Insufficient validation within Xilinx Run Time framework could allow a local attacker to escalate privileges from user space to kernel space, potentially compromising confidentiality, integrity, and/or availability.
Advisories

No advisories yet.

Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Wed, 26 Nov 2025 11:15:00 +0000

Type Values Removed Values Added
First Time appeared Amd
Amd xilinx Run Time
Vendors & Products Amd
Amd xilinx Run Time

Mon, 24 Nov 2025 21:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 24 Nov 2025 20:45:00 +0000

Type Values Removed Values Added
Description Insufficient validation within Xilinx Run Time framework could allow a local attacker to escalate privileges from user space to kernel space, potentially compromising confidentiality, integrity, and/or availability.
Weaknesses CWE-710
References
Metrics cvssV3_1

{'score': 5.7, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L'}


cve-icon MITRE

Status: PUBLISHED

Assigner: AMD

Published:

Updated: 2025-11-24T20:56:23.146Z

Reserved: 2024-10-10T20:27:43.895Z

Link: CVE-2025-0007

cve-icon Vulnrichment

Updated: 2025-11-24T20:56:15.685Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2025-11-24T21:16:02.023

Modified: 2025-11-25T22:16:16.690

Link: CVE-2025-0007

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2025-11-26T11:11:01Z