Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-0009: CWE-476 NULL Pointer Dereference in AMD AMD Ryzen™ 7035 Series Processor with Radeon™ Graphics

0
Medium
VulnerabilityCVE-2025-0009cvecve-2025-0009cwe-476
Published: Sat Sep 06 2025 (09/06/2025, 18:12:45 UTC)
Source: CVE Database V5
Vendor/Project: AMD
Product: AMD Ryzen™ 7035 Series Processor with Radeon™ Graphics

Description

A NULL pointer dereference in AMD Crash Defender could allow an attacker to write a NULL output to a log file potentially resulting in a system crash and loss of availability.

AI-Powered Analysis

AILast updated: 09/15/2025, 00:48:18 UTC

Technical Analysis

CVE-2025-0009 is a vulnerability identified in the AMD Ryzen™ 7035 Series Processor with Radeon™ Graphics, specifically within the AMD Crash Defender component. The issue is classified as a NULL pointer dereference (CWE-476), which occurs when the software attempts to read or write to a memory location referenced by a NULL pointer. In this case, the vulnerability allows an attacker to cause the system to write a NULL output to a log file. This improper handling can lead to a system crash, resulting in a loss of availability. The vulnerability does not affect confidentiality or integrity directly but impacts system stability and uptime. The CVSS v3.1 base score is 5.5, indicating a medium severity level. The attack vector is local (AV:L), requiring low attack complexity (AC:L) and low privileges (PR:L), but no user interaction (UI:N) is needed. The scope remains unchanged (S:U), and the impact is solely on availability (A:H), with no impact on confidentiality or integrity. No known exploits are currently in the wild, and no patches have been linked yet. The vulnerability was reserved in October 2024 and published in September 2025. This flaw could be exploited by local attackers or malicious processes to cause denial of service conditions on affected systems running AMD Ryzen 7035 processors, potentially disrupting critical operations.

Potential Impact

For European organizations, the primary impact of CVE-2025-0009 is the potential for denial of service (DoS) due to system crashes triggered by the NULL pointer dereference in AMD Crash Defender. This could affect availability of critical systems, especially in environments where AMD Ryzen 7035 processors are deployed in servers, workstations, or embedded systems. Industries relying on high availability such as finance, healthcare, manufacturing, and public services could face operational disruptions. Although the vulnerability does not compromise data confidentiality or integrity, the loss of availability could lead to downtime, reduced productivity, and potential financial losses. Additionally, repeated crashes could complicate incident response and recovery efforts. Since exploitation requires local access with low privileges, insider threats or malware with limited access could trigger the vulnerability. European organizations with AMD Ryzen 7035 hardware should be aware of this risk, particularly in environments where system stability is critical.

Mitigation Recommendations

To mitigate CVE-2025-0009, European organizations should: 1) Monitor AMD's official channels for patches or firmware updates addressing this vulnerability and apply them promptly once available. 2) Implement strict access controls and endpoint protection to limit local access to trusted users and processes, reducing the risk of local exploitation. 3) Employ system monitoring and logging to detect abnormal system crashes or log file anomalies indicative of exploitation attempts. 4) Use virtualization or containerization where possible to isolate critical workloads and limit the impact of potential crashes. 5) Conduct regular backups and have robust disaster recovery plans to minimize downtime in case of system crashes. 6) Review and harden system configurations to minimize unnecessary local access and privilege escalation opportunities. 7) Engage in proactive threat hunting to identify any suspicious activity that might exploit this vulnerability before patches are available.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
AMD
Date Reserved
2024-10-10T20:27:45.840Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68bc7b3026d967d8af3d147b

Added to database: 9/6/2025, 6:19:28 PM

Last enriched: 9/15/2025, 12:48:18 AM

Last updated: 10/23/2025, 10:48:36 AM

Views: 58

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats