CVE-2025-52534
Awaiting Analysis Awaiting Analysis - Queue
Improper Bound Check in AMD CPU Microcode Enables Host Memory Write

Publication date: 2026-02-10

Last updated on: 2026-02-10

Assigner: Advanced Micro Devices Inc.

Description
Improper bound check within AMD CPU microcode can allow a malicious guest to write to host memory, potentially resulting in loss of integrity.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-02-10
Last Modified
2026-02-10
Generated
2026-05-07
AI Q&A
2026-02-10
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
amd cpu_microcode *
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-1284 The product receives input that is expected to specify a quantity (such as size or length), but it does not validate or incorrectly validates that the quantity has the required properties.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability is caused by an improper bound check within AMD CPU microcode. It allows a malicious guest (such as a virtual machine or untrusted code running on the CPU) to write to the host memory. This means that the isolation between guest and host memory can be bypassed, potentially leading to unauthorized memory modification.


How can this vulnerability impact me? :

The vulnerability can impact you by allowing a malicious guest to write to host memory, which can result in a loss of integrity of the host system. This could lead to unauthorized changes in memory, potentially compromising the security and stability of the host environment.


How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

I don't know


How can this vulnerability be detected on my network or system? Can you suggest some commands?

I don't know


What immediate steps should I take to mitigate this vulnerability?

I don't know


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart