Impact
The vulnerability arises from improper access control between the Joint Test Action Group (JTAG) interface and the Advanced Extensible Interface (AXI) on AMD Ryzen processors. An attacker with physical access can read or overwrite cross‑chip debug (XCD) registers, potentially compromising data integrity or confidentiality. The flaw is classified as CWE‑284: Improper Access Control.
Affected Systems
Affected processors include AMD Ryzen 7040 Series Mobile CPUs with Radeon Graphics, AMD Ryzen 8000 Series Desktop CPUs, Ryzen 8040 Series Mobile CPUs with Radeon Graphics, and AMD Ryzen Embedded 8000 Series CPUs.
Risk and Exploitability
The CVSS score of 5.3 indicates a moderate risk. EPSS is unavailable, so the likelihood of exploitation is uncertain, but the vulnerability is not listed in CISA KEV, suggesting no publicly known exploits yet. The attack requires direct physical access to the JTAG/AXI interface; an attacker would need to locate the debug ports on the silicon or motherboard, connect to them, and issue read/write commands. Mitigation involves disabling the interfaces or shielding the silicon.
OpenCVE Enrichment