Security is a Priority

AMD drives innovation in high-performance computing, graphics, and visualization technologies - the building blocks for gaming, immersive platforms, cloud and datacenters. Security is a priority consideration from the moment our products are conceived, including intensive security reviews during the hardware and software development process.

Throughout the lifetime of a product, AMD seeks more efficient ways to make our products more secure, including working closely with partners, academics, researchers, and end users in the ecosystem. As a CNA (CVE Numbering Authority) member we follow coordinated vulnerability disclosure practices and seek to respond quickly and appropriately to reported issues. 

CVE logo

As members of FIRST (Forum of Incident Response and Security Teams) our PSIRT team is trained to respond systematically to potential issues reported to AMD.

AMD also recommends users follow security best practices, including keeping your operating system up-to-date, running the latest versions of firmware and software, and regularly running antivirus software.

First logo

Security Bulletins and Briefs

Product Security Bulletins and Briefs are listed below. Click on the Title link in the table to view more details.

  • Security Bulletins: Used to communicate mitigations or guidance for newly published CVEs.
  • Security Briefs: Used to inform of potential vulnerabilities where no CVE(s) have been issued by AMD and/or to provide additional communication regarding previously published potential vulnerabilities where AMD has provided prior guidance.

NOTE: An issuance of a Security Brief by AMD is not necessarily an acknowledgement that AMD products are impacted, e.g. Security Briefs may include AMD communication regarding researcher findings where AMD believes there is no product impact.

Vulnerability Disclosure Policy

At AMD, we treat potential security vulnerabilities seriously and seek to respond swiftly and comprehensively. From inception to production, AMD aims to incorporate security features into its products, and we actively review for potential security vulnerabilities. AMD is committed to working across the ecosystem, including customers, vendors, academics, researchers, and users, to provide a secure computing environment.

Scope

The AMD Vulnerability Disclosure Policy covers AMD APUs, CPUs, NPUs, IPUs, DPUs, GPUs, FPGAs, and software.

We encourage well-researched reports that focus on real-world security threats, including a PoC (Proof of Concept) with minimal dependencies. Reported issues requiring physical access to the system to exploit are out of scope in some situations.

AMD encourages finding and reporting potential security vulnerabilities through our Bug Bounty program for individuals who:

  • Conduct research that does not harm AMD or our customers
  • Test within the scope of this Vulnerability Disclosure Policy (VDP)
  • Adhere to the applicable laws both in their location and the United States
  • Refrain from disclosing vulnerability details before a mutually agreed-upon date
  • Test on eligible AMD branded products and technologies that are in scope of the Program

Reports may also be submitted directly to psirt@amd.com.

How to Submit a Vulnerability Report

Reports can be submitted via 2 methods:

  1. AMD Bug Bounty Program

    The AMD Bug Bounty Program is a collaboration between AMD and the research community. AMD believes that collaboration with security researchers and promoting security research is an important step in helping to improve the security of AMD products. We encourage security researchers to work with us to help mitigate and coordinate the disclosure of potential security vulnerabilities and look forward to working with you! Refer to AMD Bug Bounty Program for more details.

    To report a vulnerability, please submit your report through our provider, Intigriti.

  2. Report Directly to AMD

    To report a potential security vulnerability in any AMD product and/or technology, please email your report* to the AMD Product Security Team at psirt@amd.com. Encryption is not required, but if preferred, you can see our public key below. Please note AMD follows Coordinated Vulnerability Disclosure (CVD) and expects all security researchers who submit reports to do the same.

    *Reports should contain the following information to allow for efficient triage and analysis:

    1. Well-researched reports in English
    2. Product name, including software or firmware version
    3. Reports that include proof-of-concept code
    4. Description of how the issue was found, the impact and any potential remediation
    5. Plans or intentions for public disclosure

    Note any missing information may cause delays in our ability to address the vulnerability. Security researchers who submit a validated report and follow CVD will be given credit in our published security bulletin.

What You Can Expect From AMD

AMD currently uses Common Vulnerability Scoring System (CVSS) version 3.1 to assess severity and is currently in the process of transitioning from to CVSS 4.0. Throughout this transition period, our security bulletins will include both scores for reference. Use of CVSS 3.1 will be phased out in future bulletins.

The AMD Product Security Incident Response Team (PSIRT) is the focal point for reporting potential AMD product security issues; AMD PSIRT interfaces with the product security ecosystem, including security researchers, industry peers, government organizations, customers, and vendors, working together to report potential AMD product security issues.

The PSIRT team, working with various teams within AMD, follows the following high-level process:

AMD PSIRT chart
Chart content 1 image

Triage

Review submitted information, logs issue and assigns ticket ID, and identifies appropriate engineering team(s).

Chart content 2 image

Analysis

Validates issues determining severity, impact and criticality.

Chart content 3 image

Remediate

If remediation is required works with business units and product development to define approach and plans.

Chart content 4 image

Disclosure

Appropriate notification to affected customers and/or issuance of public security bulletin.

Chart content 5 image

Review

Leverage feedback from customers, researchers and internal teams to further improve product security.

Cycle Time for Mitigation

As an upstream provider and participant in Coordinated Vulnerability Disclosure (CVD), AMD requires sufficient time between the initial report and public disclosure.

Some issues may require AMD to provide a mitigation to our customers, who will then integrate, and ship patched products. Other issues may require a coordinated approach where certain aspects of a mitigation may be addressed by AMD and other aspects addressed by various eco-system vendors. In all cases, AMD works to integrate any needed changes and validate mitigations while coordinating any associated disclosures.

Disclosure timeliness is determined on an issue-by-issue basis, appropriate to the situation, and with protection of the end-user in mind. In some cases, disclosure may be completed in the common embargo time period of 90 days. In most cases, however, due to eco-system and product complexity, mitigations can take longer to develop, integrate, and provide to end-users. In these cases, a longer embargo period is needed to allow vendors and partners to adequately patch systems.

Security Support Policy

Refer to the AMD Security Support Policy to learn how AMD provides support for security related issues.

AMD PGP Key

Bulletins Archive