
Security is a Priority
AMD drives innovation in high-performance computing, graphics, and visualization technologies - the building blocks for gaming, immersive platforms, cloud and datacenters. Security is a priority consideration from the moment our products are conceived, including intensive security reviews during the hardware and software development process.
Throughout the lifetime of a product, AMD seeks more efficient ways to make our products more secure, including working closely with partners, academics, researchers, and end users in the ecosystem. As a CNA (CVE Numbering Authority) member we follow coordinated vulnerability disclosure practices and seek to respond quickly and appropriately to reported issues.

As members of FIRST (Forum of Incident Response and Security Teams) our PSIRT team is trained to respond systematically to potential issues reported to AMD.
AMD also recommends users follow security best practices, including keeping your operating system up-to-date, running the latest versions of firmware and software, and regularly running antivirus software.

Security Bulletins and Briefs
Product Security Bulletins and Briefs are listed below. Click on the Title link in the table to view more details.
- Security Bulletins: Used to communicate mitigations or guidance for newly published CVEs.
- Security Briefs: Used to inform of potential vulnerabilities where no CVE(s) have been issued by AMD and/or to provide additional communication regarding previously published potential vulnerabilities where AMD has provided prior guidance.
NOTE: An issuance of a Security Brief by AMD is not necessarily an acknowledgement that AMD products are impacted, e.g. Security Briefs may include AMD communication regarding researcher findings where AMD believes there is no product impact.
Vulnerability Disclosure Policy
At AMD, we treat potential security vulnerabilities seriously and seek to respond swiftly and comprehensively. From inception to production, AMD aims to incorporate security features into its products, and we actively review for potential security vulnerabilities. AMD is committed to working across the ecosystem, including customers, vendors, academics, researchers, and users, to provide a secure computing environment.
Scope
The AMD Vulnerability Disclosure Policy covers AMD APUs, CPUs, NPUs, IPUs, DPUs, GPUs, FPGAs, and software.
We encourage well-researched reports that focus on real-world security threats, including a PoC (Proof of Concept) with minimal dependencies. Reported issues requiring physical access to the system to exploit are out of scope in some situations.
AMD encourages finding and reporting potential security vulnerabilities through our Bug Bounty program for individuals who:
- Conduct research that does not harm AMD or our customers
- Test within the scope of this Vulnerability Disclosure Policy (VDP)
- Adhere to the applicable laws both in their location and the United States
- Refrain from disclosing vulnerability details before a mutually agreed-upon date
- Test on eligible AMD branded products and technologies that are in scope of the Program
Reports may also be submitted directly to psirt@amd.com.
How to Submit a Vulnerability Report
Reports can be submitted via 2 methods:
- AMD Bug Bounty Program
The AMD Bug Bounty Program is a collaboration between AMD and the research community. AMD believes that collaboration with security researchers and promoting security research is an important step in helping to improve the security of AMD products. We encourage security researchers to work with us to help mitigate and coordinate the disclosure of potential security vulnerabilities and look forward to working with you! Refer to AMD Bug Bounty Program for more details.
To report a vulnerability, please submit your report through our provider, Intigriti.
- Report Directly to AMD
To report a potential security vulnerability in any AMD product and/or technology, please email your report* to the AMD Product Security Team at psirt@amd.com. Encryption is not required, but if preferred, you can see our public key below. Please note AMD follows Coordinated Vulnerability Disclosure (CVD) and expects all security researchers who submit reports to do the same.
*Reports should contain the following information to allow for efficient triage and analysis:
- Well-researched reports in English
- Product name, including software or firmware version
- Reports that include proof-of-concept code
- Description of how the issue was found, the impact and any potential remediation
- Plans or intentions for public disclosure
Note any missing information may cause delays in our ability to address the vulnerability. Security researchers who submit a validated report and follow CVD will be given credit in our published security bulletin.
What You Can Expect From AMD
The AMD Product Security Incident Response Team (PSIRT) is the focal point for reporting potential AMD product security issues; AMD PSIRT interfaces with the product security ecosystem, including security researchers, industry peers, government organizations, customers, and vendors, working together to report potential AMD product security issues.
The PSIRT team, working with various teams within AMD, follows the following high-level process:


Triage
Review submitted information, logs issue and assigns ticket ID, and identifies appropriate engineering team(s).

Analysis
Validates issues determining severity, impact and criticality.

Remediate
If remediation is required works with business units and product development to define approach and plans.

Disclosure
Appropriate notification to affected customers and/or issuance of public security bulletin.

Review
Leverage feedback from customers, researchers and internal teams to further improve product security.
Cycle Time for Mitigation
As an upstream provider and participant in Coordinated Vulnerability Disclosure (CVD), AMD requires sufficient time between the initial report and public disclosure.
Some issues may require AMD to provide a mitigation to our customers, who will then integrate, and ship patched products. Other issues may require a coordinated approach where certain aspects of a mitigation may be addressed by AMD and other aspects addressed by various eco-system vendors. In all cases, AMD works to integrate any needed changes and validate mitigations while coordinating any associated disclosures.
Disclosure timeliness is determined on an issue-by-issue basis, appropriate to the situation, and with protection of the end-user in mind. In some cases, disclosure may be completed in the common embargo time period of 90 days. In most cases, however, due to eco-system and product complexity, mitigations can take longer to develop, integrate, and provide to end-users. In these cases, a longer embargo period is needed to allow vendors and partners to adequately patch systems.
- 2021
- 2020
- 2019
- 2018
3/26/21
Predictive Store Forwarding
https://community.amd.com/t5/amd-business-blog/predictive-store-forwarding/ba-p/456422