CVE-2025-48518 – AMD Graphics Driver Vulnerabilities
“A vulnerable graphics driver can quietly open the door to system crashes, memory corruption, and privilege abuse. This update shuts that door before attackers can step through.”
This AMD graphics driver update addresses multiple security vulnerabilities affecting Radeon and Ryzen graphics platforms, including CVE-2021-26381 through CVE-2025-48518. These weaknesses exist in driver components responsible for memory management, system calls, and input validation. If exploited, they could allow a local attacker to corrupt kernel memory, execute unauthorized operations, or trigger denial-of-service conditions that destabilize affected systems.
One of the more recent issues, CVE-2025-48518, involves improper input validation that can lead to an out-of-bounds memory write, potentially allowing an attacker with local access to compromise system integrity or crash the system. This vulnerability carries a CVSS v3.x score of 6.9 (Medium).
Another notable issue, CVE-2021-26381, stems from improper system call parameter validation in the Trusted OS driver, which could allow a malicious driver to manipulate large memory mappings and cause kernel memory corruption. This vulnerability carries a CVSS v3.x score of 8.8 (High).
AMD addressed these vulnerabilities through updated driver releases and security mitigations across multiple Radeon and Ryzen graphics products, including PRO and enterprise GPU platforms. The fixes strengthen memory handling, validation routines, and driver security boundaries to reduce the risk of privilege escalation or system instability.
No verified reports of active exploitation or publicly released proof-of-concept code were confirmed at the time of publication.
Key Details
- CWE Classification
- CWE-787