Home
HIGH: 7.1 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:L/VI:H/VA:L/SC:L/SI:H/SA:LDefault status
affected
Cezanne-FP6 1.0.1.0
unaffected
Default status
affected
ComboAM5PI 1.0.0.a
unaffected
Default status
affected
ComboAM4v2 1.2.0.Ca
unaffected
Default status
affected
ComboAM4v2 1.2.0.Ca
unaffected
Default status
affected
PhoenixPI-FP8-FP7_1.1.0.0
unaffected
Default status
affected
Renoir-FP6 1.0.0.D
unaffected
Default status
affected
Rembrandt-FP7 1.0.0.A
unaffected
Default status
affected
MendocinoPI-FT6_1.0.0.6
unaffected
Default status
affected
DragonRangeFL1PI 1.0.0.3C
unaffected
Default status
affected
EmbeddedPI-FP6_1.0.0.9
unaffected
Default status
affected
Embedded-PI_FP7r2 1009
unaffected
Default status
affected
AMD Software: Adrenalin Edition 25.12.1 (25.10.37.01)
unaffected
Default status
affected
AMD Software: Adrenalin Edition 25.11.1 (25.20.29.01)
unaffected
Default status
affected
AMD Software: PRO Edition 25.Q3.1 (25.10.32)
unaffected
Default status
affected
AMD Software: PRO Edition 25.Q4 (25.10.37.01)
unaffected
Default status
affected
ROCm 6.4
unaffected
Default status
affected
ROCm 6.4
unaffected
Default status
affected
Contact your AMD Customer Engineering representative
unaffected
Description
Improperly preserved integrity of hardware configuration state during a power save/restore operation in the AMD Secure Processor (ASP) could allow an attacker with the ability to write outside the trusted memory range (TMR) to change the execution flow of the Video Core Next (VCN) firmware potentially impacting confidentiality, integrity, or availability.
Problem types
Product status
Cezanne-FP6 1.0.1.0
ComboAM5PI 1.0.0.a
ComboAM4v2 1.2.0.Ca
ComboAM4v2 1.2.0.Ca
PhoenixPI-FP8-FP7_1.1.0.0
Renoir-FP6 1.0.0.D
Rembrandt-FP7 1.0.0.A
MendocinoPI-FT6_1.0.0.6
DragonRangeFL1PI 1.0.0.3C
EmbeddedPI-FP6_1.0.0.9
Embedded-PI_FP7r2 1009
AMD Software: Adrenalin Edition 25.12.1 (25.10.37.01)
AMD Software: Adrenalin Edition 25.11.1 (25.20.29.01)
AMD Software: PRO Edition 25.Q3.1 (25.10.32)
AMD Software: PRO Edition 25.Q4 (25.10.37.01)
ROCm 6.4
ROCm 6.4
Contact your AMD Customer Engineering representative
References
www.amd.com/...es/product-security/bulletin/AMD-SB-4017.html
www.amd.com/...es/product-security/bulletin/AMD-SB-6027.html