Improper isolation of VCN-JPEG HW register space could allow a malicious Guest Virtual Machine (VM) or a process to perform unauthorized access to the register space of the JPEG cores assigned a victim VM/process, potentially gaining arbitrary read/write access to the victim VM/process data.

Project Subscriptions

Vendors Products
Instinct Mi300a Subscribe
Instinct Mi300x Subscribe
Instinct Mi308x Subscribe
Instinct Mi325x Subscribe
Radeon Pro W7000 Series Subscribe
Radeon Rx 7000 Series Subscribe
Advisories

No advisories yet.

Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Fri, 15 May 2026 12:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Fri, 15 May 2026 11:45:00 +0000

Type Values Removed Values Added
First Time appeared Amd
Amd instinct Mi300a
Amd instinct Mi300x
Amd instinct Mi308x
Amd instinct Mi325x
Amd radeon Pro W7000 Series
Amd radeon Rx 7000 Series
Vendors & Products Amd
Amd instinct Mi300a
Amd instinct Mi300x
Amd instinct Mi308x
Amd instinct Mi325x
Amd radeon Pro W7000 Series
Amd radeon Rx 7000 Series

Fri, 15 May 2026 05:45:00 +0000

Type Values Removed Values Added
Title Unauthorized Access via Improper VCN‑JPEG Register Isolation in AMD GPU Systems
Weaknesses CWE-269
CWE-284

Fri, 15 May 2026 04:30:00 +0000

Type Values Removed Values Added
Description Improper isolation of VCN-JPEG HW register space could allow a malicious Guest Virtual Machine (VM) or a process to perform unauthorized access to the register space of the JPEG cores assigned a victim VM/process, potentially gaining arbitrary read/write access to the victim VM/process data.
References
Metrics cvssV4_0

{'score': 8.8, 'vector': 'CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H'}


Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: AMD

Published:

Updated: 2026-05-16T03:56:11.834Z

Reserved: 2024-05-23T19:44:40.301Z

Link: CVE-2024-36323

cve-icon Vulnrichment

Updated: 2026-05-15T11:13:41.134Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-05-15T05:16:32.513

Modified: 2026-05-15T14:10:17.083

Link: CVE-2024-36323

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-15T11:20:55Z

Weaknesses