CVE-2025-52534
Improper Bound Check in AMD CPU Microcode Enables Host Memory Write
Publication date: 2026-02-10
Last updated on: 2026-02-10
Assigner: Advanced Micro Devices Inc.
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| amd | cpu_microcode | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-1284 | The product receives input that is expected to specify a quantity (such as size or length), but it does not validate or incorrectly validates that the quantity has the required properties. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is caused by an improper bound check within AMD CPU microcode. It allows a malicious guest (such as a virtual machine or untrusted code running on the CPU) to write to the host memory. This means that the isolation between guest and host memory can be bypassed, potentially leading to unauthorized memory modification.
How can this vulnerability impact me? :
The vulnerability can impact you by allowing a malicious guest to write to host memory, which can result in a loss of integrity of the host system. This could lead to unauthorized changes in memory, potentially compromising the security and stability of the host environment.
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:
I don't know
How can this vulnerability be detected on my network or system? Can you suggest some commands?
I don't know
What immediate steps should I take to mitigate this vulnerability?
I don't know