Description
Incorrect default permissions in the installation directory for the AMD general-purpose input/output controller (GPIO) could allow an attacker to achieve privilege escalation resulting in arbitrary code execution.
Published: 2026-05-15
Score: 7 High
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

The vulnerability arises from incorrect default permissions on the installation directory of AMD's general‑purpose input/output controller (GPIO). An attacker who gains access to that directory can modify or replace files, enabling them to execute arbitrary code with elevated privileges. This flaw satisfies CWE‑276, indicating a weakness in access control that permits unauthorised file manipulation. As the attacker must be able to reach the GPIO driver installation path, the impact is primarily local – any user with write access to that directory can raise their own privileges or compromise system security.

Affected Systems

AMD processors and chipsets across a wide range of AMD offerings, including Athlon, EPYC, Ryzen, Ryzen Threadripper, Ryzen Embedded and Ryzen AI series. The affected hardware spans desktop, mobile, server, embedded, and AI accelerator product lines. No specific firmware version numbers are listed, so all variants using the current GPIO installation directory layout are potentially vulnerable unless a firmware update has corrected the permissions.

Risk and Exploitability

The CVSS score of 7 indicates a medium severity vulnerability. No EPSS score is reported, so the publicly known exploitation likelihood remains uncertain. The flaw is not listed in the CISA KEV catalog, suggesting no known active exploit but also no assurance against potential attacks. The required condition is that the attacker can write to the installation directory, which typically requires some local foothold or misconfiguration granting write permissions. Mitigation through a firmware update that restores correct ownership and mode of the directory significantly reduces the risk.

Generated by OpenCVE AI on May 15, 2026 at 03:51 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Obtain and install the latest AMD firmware or BIOS update that corrects the directory permissions for the GPIO installation path.
  • Verify that the installation directory for the GPIO driver is owned by the root user and has file permissions that deny write access to non‑privileged users. If not, manually change ownership to root and set permission bits to 0750 or stricter.
  • Apply any vendor‑issued workarounds, such as setting restrictive ACLs or using device‑based access controls to prevent unprivileged processes from accessing GPIO functionalities.
  • Consider limiting GPIO access to trusted applications only, for example by configuring sudoers rules or kernel security modules to enforce least‑privilege.

Generated by OpenCVE AI on May 15, 2026 at 03:51 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Fri, 15 May 2026 14:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Fri, 15 May 2026 04:15:00 +0000

Type Values Removed Values Added
Title Privilege Escalation via Improper GPIO Installation Directory Permissions

Fri, 15 May 2026 02:00:00 +0000

Type Values Removed Values Added
Description Incorrect default permissions in the installation directory for the AMD general-purpose input/output controller (GPIO) could allow an attacker to achieve privilege escalation resulting in arbitrary code execution.
Weaknesses CWE-276
References
Metrics cvssV4_0

{'score': 7, 'vector': 'CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N'}


Subscriptions

No data.

cve-icon MITRE

Status: PUBLISHED

Assigner: AMD

Published:

Updated: 2026-05-16T03:56:09.610Z

Reserved: 2025-05-22T16:34:07.747Z

Link: CVE-2025-48512

cve-icon Vulnrichment

Updated: 2026-05-15T13:32:38.712Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-05-15T02:16:22.597

Modified: 2026-05-15T14:10:17.083

Link: CVE-2025-48512

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-15T04:00:12Z

Weaknesses