Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-0005: CWE-190 Integer Overflow or Wraparound in AMD Xilinx Run Time (XRT)

0
High
VulnerabilityCVE-2025-0005cvecve-2025-0005cwe-190
Published: Mon Nov 24 2025 (11/24/2025, 19:45:12 UTC)
Source: CVE Database V5
Vendor/Project: AMD
Product: Xilinx Run Time (XRT)

Description

Improper input validation within the XOCL driver may allow a local attacker to generate an integer overflow condition, potentially resulting in crash or denial of service.

AI-Powered Analysis

AILast updated: 11/24/2025, 20:19:41 UTC

Technical Analysis

CVE-2025-0005 is a vulnerability classified under CWE-190 (Integer Overflow or Wraparound) affecting the AMD Xilinx Run Time (XRT) software, specifically within the XOCL driver component. The root cause is improper input validation that allows a local attacker to induce an integer overflow condition. Integer overflows occur when an arithmetic operation attempts to create a numeric value that exceeds the maximum size the variable can store, causing it to wrap around to a smaller value or zero. In this context, such an overflow can lead to unexpected behavior in memory allocation or indexing, potentially causing the driver or the entire system to crash or become unresponsive, resulting in a denial of service (DoS). The vulnerability does not require any privileges or user interaction, but exploitation is limited to local attackers who have access to the system. This means that remote exploitation is not feasible unless an attacker already has a foothold on the machine. The CVSS v3.1 base score is 7.3, indicating a high severity due to the ease of exploitation (low attack complexity), no privileges required, and significant impact on availability (high), with limited impact on confidentiality and integrity (low). No patches or exploits are currently publicly available, but the vulnerability is officially published and reserved by AMD. The affected product, Xilinx Run Time (XRT), is widely used in FPGA-based acceleration platforms, which are common in data centers, telecommunications, and industrial control systems. The vulnerability could be leveraged by malicious insiders or compromised local accounts to disrupt critical services or cause system instability.

Potential Impact

For European organizations, the primary impact of CVE-2025-0005 is the potential for denial of service on systems running AMD Xilinx Run Time (XRT), particularly those utilizing FPGA acceleration for compute-intensive tasks. This can disrupt business operations, degrade service availability, and cause downtime in critical infrastructure such as telecommunications networks, manufacturing automation, and research computing clusters. The vulnerability's local attack vector means that insider threats or attackers who gain local access through other means (e.g., phishing, lateral movement) can exploit it to escalate disruption. Confidentiality and integrity impacts are limited but not negligible, as unexpected crashes could lead to data corruption or loss. Organizations relying heavily on Xilinx technology in sectors like automotive, aerospace, and defense may face operational risks. Additionally, the lack of current patches increases exposure until mitigations are applied. The disruption of FPGA-accelerated workloads could have cascading effects on dependent services and applications, impacting overall organizational resilience.

Mitigation Recommendations

1. Monitor AMD and Xilinx official channels for patches addressing CVE-2025-0005 and apply them promptly once available. 2. Restrict local system access strictly to trusted and authenticated users to minimize the risk of local exploitation. 3. Implement robust endpoint security controls to detect and prevent unauthorized local access or privilege escalation attempts. 4. Employ system and application monitoring to identify abnormal crashes or system instability that may indicate exploitation attempts. 5. Use containerization or virtualization to isolate XRT-dependent workloads, limiting the impact scope of potential crashes. 6. Conduct regular security audits and user activity reviews to detect insider threats or suspicious local behavior. 7. Harden system configurations by disabling unnecessary services and interfaces that could provide local access vectors. 8. Educate staff on the risks of local vulnerabilities and enforce strict access policies in environments using FPGA acceleration technologies. 9. Consider network segmentation to isolate critical FPGA-accelerated systems from general user environments. 10. Prepare incident response plans specifically addressing denial of service scenarios related to FPGA runtime environments.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
AMD
Date Reserved
2024-10-10T20:27:40.132Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6924ba55228e5e387419b3d6

Added to database: 11/24/2025, 8:04:37 PM

Last enriched: 11/24/2025, 8:19:41 PM

Last updated: 11/25/2025, 3:58:09 AM

Views: 7

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats