Vulnerabilities (CVE)

Join the Common Vulnerabilities and Exposures (CVE) community and start to get notified about new vulnerabilities.

Filtered by vendor Amd Subscribe
Total 182 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2020-12895 2 Amd, Microsoft 2 Radeon Software, Windows 10 2021-11-17 4.6 MEDIUM 7.8 HIGH
Pool/Heap Overflow in AMD Graphics Driver for Windows 10 in Escape 0x110037 may lead to escalation of privilege, information disclosure or denial of service.
CVE-2020-12897 2 Amd, Microsoft 2 Radeon Software, Windows 10 2021-11-17 2.1 LOW 5.5 MEDIUM
Kernel Pool Address disclosure in AMD Graphics Driver for Windows 10 may lead to KASLR bypass.
CVE-2020-12899 2 Amd, Microsoft 2 Radeon Software, Windows 10 2021-11-17 3.6 LOW 7.1 HIGH
Arbitrary Read in AMD Graphics Driver for Windows 10 may lead to KASLR bypass or denial of service.
CVE-2020-12928 1 Amd 1 Ryzen Master 2021-11-04 7.2 HIGH 7.8 HIGH
A vulnerability in a dynamically loaded AMD driver in AMD Ryzen Master V15 may allow any authenticated user to escalate privileges to NT authority system.
CVE-2021-26318 1 Amd 10 Athlon, Athlon Firmware, Athlon Pro and 7 more 2021-10-20 1.9 LOW 4.7 MEDIUM
A timing and power-based side channel attack leveraging the x86 PREFETCH instructions on some AMD CPUs could potentially result in leaked kernel address space information.
CVE-2019-7246 1 Amd 1 Atillk64 2021-07-21 4.6 MEDIUM 6.7 MEDIUM
An issue was discovered in atillk64.sys in AMD ATI Diagnostics Hardware Abstraction Sys/Overclocking Utility 5.11.9.0. The vulnerable driver exposes a wrmsr instruction and does not properly filter the Model Specific Register (MSR). Allowing arbitrary MSR writes can lead to Ring-0 code execution and escalation of privileges.
CVE-2020-12138 1 Amd 1 Atillk64 2021-07-21 9.0 HIGH 8.8 HIGH
AMD ATI atillk64.sys 5.11.9.0 allows low-privileged users to interact directly with physical memory by calling one of several driver routines that map physical memory into the virtual address space of the calling process. This could enable low-privileged users to achieve NT AUTHORITY\SYSTEM privileges via a DeviceIoControl call associated with MmMapIoSpace, IoAllocateMdl, MmBuildMdlForNonPagedPool, or MmMapLockedPages.
CVE-2019-7247 1 Amd 1 Overdrive 2021-07-21 7.5 HIGH 9.8 CRITICAL
An issue was discovered in AODDriver2.sys in AMD OverDrive. The vulnerable driver exposes a wrmsr instruction via IOCTL 0x81112ee0 and does not properly filter the Model Specific Register (MSR). Allowing arbitrary MSR writes can lead to Ring-0 code execution and escalation of privileges.
CVE-2020-12967 1 Amd 65 Epyc 7232p, Epyc 7251, Epyc 7252 and 62 more 2021-05-25 9.0 HIGH 7.2 HIGH
The lack of nested page table protection in the AMD SEV/SEV-ES feature could potentially lead to arbitrary code execution within the guest VM if a malicious administrator has access to compromise the server hypervisor.
CVE-2021-26311 1 Amd 65 Epyc 7232p, Epyc 7251, Epyc 7252 and 62 more 2021-05-25 9.0 HIGH 7.2 HIGH
In the AMD SEV/SEV-ES feature, memory can be rearranged in the guest address space that is not detected by the attestation mechanism which could be used by a malicious hypervisor to potentially lead to arbitrary code execution within the guest VM if a malicious administrator has access to compromise the server hypervisor.
CVE-2020-12912 1 Amd 1 Energy Driver For Linux 2020-12-02 2.1 LOW 5.5 MEDIUM
A potential vulnerability in the AMD extension to Linux "hwmon" service may allow an attacker to use the Linux-based Running Average Power Limit (RAPL) interface to show various side channel attacks. In line with industry partners, AMD has updated the RAPL interface to require privileged access.
CVE-2020-12927 1 Amd 1 Vbios Flash Tool Software Development Kit 2020-11-30 7.2 HIGH 7.8 HIGH
A potential vulnerability in a dynamically loaded AMD driver in AMD VBIOS Flash Tool SDK may allow any authenticated user to escalate privileges to NT authority system.
CVE-2020-12926 1 Amd 1 Trusted Platform Modules Reference 2020-11-30 4.4 MEDIUM 6.4 MEDIUM
The Trusted Platform Modules (TPM) reference software may not properly track the number of times a failed shutdown happens. This can leave the TPM in a state where confidential key material in the TPM may be able to be compromised. AMD believes that the attack requires physical access of the device because the power must be repeatedly turned on and off. This potential attack may be used to change confidential information, alter executables signed by key material in the TPM, or create a denial of service of the device.
CVE-2020-12911 1 Amd 1 Atikmdag.sys 2020-10-22 4.9 MEDIUM 5.5 MEDIUM
A denial of service vulnerability exists in the D3DKMTCreateAllocation handler functionality of AMD ATIKMDAG.SYS (e.g. version 26.20.15029.27017). A specially crafted D3DKMTCreateAllocation API request can cause an out-of-bounds read and denial of service (BSOD). This vulnerability can be triggered from a non-privileged account.
CVE-2020-12933 1 Amd 1 Atikmdag.sys 2020-10-21 4.9 MEDIUM 5.5 MEDIUM
A denial of service vulnerability exists in the D3DKMTEscape handler functionality of AMD ATIKMDAG.SYS (e.g. version 26.20.15029.27017). A specially crafted D3DKMTEscape API request can cause an out-of-bounds read in Windows OS kernel memory area. This vulnerability can be triggered from a non-privileged account.
CVE-2018-8930 1 Amd 8 Epyc Server, Epyc Server Firmware, Ryzen and 5 more 2020-08-24 9.3 HIGH 9.0 CRITICAL
The AMD EPYC Server, Ryzen, Ryzen Pro, and Ryzen Mobile processor chips have insufficient enforcement of Hardware Validated Boot, aka MASTERKEY-1, MASTERKEY-2, and MASTERKEY-3.
CVE-2020-6100 1 Amd 1 Radeon Directx 11 Driver Atidxx64.dll 2020-07-24 6.5 MEDIUM 9.9 CRITICAL
An exploitable memory corruption vulnerability exists in AMD atidxx64.dll 26.20.15019.19000 graphics driver. A specially crafted pixel shader can cause memory corruption vulnerability. An attacker can provide a specially crafted shader file to trigger this vulnerability. This vulnerability potentially could be triggered from guest machines running virtualization environments (ie. VMware, qemu, VirtualBox etc.) in order to perform guest-to-host escape - as it was demonstrated before (TALOS-2018-0533, TALOS-2018-0568, etc.). Theoretically this vulnerability could be also triggered from web browser (using webGL and webassembly). This vulnerability was triggered from HYPER-V guest using RemoteFX feature leading to executing the vulnerable code on the HYPER-V host (inside of the rdvgm.exe process).
CVE-2020-6101 1 Amd 1 Radeon Directx 11 Driver Atidxx64.dll 2020-07-24 6.5 MEDIUM 9.9 CRITICAL
An exploitable code execution vulnerability exists in the Shader functionality of AMD Radeon DirectX 11 Driver atidxx64.dll 26.20.15019.19000. An attacker can provide a specially crafted shader file to trigger this vulnerability, resulting in code execution. This vulnerability can be triggered from a HYPER-V guest using the RemoteFX feature, leading to executing the vulnerable code on the HYPER-V host (inside of the rdvgm.exe process). Theoretically this vulnerability could be also triggered from web browser (using webGL and webassembly).
CVE-2020-6103 1 Amd 1 Radeon Directx 11 Driver Atidxx64.dll 2020-07-24 6.5 MEDIUM 9.9 CRITICAL
An exploitable code execution vulnerability exists in the Shader functionality of AMD Radeon DirectX 11 Driver atidxx64.dll 26.20.15019.19000. An attacker can provide a a specially crafted shader file to trigger this vulnerability, resulting in code execution. This vulnerability can be triggered from a HYPER-V guest using the RemoteFX feature, leading to executing the vulnerable code on the HYPER-V host (inside of the rdvgm.exe process). Theoretically this vulnerability could be also triggered from web browser (using webGL and webassembly).
CVE-2020-8950 2 Amd, Microsoft 2 User Experience Program, Windows 2020-02-19 7.2 HIGH 7.8 HIGH
The AUEPLauncher service in Radeon AMD User Experience Program Launcher through 1.0.0.1 on Windows allows elevation of privilege by placing a crafted file in %PROGRAMDATA%\AMD\PPC\upload and then creating a symbolic link in %PROGRAMDATA%\AMD\PPC\temp that points to an arbitrary folder with an arbitrary file name.