Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-0034: CWE-787 Out-of-bounds Write in AMD AMD Instinct™ MI300X

0
Medium
VulnerabilityCVE-2025-0034cvecve-2025-0034cwe-787
Published: Sat Sep 06 2025 (09/06/2025, 18:35:44 UTC)
Source: CVE Database V5
Vendor/Project: AMD
Product: AMD Instinct™ MI300X

Description

Insufficient parameter sanitization in TEE SOC Driver could allow an attacker to issue a malformed DRV_SOC_CMD_ID_SRIOV_SPATIAL_PART and cause read or write past the end of allocated arrays, potentially resulting in a loss of platform integrity or denial of service.

AI-Powered Analysis

AILast updated: 09/15/2025, 00:48:27 UTC

Technical Analysis

CVE-2025-0034 is a medium-severity vulnerability identified in the AMD Instinct™ MI300X accelerator, specifically within the Trusted Execution Environment (TEE) System on Chip (SOC) driver. The vulnerability arises due to insufficient parameter sanitization when processing the DRV_SOC_CMD_ID_SRIOV_SPATIAL_PART command. This flaw allows an attacker with high privileges and local access to issue a malformed command that triggers an out-of-bounds write or read operation beyond the allocated array boundaries. Such memory corruption can lead to a loss of platform integrity or cause a denial of service (DoS) by crashing or destabilizing the affected system. The vulnerability is classified under CWE-787 (Out-of-bounds Write), indicating a memory safety issue. Exploitation requires local access with high privileges and no user interaction, and the attack complexity is high, as reflected in the CVSS vector (AV:L/AC:H/PR:H/UI:N). No known exploits are currently reported in the wild, and no patches have been linked yet. The affected product, AMD Instinct™ MI300X, is a high-performance GPU accelerator used primarily in data centers and high-performance computing environments, often deployed in servers handling critical workloads.

Potential Impact

For European organizations, especially those operating data centers, research institutions, and enterprises relying on AMD Instinct MI300X accelerators for AI, machine learning, or HPC workloads, this vulnerability poses a risk to system stability and platform integrity. An attacker exploiting this flaw could cause denial of service conditions, potentially disrupting critical computational tasks and services. While the vulnerability does not directly compromise confidentiality, the integrity of computations and availability of services could be impacted, leading to operational downtime and potential loss of trust in computational results. Given the high privilege and local access requirements, the threat is more relevant in environments where multiple users or tenants share hardware resources, such as cloud providers or multi-tenant HPC clusters. The lack of known exploits reduces immediate risk, but the potential for future exploitation necessitates proactive mitigation.

Mitigation Recommendations

European organizations should implement strict access controls to limit local high-privilege access to systems running AMD Instinct MI300X accelerators. Employing robust user and process isolation mechanisms can reduce the risk of unauthorized command issuance. Monitoring and auditing of driver-level commands and system logs may help detect anomalous activities related to DRV_SOC_CMD_ID_SRIOV_SPATIAL_PART usage. Organizations should engage with AMD for timely updates and patches once available and plan for prompt deployment. Additionally, adopting hardware and software integrity verification tools can help detect memory corruption or instability early. For multi-tenant environments, consider isolating workloads to minimize the risk of privilege escalation or lateral movement. Finally, maintaining up-to-date system firmware and drivers reduces exposure to known vulnerabilities.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
AMD
Date Reserved
2024-11-21T16:18:00.569Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68bc809c209f30cfade91150

Added to database: 9/6/2025, 6:42:36 PM

Last enriched: 9/15/2025, 12:48:27 AM

Last updated: 10/19/2025, 10:51:55 AM

Views: 60

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats