No analysis available yet.
No remediation available yet.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2025-32545 | In AMD Zynq UltraScale+ devices, the lack of address validation when executing CSU runtime services through the PMU Firmware can allow access to isolated or protected memory spaces resulting in the loss of integrity and confidentiality. |
Wed, 08 Oct 2025 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Amd
Amd zynq Ultrascale+ |
|
| Vendors & Products |
Amd
Amd zynq Ultrascale+ |
Mon, 06 Oct 2025 18:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Mon, 06 Oct 2025 16:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | In AMD Zynq UltraScale+ devices, the lack of address validation when executing CSU runtime services through the PMU Firmware can allow access to isolated or protected memory spaces resulting in the loss of integrity and confidentiality. | |
| Weaknesses | CWE-1284 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: AMD
Published:
Updated: 2025-10-06T17:16:22.921Z
Reserved: 2024-11-21T16:18:05.485Z
Link: CVE-2025-0038
Updated: 2025-10-06T17:00:58.497Z
Status : Awaiting Analysis
Published: 2025-10-06T17:16:03.100
Modified: 2025-10-08T19:38:32.610
Link: CVE-2025-0038
No data.
OpenCVE Enrichment
Updated: 2025-10-08T13:39:05Z
EUVD