Metrics
Affected Vendors & Products
No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Wed, 26 Nov 2025 19:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:amd:uprof:*:*:*:*:*:freebsd:*:* cpe:2.3:a:amd:uprof:*:*:*:*:*:linux:*:* cpe:2.3:a:amd:uprof:*:*:*:*:*:windows:*:* |
Wed, 26 Nov 2025 11:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Amd
Amd uprof |
|
| Vendors & Products |
Amd
Amd uprof |
Mon, 24 Nov 2025 21:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Mon, 24 Nov 2025 21:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Improper return value within AMD uProf can allow a local attacker to bypass KSLR, potentially resulting in loss of confidentiality or availability. | |
| Weaknesses | CWE-394 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: AMD
Published:
Updated: 2025-11-24T21:07:15.170Z
Reserved: 2025-05-22T16:34:02.896Z
Link: CVE-2025-48510
Updated: 2025-11-24T21:07:08.937Z
Status : Analyzed
Published: 2025-11-24T21:16:03.273
Modified: 2025-11-26T18:47:42.303
Link: CVE-2025-48510
No data.
OpenCVE Enrichment
Updated: 2025-11-26T11:11:05Z