In AMD Zynq UltraScale+ devices, the lack of address validation when executing CSU runtime services through the PMU Firmware can allow access to isolated or protected memory spaces resulting in the loss of integrity and confidentiality.
Metrics
Affected Vendors & Products
Advisories
Source | ID | Title |
---|---|---|
![]() |
EUVD-2025-32545 | In AMD Zynq UltraScale+ devices, the lack of address validation when executing CSU runtime services through the PMU Firmware can allow access to isolated or protected memory spaces resulting in the loss of integrity and confidentiality. |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Mon, 06 Oct 2025 18:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Mon, 06 Oct 2025 16:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | In AMD Zynq UltraScale+ devices, the lack of address validation when executing CSU runtime services through the PMU Firmware can allow access to isolated or protected memory spaces resulting in the loss of integrity and confidentiality. | |
Weaknesses | CWE-1284 | |
References |
| |
Metrics |
cvssV3_1
|

Status: PUBLISHED
Assigner: AMD
Published:
Updated: 2025-10-06T17:16:22.921Z
Reserved: 2024-11-21T16:18:05.485Z
Link: CVE-2025-0038

Updated: 2025-10-06T17:00:58.497Z

Status : Received
Published: 2025-10-06T17:16:03.100
Modified: 2025-10-06T17:16:03.100
Link: CVE-2025-0038

No data.

No data.