Improper input validation in AMD Graphics Driver could allow an attacker to supply a specially crafted pointer, potentially leading to arbitrary code execution.
Improper input validation in AMD Graphics Driver could allow an attacker to supply a specially crafted pointer, potentially leading to arbitrary code execution.
| Vendor | Product | Versions |
|---|---|---|
| — | AMD / AMD Ryzen™ 6000 Series Processors with Radeon™ Graphics; | — |
| — | AMD Ryzen™ 7035 Series Processors with Radeon™ Graphics — AMD Software: Adrenalin Edition 25.6.1 (25.10.13.01), AMD Software: PRO Edition 25.Q2 (25.10.10) | — |
| AMD | AMD Ryzen™ 7040 Series Mobile Processors with Radeon™ Graphics | AMD Software: Adrenalin Edition 25.6.1 (25.10.13.01), AMD Software: PRO Edition 25.Q2 (25.10.10) |
| AMD | AMD Ryzen™ 7020 Series Processors with Radeon™ Graphics | AMD Software: Adrenalin Edition 25.6.1 (25.10.13.01), AMD Software: PRO Edition 25.Q2 (25.10.10) |
| AMD | AMD Ryzen™ 7045 Series Mobile Processors with Radeon™ Graphics | AMD Software: Adrenalin Edition 25.6.1 (25.10.13.01), AMD Software: PRO Edition 25.Q2 (25.10.10) |
| — | AMD / AMD Ryzen™ 7000 Series Desktop Processors; | — |
| — | AMD Ryzen™ 8000 Series Desktop Processors; | — |
| — | AMD Ryzen™ 9000 Series Desktop Processors — AMD Software: Adrenalin Edition 25.6.1 (25.10.13.01), AMD Software: PRO Edition 25.Q2 (25.10.10) | — |
| AMD | AMD Ryzen™ 9000HX Series Mobile Processors (formerly codenamed "Fire Range") | AMD Software: Adrenalin Edition 25.6.1 (25.10.13.01), AMD Software: PRO Edition 25.Q2 (25.10.10) |
| AMD | AMD Ryzen™ Al Max+ | AMD Software: Adrenalin Edition 25.6.1 (25.10.13.01), AMD Software: PRO Edition 25.Q2 (25.10.10) |
| AMD | AMD Ryzen™ AI 300 Series Processors | AMD Software: Adrenalin Edition 25.6.1 (25.10.13.01), AMD Software: PRO Edition 25.Q2 (25.10.10) |
| AMD | AMD Ryzen™ 9000 Series Desktop Processors | AMD Software: Adrenalin Edition 25.6.1 (25.10.13.01), AMD Software: PRO Edition 25.Q2 (25.10.10) |
| AMD | AMD Ryzen™ 8000 Series Desktop Processors | AMD Software: Adrenalin Edition 25.6.1 (25.10.13.01), AMD Software: PRO Edition 25.Q2 (25.10.10) |
| AMD | AMD Ryzen™ Embedded 7000 Series Processors | Q2 - 2025 AMD Embedded Ryzen[7000 8000 9000] Windows® Catalyst™ driver [25.6.1] (68926) |
| AMD | AMD Ryzen™ Embedded 9000 Series Processors | Q2 - 2025 AMD Embedded Ryzen[7000 8000 9000] Windows® Catalyst™ driver [25.6.1] (68926) |
| AMD | AMD Ryzen™ Embedded 8000 Series Processors | Q2 - 2025 AMD Embedded Ryzen[7000 8000 9000] Windows® Catalyst™ driver [25.6.1] (68926) |
| AMD | AMD Radeon™ RX 5000 Series Graphics Products | AMD Software: Adrenalin Edition 25.6.1 (25.10.13.01), AMD Software: PRO Edition 25.Q2 (25.10.10) |
| AMD | AMD Radeon™ PRO W5000 Series Graphics Products | AMD Software: Adrenalin Edition 25.6.1 (25.10.13.01), AMD Software: PRO Edition 25.Q2 (25.10.10) |
| AMD | AMD Radeon™ RX 6000 Series Graphics Products | AMD Software: Adrenalin Edition 25.6.1 (25.10.13.01), AMD Software: PRO Edition 25.Q2 (25.10.10) |
| AMD | AMD Radeon™ PRO W6000 Series Graphics Products | AMD Software: Adrenalin Edition 25.6.1 (25.10.13.01), AMD Software: PRO Edition 25.Q2 (25.10.10) |
| AMD | AMD Radeon™ RX 7000 Series Graphics Products | AMD Software: Adrenalin Edition 25.6.1 (25.10.13.01), AMD Software: PRO Edition 25.Q2 (25.10.10) |
| AMD | AMD Radeon™ PRO W7000 Series Graphics Products | AMD Software: Adrenalin Edition 25.6.1 (25.10.13.01), AMD Software: PRO Edition 25.Q2 (25.10.10) |
| AMD | AMD Radeon™ RX 9000 Series Graphics Products | AMD Software: Adrenalin Edition 25.6.1 (25.10.13.01), AMD Software: PRO Edition 25.Q2 (25.10.10) |
| AMD | AMD Radeon™ PRO V520 | Contact your AMD Customer Engineering representative |
| AMD | AMD Radeon™ PRO V620 | Contact your AMD Customer Engineering representative |
| AMD | AMD Radeon™ PRO V710 | Contact your AMD Customer Engineering representative |
| AMD | V620/NV21 | hotfix5 |
Not currently listed on the CISA Known Exploited Vulnerabilities (KEV) catalog. EPSS is the best forward-looking signal — see the EPSS row above.
For the full vendor write-up, exploit chains, and reference implementations, see the references list in section 09.
Open the Sigma generator with a pre-filled prompt for this CVE to draft a starting detection in your stack of choice:
No directly-cited follow-up CVEs in the KB record for this advisory. The references list in section 09 carries the vendor cross-references.