Skip to main content

CVE-2025-0010: CWE-787 Out-of-bounds Write in AMD AMD Radeon™ RX 5000 Series Graphics Products

Medium
VulnerabilityCVE-2025-0010cvecve-2025-0010cwe-787
Published: Sat Sep 06 2025 (09/06/2025, 18:26:15 UTC)
Source: CVE Database V5
Vendor/Project: AMD
Product: AMD Radeon™ RX 5000 Series Graphics Products

Description

An out of bounds write in the Linux graphics driver could allow an attacker to overflow the buffer potentially resulting in loss of confidentiality, integrity, or availability.

AI-Powered Analysis

AILast updated: 09/07/2025, 00:09:33 UTC

Technical Analysis

CVE-2025-0010 is a medium-severity vulnerability classified as CWE-787 (Out-of-bounds Write) affecting AMD Radeon™ RX 5000 Series Graphics Products, specifically in the Linux graphics driver. The vulnerability arises from an out-of-bounds write condition where an attacker can exploit a buffer overflow in the driver code. This flaw could allow an attacker with limited privileges (local access with low privileges) to write data beyond the intended buffer boundaries. The consequence of this buffer overflow could lead to corruption of adjacent memory, potentially resulting in loss of confidentiality, integrity, or availability of the system. The CVSS v3.1 base score is 6.1, reflecting that the attack vector is local (AV:L), requires low attack complexity (AC:L), low privileges (PR:L), and user interaction (UI:R). The scope is unchanged (S:U), and the impact on confidentiality and integrity is low, but availability impact is high. No known exploits are currently reported in the wild, and no patches or fixes have been linked yet. This vulnerability is relevant for Linux systems using AMD Radeon RX 5000 Series GPUs, which are common in workstations and some servers, especially in graphics-intensive or compute workloads. The vulnerability could be leveraged by a local attacker or malicious user to cause denial of service or potentially escalate privileges by corrupting kernel or driver memory structures.

Potential Impact

For European organizations, this vulnerability poses a risk primarily to systems running Linux with AMD Radeon RX 5000 Series GPUs. Such systems are often found in engineering, design, scientific research, and media production environments. The potential impact includes system crashes or denial of service, which could disrupt critical workflows. Additionally, the possibility of memory corruption could be leveraged for privilege escalation or data leakage, threatening confidentiality and integrity of sensitive information. Organizations in sectors like manufacturing, automotive design, media production, and research institutions that rely on these GPUs for compute or rendering tasks may face operational disruptions. Since exploitation requires local access and user interaction, the threat is more significant in environments where multiple users share systems or where endpoint security is weak. The lack of known exploits reduces immediate risk, but the medium severity and potential for availability impact warrant proactive mitigation.

Mitigation Recommendations

To mitigate this vulnerability, European organizations should: 1) Monitor AMD and Linux distribution security advisories closely for patches or driver updates addressing CVE-2025-0010 and apply them promptly once available. 2) Restrict local access to systems with affected GPUs by enforcing strict user account controls and limiting physical and remote access to trusted personnel only. 3) Employ endpoint protection solutions that can detect anomalous behavior or attempts to exploit driver vulnerabilities. 4) Implement application whitelisting and user privilege management to reduce the risk of malicious user interaction required for exploitation. 5) Regularly audit and harden Linux kernel and driver configurations to minimize attack surface. 6) Consider isolating critical workloads from users who do not require direct access to GPU resources. 7) Maintain comprehensive logging and monitoring to detect any unusual system behavior indicative of exploitation attempts.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
AMD
Date Reserved
2024-10-10T20:27:46.721Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68bccd0da2c363fb16078f99

Added to database: 9/7/2025, 12:08:45 AM

Last enriched: 9/7/2025, 12:09:33 AM

Last updated: 9/8/2025, 6:22:44 AM

Views: 7

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats