A buffer overflow with Xilinx Run Time Environment may allow a local attacker to read or corrupt data from the advanced extensible interface (AXI), potentially resulting in loss of confidentiality, integrity, and/or availability.
Advisories

No advisories yet.

Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Mon, 24 Nov 2025 20:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 24 Nov 2025 20:00:00 +0000

Type Values Removed Values Added
Description A buffer overflow with Xilinx Run Time Environment may allow a local attacker to read or corrupt data from the advanced extensible interface (AXI), potentially resulting in loss of confidentiality, integrity, and/or availability.
Weaknesses CWE-121
References
Metrics cvssV3_1

{'score': 7.3, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H'}


cve-icon MITRE

Status: PUBLISHED

Assigner: AMD

Published:

Updated: 2025-11-24T20:31:53.040Z

Reserved: 2025-06-17T16:53:10.413Z

Link: CVE-2025-52539

cve-icon Vulnrichment

Updated: 2025-11-24T19:54:09.552Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2025-11-24T20:15:49.410

Modified: 2025-11-25T22:16:16.690

Link: CVE-2025-52539

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.