CVE-2025-0038
Unknown Unknown - Not Provided
BaseFortify

Publication date: 2025-10-06

Last updated on: 2025-10-08

Assigner: Advanced Micro Devices Inc.

Description
In AMD Zynq UltraScale+ devices, the lack of address validation when executing CSU runtime services through the PMU Firmware can allow access to isolated or protected memory spaces resulting in the loss of integrity and confidentiality.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-10-06
Last Modified
2025-10-08
Generated
2026-05-07
AI Q&A
2025-10-06
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 2 associated CPEs
Vendor Product Version / Range
amd zynq_ultrascale+ *
amd pmu_firmware *
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-1284 The product receives input that is expected to specify a quantity (such as size or length), but it does not validate or incorrectly validates that the quantity has the required properties.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability in AMD Zynq UltraScale+ devices involves the Platform Management Unit (PMU) Firmware, which provides runtime services for cryptographic operations and configuration management. The issue is that the memory pointers used in these runtime service commands are not properly validated, allowing a remote processor to access or overwrite isolated or protected memory areas. This can lead to loss of confidentiality and integrity of the system. [1]


How can this vulnerability impact me? :

Exploitation of this vulnerability can allow unauthorized access to protected memory regions, potentially resulting in the loss of confidentiality and integrity of sensitive data. This could compromise cryptographic operations and system configuration, leading to serious security impacts such as data leakage or system manipulation. [1]


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart