Improper removal of sensitive information before storage or transfer in AMD Crash Defender could allow an attacker to obtain kernel address information potentially resulting in loss of confidentiality.
Improper removal of sensitive information before storage or transfer in AMD Crash Defender could allow an attacker to obtain kernel address information potentially resulting in loss of confidentiality.
| Vendor | Product | Versions |
|---|---|---|
| AMD | AMD Ryzen™ 8000 Series Desktop Processors | AMD Software: Adrenalin Edition 24.10.1 (24.20.19.01), AMD Software: PRO Edition 24.Q4 (24.20.30) |
| AMD | AMD Ryzen™ 7040 Series Mobile Processors with Radeon™ Graphics | AMD Software: Adrenalin Edition 24.10.1 (24.20.19.01), AMD Software: PRO Edition 24.Q4 (24.20.30) |
| AMD | AMD Ryzen™ 6000 Series Processor with Radeon™ Graphics | AMD Software: Adrenalin Edition 24.10.1 (24.20.19.01), AMD Software: PRO Edition 24.Q4 (24.20.30) |
| AMD | AMD Ryzen™ 7035 Series Processor with Radeon™ Graphics | AMD Software: Adrenalin Edition 24.10.1 (24.20.19.01), AMD Software: PRO Edition 24.Q4 (24.20.30) |
| AMD | AMD Ryzen™ 7020 Series Processors with Radeon™ Graphics | AMD Software: Adrenalin Edition 24.10.1 (24.20.19.01), AMD Software: PRO Edition 24.Q4 (24.20.30) |
| AMD | AMD Ryzen™ 7000 Series Mobile Processors | AMD Software: Adrenalin Edition 24.10.1 (24.20.19.01), AMD Software: PRO Edition 24.Q4 (24.20.30) |
| AMD | AMD Ryzen™ Z1 Series Processors | AMD Software: Adrenalin Edition 24.10.1 (24.20.19.01), AMD Software: PRO Edition 24.Q4 (24.20.30) |
| AMD | AMD Ryzen™ Embedded 7000 Series Processors | whql-amd-software-adrenalin-edition-25.6.1-win10-win11-june5-rdna.exe |
| AMD | AMD Ryzen™ Embedded V2000 Series Processors | 250306a-415645C.zip |
| AMD | AMD Ryzen™ Embedded 8000 Series Processors | whql-amd-software-adrenalin-edition-25.6.1-win10-win11-june5-rdna.exe |
| AMD | AMD Radeon™ RX 5000 Series Graphics Products | AMD Software: Adrenalin Edition 24.10.1 (24.20.19.01) |
| AMD | AMD Radeon™ PRO W5000 Series Graphics Products | AMD Software: PRO Edition 24.Q4 (24.20.30) |
| AMD | AMD Radeon™ RX 6000 Series Graphics Products | AMD Software: Adrenalin Edition 24.10.1 (24.20.19.01) |
| AMD | AMD Radeon™ PRO W6000 Series Graphics Products | AMD Software: PRO Edition 24.Q4 (24.20.30) |
| AMD | AMD Radeon™ RX 7000 Series Graphics Products | AMD Software: Adrenalin Edition 24.10.1 (24.20.19.01) |
| AMD | AMD Radeon™ PRO W7000 Series Graphics Products | AMD Software: PRO Edition 24.Q4 (24.20.30) |
| AMD | AMD Radeon™ PRO V520 Graphics Products | Contact your AMD Customer Engineering representative |
| AMD | AMD Radeon™ PRO V620 Graphics Products | Contact your AMD Customer Engineering representative |
| AMD | AMD Radeon™ PRO V710 Graphics Products | Contact your AMD Customer Engineering representative |
Not currently listed on the CISA Known Exploited Vulnerabilities (KEV) catalog. EPSS is the best forward-looking signal — see the EPSS row above.
For the full vendor write-up, exploit chains, and reference implementations, see the references list in section 09.
Open the Sigma generator with a pre-filled prompt for this CVE to draft a starting detection in your stack of choice:
No directly-cited follow-up CVEs in the KB record for this advisory. The references list in section 09 carries the vendor cross-references.