AMD Graphics Driver Vulnerabilities – February 2025 

AMD ID:   AMD-SB-6008
Potential Impact: Varies by CVE, see descriptions below
Severity: Varies by CVE, see descriptions below

Summary

AMD received reports of vulnerabilities potentially affecting some AMD Graphics products.  Refer to the CVE Details section for information about each CVE.

CVE Details 

Refer to Glossary for explanation of terms

CVE

CVSS Score

CVE Description

CVE-2024-21971

5.5 (Medium)

AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

Improper input validation in AMD Crash Defender could allow an attacker to provide the Windows® system process ID to a kernel-mode driver, resulting in an operating system crash, potentially leading to denial of service.

CVE-2023-20508

5.0 (Medium)

AV:L/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:L

Improper access control in the ASP could allow a privileged attacker to perform an out-of-bounds write to a memory location not controlled by the attacker, potentially leading to loss of confidentiality, integrity, or availability.

Affected Products and Mitigation

AMD recommends updating to the AMD graphics driver version (or later) indicated below. 

Graphics Cards

Platform

Applicable CVE(s)

CVSS Score

Mitigation

AMD Radeon™ RX 5000 Series Graphics Products
AMD Radeon™ PRO W5000 Series Graphics Products

CVE-2024-21971

5.5 (Medium)

AMD Software: Adrenalin Edition 24.7.1 (24.10.29.01)
Or
AMD Software: PRO Edition 24.Q2 (24.10.20)

CVE-2023-20508

5.0 (Medium)

Not affected

AMD Radeon™ RX 6000 Series Graphics Products
AMD Radeon™ PRO W6000 Series Graphics Products

CVE-2024-21971

5.5 (Medium)

Not affected

CVE-2023-20508

5.0 (Medium)

AMD Software: Adrenalin Edition 24.7.1 (24.10.29.01)
Or
AMD Software: PRO Edition 24.Q2 (24.10.20)
AMD Radeon™ RX 7000 Series Graphics Products
AMD Radeon™ PRO W7000 Series Graphics Products

 

CVE-2024-21971

 

5.5 (Medium)

AMD Software: Adrenalin Edition 24.7.1 (24.10.29.01)
Or
AMD Software: PRO Edition 24.Q2 (24.10.20)

CVE-2023-20508

5.0 (Medium)

Not affected

AMD Radeon™ VIIMD Radeon™ PRO VII

CVE-2024-21971

5.5 (Medium)

AMD Software: Adrenalin Edition 24.7.1 (23.19.16)
Or
AMD Software: PRO Edition 24.Q2 (23.19.16.01)
Not affected

CVE-2023-20508

5.0 (Medium)

Data Center Graphics 

Platform

Applicable CVE(s)

CVSS Score

Mitigation

AMD Radeon™ Instinct™ MI25

 

CVE-2024-21971

5.5 (Medium)

Contact your AMD Customer
Engineering representative

CVE-2023-20508

5.0 (Medium)

AMD Radeon™ PRO V520

 

CVE-2024-21971

5.5 (Medium)

CVE-2023-20508

5.0 (Medium)

AMD Radeon™ PRO V620

 

CVE-2024-21971

5.5 (Medium)

CVE-2023-20508

5.0 (Medium)

Mi Series

Applicable CVE(s)

CVSS Score

MI-50

MI-100

MI-200

MI300X

CVE-2024-21971

5.5 (Medium)

Not affected

Not affected

Not affected

Not affected

CVE-2023-20508

5.0 (Medium)

Not affected

Not affected

Not affected

BKC 24.12

Client

For customers using the platform/codenames processors below, please update drivers to the applicable version noted.

CVE

AMD Ryzen™ 5000 Series Desktop Processor with Radeon™ Graphics
(Formerly codenamed)
“Cezanne” AM4
AMD Athlon™ 3000 Series Desktop Processors with Radeon™ Graphics
(Formerly codenamed)
“Picasso” AM4
AMD Athlon™ 3000 Series Mobile
Processors with Radeon™ Graphics
(Formerly codenamed)
“Dali”/”Dali” FP5
AMD Athlon™ 3000 Series Mobile
Processors with Radeon™ Graphics
(Formerly codenamed)
“Pollock”
AMD Ryzen™ 5000 Series Desktop Processors
(Formerly codenamed)
“Vermeer” AM4

CVE-2024-21971

5.5 (Medium)

AMD Software: Adrenalin Edition 24.7.1 (24.10.29.01)
Or
AMD Software: PRO Edition 24.Q2 (24.10.20)
AMD Software: Adrenalin Edition
24.7.1 (24.10.29.01)
Or
AMD Software: PRO Edition 24.Q2 (24.10.20)
AMD Software: Adrenalin Edition 24.7.1 (24.10.29.01)
Or
AMD Software: PRO Edition 24.Q2 (24.10.20)
AMD Software: Adrenalin Edition 24.7.1 (24.10.29.01)
OrAMD Software: PRO Edition 24.Q2 (24.10.20)
 

AMD Software: Adrenalin Edition 24.7.1 (24.10.29.01)

Or

AMD Software: PRO Edition 24.Q2 (24.10.20)

CVE-2023-20508

5.0 (Medium)

Not affected

Not affected

Not affected

Not affected

Not affected

 

CVE

AMD Ryzen™ 3000 Series Mobile Processor with Radeon™ Graphics
(Formerly codenamed)
“Picasso” FP5
AMD Ryzen™ 5000 Series Mobile Processors with Radeon™ Graphics
(Formerly codenamed)
“Lucienne” FP6
AMD Ryzen™ 5000 Series Mobile Processors with Radeon™ Graphics
(Formerly codenamed)
“Cezanne” FP6
AMD Ryzen™ 4000 Series Mobile Processors with Radeon™ Graphics
(Formerly codenamed)
“Renoir” FP6

AMD Ryzen™ 7020 Series Processors with Radeon™ Graphics
(Formerly codenamed)
“Mendocino” FT6

 

CVE-2024-21971

5.5 (Medium)

AMD Software: Adrenalin Edition 24.7.1 (24.10.29.01)
Or
AMD Software: PRO Edition 24.Q2 (24.10.20)
AMD Software: Adrenalin Edition 24.7.1 (24.10.29.01)
Or
AMD Software: PRO Edition 24.Q2 (24.10.20)
AMD Software: Adrenalin Edition 24.7.1 (24.10.29.01)
Or
AMD Software: PRO Edition 24.Q2 (24.10.20)
AMD Software: Adrenalin Edition
24.7.1 (24.10.29.01)
Or
AMD Software: PRO Edition 24.Q2 (24.10.20)
AMD Software: Adrenalin Edition
24.7.1 (24.10.29.01)
Or
AMD Software: PRO Edition 24.Q2 (24.10.20)

CVE-2023-20508

5.0 (Medium)

Not affected

Not affected

Not affected

Not affected

Not affected

 

CVE

AMD Ryzen™ 4000 Series Desktop Processor with Radeon™ Graphics
(Formerly codenamed)
“Renoir” AM4
AMD Ryzen™ 8000 Series Processor with Radeon™ Graphics
(Formerly codenamed)
“Phoenix” AM5
AMD Ryzen™ 6000 Series Processor with Radeon™ Graphics
(Formerly codenamed)
"Rembrandt" FP7
AMD Ryzen™ 7035 Series Processor with Radeon™ Graphics
(Formerly codenamed)
“Rembrandt R”

CVE-2024-21971

5.5 (Medium)

AMD Software: Adrenalin Edition 24.7.1 (24.10.29.01)
Or
AMD Software: PRO Edition 24.Q2 (24.10.20)
AMD Software: Adrenalin Edition 24.7.1 (24.10.29.01)
Or
AMD Software: PRO Edition 24.Q2 (24.10.20)
AMD Software: Adrenalin Edition 24.7.1 (24.10.29.01)
Or
AMD Software: PRO Edition 24.Q2 (24.10.20)
AMD Software: Adrenalin Edition 24.7.1 (24.10.29.01)
Or
AMD Software: PRO Edition 24.Q2 (24.10.20)

CVE-2023-20508

5.0 (Medium)

Not affected

Not affected

Not affected

Not affected

 

CVE

AMD Ryzen™ 5000 Series Processors with Radeon™ Graphics
(Formerly codenamed)
“Barcelo” FP6

 

AMD Ryzen™ 7030 Series Processors with Radeon™ Graphics
(Formerly codenamed)
“Barcelo R” FP6
AMD Ryzen™ 7040 Series Processors with Radeon™ Graphics
(Formerly codenamed)
“Phoenix”
FP7/FP7r2/FP8
AMD Ryzen™ 7000 Series Desktop Processors
(Formerly codenamed)
“Raphael” X3D
AMD Ryzen™ 7045 Series Mobile Processors
(Formerly codenamed)
“Dragon Range” FL1

CVE-2024-21971

5.5 (Medium)

AMD Software: Adrenalin Edition 24.7.1 (24.10.29.01)
Or
AMD Software: PRO Edition 24.Q2 (24.10.20)

 

AMD Software: Adrenalin Edition 24.7.1 (23.19.16)
Or
AMD Software: PRO Edition 24.Q2 (23.19.16.01)

AMD Software: Adrenalin Edition 24.7.1 (24.10.29.01)
Or
AMD Software: PRO Edition 24.Q2 (24.10.20)

 

AMD Software: Adrenalin Edition 24.7.1 (24.10.29.01)
Or
AMD Software: PRO Edition 24.Q2 (24.10.20)

AMD Software: Adrenalin Edition 24.7.1 (24.10.29.01)
Or
AMD Software: PRO Edition 24.Q2 (24.10.20)

 

CVE-2023-20508

5.0 (Medium)

Not affected

Not affected

Not affected

Not affected

Not affected

Embedded Processors

For customer using the platform processors below, please update drivers to the applicable version noted.

CVE

 

AMD RyzenTM Embedded R1000

AMD RyzenTM Embedded R2000

 

AMD RyzenTM Embedded 7000

 

CVE-2024-21971

5.5 (Medium)

24.10.21.01
23.19.16

CVE-2023-20508

5.0 (Medium)

Not affected

Not affected

Not affected

 

 

CVE

AMD RyzenTM Embedded V1000

 

AMD RyzenTM Embedded V2000

AMD RyzenTM Embedded V3000

All V1000 OPNs excluding YE1500C4T4MFH

 

 

YE1500C4T4MFH

CVE-2024-21971

5.5 (Medium)

24.10.21.01
23.19.16

CVE-2023-20508

5.0 (Medium)

Not affected

Not affected

Not affected

Not affected

Acknowledgement

AMD thanks the following for reporting these issues and engaging in coordinated vulnerability disclosure:
Michael Rowley: CVE-2024-21971
Internally found: CVE-2023-20508 

Revisions 

Revision Date  

Description  

2025-03-21

Updated driver version for AMD Ryzen™ 7030 Series Processors with Radeon™ Graphics (formerly codenamed “Barcelo-R”)

2025-02-11

Initial publication  

DISCLAIMER

The information contained herein is for informational purposes only and is subject to change without notice. While every precaution has been taken in the preparation of this document, it may contain technical inaccuracies, omissions and typographical errors, and AMD is under no obligation to update or otherwise correct this information. Advanced Micro Devices, Inc. makes no representations or warranties with respect to the accuracy or completeness of the contents of this document, and assumes no liability of any kind, including the implied warranties of noninfringement, merchantability or fitness for particular purposes, with respect to the operation or use of AMD hardware, software or other products described herein. Any computer system has risks of security vulnerabilities that cannot be completely prevented or mitigated. No license, including implied or arising by estoppel, to any intellectual property rights is granted by this document. Terms and limitations applicable to the purchase or use of AMD’s products are as set forth in a signed agreement between the parties or in AMD's Standard Terms and Conditions of Sale.

AMD, the AMD Arrow logo, EPYC and combinations thereof are trademarks of Advanced Micro Devices, Inc. CVE and the CVE logo are registered trademarks of The MITRE Corporation. Other product names used in this publication are for identification purposes only and may be trademarks of their respective companies.

Third party content may be licensed to you directly by the third party that owns the content and is not licensed to you by AMD. ALL LINKED THIRD-PARTY CONTENT IS PROVIDED ‘AS IS’ WITHOUT A WARRANTY OF ANY KIND. USE OF SUCH THIRD-PARTY CONTENT IS DONE AT YOUR SOLE DISCRETION AND UNDER NO CIRCUMSTANCES WILL AMD BE LIABLE TO YOU FOR ANY THIRD-PARTY CONTENT. YOU ASSUME ALL RISK AND ARE SOLELY RESPONSIBILITY FOR ANY DAMAGES THAT MAY ARISE FROM YOUR USE OF THIRD-PARTY CONTENT.

© 2025 Advanced Micro Devices, Inc. All rights reserved.