Home

Description

Insufficient parameter sanitization in AMD Secure Processor (ASP) TEE SOC Driver could allow an attacker to issue a malformed DRV_SOC_CMD_ID_LOAD_GFX_IP_FW SR-IOV command to cause out-of-bounds read, potentially resulting in SOC Driver memory contents exposure or an exception

PUBLISHED Reserved 2025-12-06 | Published 2026-05-15 | Updated 2026-05-15 | Assigner AMD




MEDIUM: 4.6CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:L/VI:N/VA:L/SC:N/SI:N/SA:N

Problem types

CWE-125 Out-of-bounds Read

Product status

Default status
affected

AMD Software: Adrenalin Edition 25.12.1 (25.10.37.01)
unaffected

Default status
affected

AMD Software: Adrenalin Edition 25.11.1 (25.20.29.01)
unaffected

Default status
affected

AMD Software: PRO Edition 25.Q4 (25.10.37.01)
unaffected

Default status
affected

AMD Software: PRO Edition 25.Q3.1 (25.10.32)
unaffected

Default status
affected

ROCm 7.0
unaffected

Default status
affected

ROCm 7.0
unaffected

Default status
affected

ROCm 6.3.1
unaffected

Default status
affected

ROCm 6.3.1
unaffected

Default status
affected

ROCm 6.4.2
unaffected

Default status
affected

BKC 26 (ROCm 7.0.1)
unaffected

Default status
affected

Contact your AMD Customer Engineering representative
unaffected

Default status
affected

Contact your AMD Customer Engineering representative
unaffected

Default status
affected

Contact your AMD Customer Engineering representative
unaffected

References

www.amd.com/...es/product-security/bulletin/AMD-SB-6027.html

cve.org (CVE-2025-66664)

nvd.nist.gov (CVE-2025-66664)

Download JSON