Improper input validation in the AMD Secure Processor (ASP) PCI driver could allow a local attacker to trigger a Use-After-Free (UAF) condition, potentially resulting in a loss of platform integrity or crash.

Project Subscriptions

No data.

Advisories

No advisories yet.

Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Fri, 15 May 2026 03:45:00 +0000

Type Values Removed Values Added
Title Improper Input Validation In AMD Secure Processor PCI Driver Leads To Local Use‑After‑Free

Fri, 15 May 2026 02:00:00 +0000

Type Values Removed Values Added
Description Improper input validation in the AMD Secure Processor (ASP) PCI driver could allow a local attacker to trigger a Use-After-Free (UAF) condition, potentially resulting in a loss of platform integrity or crash.
Weaknesses CWE-416
References
Metrics cvssV4_0

{'score': 6.9, 'vector': 'CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N'}


Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: AMD

Published:

Updated: 2026-05-15T01:45:34.221Z

Reserved: 2025-05-22T16:34:07.748Z

Link: CVE-2025-48521

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2026-05-15T02:16:23.077

Modified: 2026-05-15T02:16:23.077

Link: CVE-2025-48521

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-15T03:30:35Z

Weaknesses