In AMD Zynq UltraScale+ devices, the lack of address validation when executing CSU runtime services through the PMU Firmware can allow access to isolated or protected memory spaces resulting in the loss of integrity and confidentiality.
History

Mon, 06 Oct 2025 18:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 06 Oct 2025 16:30:00 +0000

Type Values Removed Values Added
Description In AMD Zynq UltraScale+ devices, the lack of address validation when executing CSU runtime services through the PMU Firmware can allow access to isolated or protected memory spaces resulting in the loss of integrity and confidentiality.
Weaknesses CWE-1284
References
Metrics cvssV3_1

{'score': 6.6, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H'}


cve-icon MITRE

Status: PUBLISHED

Assigner: AMD

Published:

Updated: 2025-10-06T17:16:22.921Z

Reserved: 2024-11-21T16:18:05.485Z

Link: CVE-2025-0038

cve-icon Vulnrichment

Updated: 2025-10-06T17:00:58.497Z

cve-icon NVD

Status : Received

Published: 2025-10-06T17:16:03.100

Modified: 2025-10-06T17:16:03.100

Link: CVE-2025-0038

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.