Improper Input Validation in AMD Radeon Graphics Driver
CVE-2023-31320

7.5HIGH

Summary

An improper input validation vulnerability exists in the AMD Radeon Graphics display driver, which could potentially allow an attacker to exploit the system. This exploitation may lead to a corruption of the display output, thereby resulting in a denial of service condition. Users and administrators should ensure they are using the latest version of the driver and apply any recommended patches to safeguard their systems.

Affected Version(s)

Radeon™ PRO W5000/W6000/W7000 Series Graphics Cards x86 various

Radeon™ PRO WX Vega Series Graphics Cards x86 various

Radeon™ RX 5000/6000/7000 Series Graphics Cards x86 various

Exploit Proof of Concept (PoC)

PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.

References

CVSS V3.1

Score:
7.5
Severity:
HIGH
Confidentiality:
None
Integrity:
None
Availability:
None
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • 🟡

    Public PoC available

  • 👾

    Exploit known to exist

  • Vulnerability Reserved

.