Description
Improper Input validation in the AMD Secure Processor (ASP) PCI driver may allow a local attacker to create a buffer overflow condition, potentially resulting in a crash or denial of service
Published: 2026-05-15
Score: 6.9 Medium
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

Improper input validation in the AMD Secure Processor (ASP) PCI driver can cause a buffer overflow when processed data exceeds the expected bounds. This overflow may trigger an abnormal termination of the driver, leading to a system crash or denial of service. The flaw is a classic out‑of‑bounds write vulnerability (CWE-120) and is exploitable only by a user with local privileges on the affected system.

Affected Systems

The vulnerability affects multiple AMD processor families, including EPYC 4004–4005, embedded 4004, 4005, 8004 and 9005 series, and a broad range of Ryzen processors across mobile, desktop, embedded, Threadripper, and PRO lines such as 2000 Mobile, 3000 Desktop, 5000 and 7000 series, the 7045 Mobile, 9000 Desktop, 9000HX, AI 300 and AI Max 300 series, as well as the Ryzen Embedded 7000, 8000, 9000, R1000, R2000, V1000, V2000, Z1 and Z2 series. All of these processors rely on the ASP PCI driver and are susceptible when the specific firmware or driver version includes the unvalidated input handling.

Risk and Exploitability

The CVSS score of 6.9 indicates a moderate severity, and while the EPSS score is not available, the lack of a record in CISA’s KEV catalog suggests no publicly known exploits currently exist. However, the condition requires local access and the ability to interact with the ASP driver, meaning that an attacker who gains local user privileges or can execute code on the system can execute the overflow to crash or disable the driver and cause a denial of service. In the absence of network exposure, the primary risk is for internal threats or compromised systems where local privileges are obtained.

Generated by OpenCVE AI on May 15, 2026 at 03:21 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply any available AMD firmware or driver updates that patch the ASP PCI driver vulnerability.
  • If the ASP functionality is not required, disable or remove the ASP driver from the system to eliminate the attack surface.
  • Enforce strict local privilege controls by restricting user access to kernel drivers and ensuring only trusted accounts can install or modify system drivers.

Generated by OpenCVE AI on May 15, 2026 at 03:21 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Fri, 15 May 2026 14:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Fri, 15 May 2026 03:45:00 +0000

Type Values Removed Values Added
Title Local Buffer Overflow in AMD Secure Processor PCI Driver

Fri, 15 May 2026 02:00:00 +0000

Type Values Removed Values Added
Description Improper Input validation in the AMD Secure Processor (ASP) PCI driver may allow a local attacker to create a buffer overflow condition, potentially resulting in a crash or denial of service
Weaknesses CWE-120
References
Metrics cvssV4_0

{'score': 6.9, 'vector': 'CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N'}


Subscriptions

No data.

cve-icon MITRE

Status: PUBLISHED

Assigner: AMD

Published:

Updated: 2026-05-15T13:35:15.206Z

Reserved: 2024-11-21T16:18:13.504Z

Link: CVE-2025-0045

cve-icon Vulnrichment

Updated: 2026-05-15T13:35:12.119Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-05-15T02:16:22.353

Modified: 2026-05-15T14:10:17.083

Link: CVE-2025-0045

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-15T03:30:35Z

Weaknesses