SARA / Free Tools / CVE / CVE-2024-36319

CVE-2024-36319 — Debug code left active in AMD's Video Decoder Engine Firmware (VCN FW) could all

Debug code left active in AMD's Video Decoder Engine Firmware (VCN FW) could allow a attacker to submit a maliciously crafted command causing the VCN FW to perform read/writes HW registers, potentially impacting confidentiality, integrity and availabilability of the system.

CVSS
6.3 MEDIUM
EPSS
1.00% (top 98.50%)
CWE
CWE-1191
Published
2026-02-12T17:41:06.194Z
Last modified
2026-02-26T14:44:20.866Z
CVSS vector
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:H/SI:H/SA:H

01What is this vulnerability?

Debug code left active in AMD's Video Decoder Engine Firmware (VCN FW) could allow a attacker to submit a maliciously crafted command causing the VCN FW to perform read/writes HW registers, potentially impacting confidentiality, integrity and availabilability of the system.

02Affected products

VendorProductVersions
AMD / AMD Ryzen™ 7040 Series Mobile Processors with Radeon™ Graphics;
AMD Ryzen™ 8040 Series Mobile Processors with Radeon™ Graphics — AMD Software: Adrenalin Edition 25.5.1, AMD Software: PRO Edition 25.Q2
AMDAMD Ryzen™ AI MAX Series ProcessorsAMD Software: Adrenalin Edition 25.5.1, AMD Software: PRO Edition 25.Q2
AMDAMD Ryzen™ AI 300 Series ProcessorsAMD Software: Adrenalin Edition 25.5.1, AMD Software: PRO Edition 25.Q2
AMDAMD Ryzen™ 8000 Series Desktop ProcessorsAMD Software: Adrenalin Edition 25.5.1, AMD Software: PRO Edition 25.Q2
AMDAMD Ryzen™ Embedded 8000 Series ProcessorsQ2 - 2025 AMD Embedded Ryzen[7000 8000 9000] Windows® Catalyst™ driver [25.6.1] (68926)
AMDAMD Ryzen™ Embedded 7000 Series ProcessorsQ2 - 2025 AMD Embedded Ryzen[7000 8000 9000] Windows® Catalyst™ driver [25.6.1] (68926)
AMDAMD Ryzen™ Embedded 9000 Series ProcessorsQ2 - 2025 AMD Embedded Ryzen[7000 8000 9000] Windows® Catalyst™ driver [25.6.1] (68926)
AMDAMD Radeon™ RX 7000 Series Graphics Products25.5.1 (25.10.01.09), AMD Software: PRO Edition 25.Q2(25.10.10), Radeon Software For Linux 25.10.1
AMDAMD Radeon™ PRO W7000 Series Graphics Products25.5.1 (25.10.01.09), AMD Software: PRO Edition 25.Q2(25.10.10), Radeon Software For Linux 25.10.1
AMDAMD Instinct™ MI300XROCm 6.2.4
AMDAMD Instinct™ MI300AROCm 6.2.4
AMDAMD Instinct™ MI308XROCm 6.2.4
AMDAMD Instinct™ MI325XROCm 6.2.4
AMDAMD Radeon™ PRO V710Contact your AMD Customer Engineering representative

03Active exploitation status

Not currently listed on the CISA Known Exploited Vulnerabilities (KEV) catalog. EPSS is the best forward-looking signal — see the EPSS row above.

04Recommended remediation

05Technical details

For the full vendor write-up, exploit chains, and reference implementations, see the references list in section 09.

06Detection signatures

Open the Sigma generator with a pre-filled prompt for this CVE to draft a starting detection in your stack of choice:

Open in Sigma generator →

07Related CVEs

No directly-cited follow-up CVEs in the KB record for this advisory. The references list in section 09 carries the vendor cross-references.

08Timeline

09References

Want this in your SOAR or SIEM?
SARA's API returns EPSS, CVSS, KEV, and an analyst-grade summary in one call.
Read the API reference →