Description
Insecure default configuration state of DDR5 memory module by AGESA Bootloader Firmware could allow an attacker with local user privilege to abuse the unprotected PMIC interface to create a permanent denial of service condition or affect the integrity of the memory module.
Published: 2026-05-15
Score: 6.9 Medium
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

An insecure default configuration in the AGESA Bootloader Firmware allows a local user to misuse the unprotected Power Management Integrated Circuit (PMIC) interface, creating a permanent denial of service or altering the integrity of DDR5 memory modules. The vulnerability is a classic improper privilege management flaw, giving local users more control over low‑level hardware than intended.

Affected Systems

The affected hardware consists of a broad range of AMD processors, including all Athlon 3000 series mobile and desktop models, Ryzen 3000 through 9000 series desktop, mobile, and high‑end workstation processors, Threadripper series, and the recent AI and Xeon‑like Z1/Z2 families that incorporate DDR5 memory support.

Risk and Exploitability

With a CVSS score of 6.9, the risk is medium to high for systems where local users have sufficient privileges to interact with the PMIC. The EPSS score is not available, and the vulnerability is not listed in the CISA KEV catalog, indicating no known public exploitation at this time. An attacker needs local user access and the ability to trigger the AGESA firmware’s PMIC control; no remote network vector is recognized from the current information.

Generated by OpenCVE AI on May 15, 2026 at 04:24 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Acquire and install the latest AGESA firmware update that corrects the insecure PMIC configuration.
  • Configure the firmware to enforce secure default settings and, if supported, disable the unprotected PMIC interface.
  • Limit local user privileges to only necessary functions and monitor for abnormal memory activity.

Generated by OpenCVE AI on May 15, 2026 at 04:24 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Fri, 15 May 2026 17:30:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Fri, 15 May 2026 04:45:00 +0000

Type Values Removed Values Added
Title Local Privilege Attack via AGESA Bootloader PMIC Leads to Memory Denial of Service

Fri, 15 May 2026 03:00:00 +0000

Type Values Removed Values Added
Description Insecure default configuration state of DDR5 memory module by AGESA Bootloader Firmware could allow an attacker with local user privilege to abuse the unprotected PMIC interface to create a permanent denial of service condition or affect the integrity of the memory module.
Weaknesses CWE-276
References
Metrics cvssV4_0

{'score': 6.9, 'vector': 'CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N'}


Subscriptions

No data.

cve-icon MITRE

Status: PUBLISHED

Assigner: AMD

Published:

Updated: 2026-05-15T16:36:41.669Z

Reserved: 2025-05-22T16:34:07.747Z

Link: CVE-2025-48516

cve-icon Vulnrichment

Updated: 2026-05-15T16:36:19.292Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-05-15T03:16:22.197

Modified: 2026-05-15T14:10:17.083

Link: CVE-2025-48516

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-15T04:30:36Z

Weaknesses