logo, Instinct, Radeon, Ryzen, and combinations thereof are trademarks of Advanced Micro Devices, Inc. CVE and the CVE logo are registered trademarks of The MITRE Corporation. Linux® is the registered trademark of Linus Torvalds in the U.S. and other countries. Other product names used in this publication are for identification purposes only and may be trademarks of their respective companies.
Third party content may be licensed to you directly by the third party that owns the content and is not licensed to you by AMD. ALL LINKED THIRD-PARTY CONTENT IS PROVIDED ‘AS IS’ WITHOUT A WARRANTY OF ANY KIND. USE OF SUCH THIRD-PARTY CONTENT IS DONE AT YOUR SOLE DISCRETION AND UNDER NO CIRCUMSTANCES WILL AMD BE LIABLE TO YOU FOR ANY THIRD PARTY CONTENT. YOU ASSUME ALL RISK AND ARE SOLELY RESPONSIBILITY FOR ANY DAMAGES THAT MAY ARISE FROM YOUR USE OF THIRD-PARTY CONTENT.
© 2026 Advanced Micro Devices, Inc. All rights reserved.