AMD VCN FW Debug Code Enables HW Register R/W Exploit
CVE-2024-36319 Published on February 12, 2026

Debug code left active in AMD's Video Decoder Engine Firmware (VCN FW) could allow a attacker to submit a maliciously crafted command causing the VCN FW to perform read/writes HW registers, potentially impacting confidentiality, integrity and availabilability of the system.

NVD

Weakness Type

Exposed Chip Debug and Test Interface With Insufficient or Missing Authorization

The chip does not implement or does not correctly check whether users are authorized to access internal registers.


Affected Versions

AMD Ryzen™ 7040 Series Mobile Processors with Radeon™ Graphics; AMD Ryzen™ 8040 Series Mobile Processors with Radeon™ Graphics: AMD Ryzen™ AI MAX Series Processors: AMD Ryzen™ AI 300 Series Processors: AMD Ryzen™ 8000 Series Desktop Processors: AMD Ryzen™ Embedded 8000 Series Processors: AMD Ryzen™ Embedded 7000 Series Processors: AMD Ryzen™ Embedded 9000 Series Processors: AMD Radeon™ RX 7000 Series Graphics Products: AMD Radeon™ PRO W7000 Series Graphics Products: AMD Instinct™ MI300X: AMD Instinct™ MI300A: AMD Instinct™ MI308X: AMD Instinct™ MI325X: AMD Radeon™ PRO V710:

Exploit Probability

EPSS
0.01%
Percentile
1.62%

EPSS (Exploit Prediction Scoring System) scores estimate the probability that a vulnerability will be exploited in the wild within the next 30 days. The percentile shows you how this score compares to all other vulnerabilities.