CVE-2025-52536
Firmware Downgrade via Lock Bit Modification Flaw in AMD SEV
Publication date: 2026-02-10
Last updated on: 2026-02-10
Assigner: Advanced Micro Devices Inc.
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| amd | sev_firmware | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-1231 | The product uses a trusted lock bit for restricting access to registers, address regions, or other resources, but the product does not prevent the value of the lock bit from being modified after it has been set. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability involves improper prevention of lock bit modification in SEV firmware. It means that a privileged attacker could potentially downgrade the firmware by modifying the lock bit, which should normally prevent such changes.
Downgrading the firmware can lead to a loss of integrity, meaning the system's security and trustworthiness could be compromised.
How can this vulnerability impact me? :
If exploited, this vulnerability could allow a privileged attacker to downgrade the SEV firmware, potentially compromising the integrity of the system.
A loss of integrity in firmware can lead to unauthorized changes, reduced security protections, and increased risk of further attacks or system compromise.
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:
I don't know
How can this vulnerability be detected on my network or system? Can you suggest some commands?
I don't know
What immediate steps should I take to mitigate this vulnerability?
I don't know