Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-0035: CWE-428 Unquoted Search Path or Element in AMD AMD Cloud Manageability Service

0
High
VulnerabilityCVE-2025-0035cvecve-2025-0035cwe-428
Published: Tue May 13 2025 (05/13/2025, 17:06:57 UTC)
Source: CVE
Vendor/Project: AMD
Product: AMD Cloud Manageability Service

Description

Unquoted search path within AMD Cloud Manageability Service can allow a local attacker to escalate privileges, potentially resulting in arbitrary code execution.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/26/2026, 20:27:42 UTC

Technical Analysis

CVE-2025-0035 is a vulnerability identified in the AMD Cloud Manageability Service, specifically an unquoted search path issue categorized under CWE-428. Unquoted search path vulnerabilities occur when software executes programs or scripts without properly quoting paths that contain spaces, allowing attackers to place malicious executables in directories that are searched before the legitimate ones. In this case, a local attacker with limited privileges can exploit this flaw by inserting a malicious executable in a directory that the service searches during its execution. When the service runs, it inadvertently executes the attacker's code with elevated privileges, potentially leading to arbitrary code execution. The vulnerability requires local access and some user interaction but does not require bypassing authentication mechanisms. The CVSS v3.1 score of 7.3 indicates a high severity, with the vector string AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H showing that the attack is local, low complexity, requires low privileges and user interaction, and impacts confidentiality, integrity, and availability significantly. No patches are currently linked, and no known exploits have been reported in the wild, but the vulnerability poses a serious risk to affected systems. The AMD Cloud Manageability Service is used in environments where AMD hardware and cloud management tools are deployed, making it a critical component in enterprise and cloud infrastructure.

Potential Impact

The impact of CVE-2025-0035 is substantial for organizations using AMD Cloud Manageability Service. Successful exploitation allows local attackers to escalate privileges, potentially gaining full control over the affected system. This can lead to unauthorized access to sensitive data (confidentiality breach), modification or destruction of data (integrity compromise), and disruption or denial of service (availability impact). In cloud or enterprise environments, such privilege escalation can facilitate lateral movement, persistence, and further compromise of critical infrastructure. The requirement for local access limits remote exploitation but does not eliminate risk, especially in environments with multiple users or where attackers can gain initial footholds through other means. The absence of known exploits currently reduces immediate threat but organizations should not delay remediation due to the high potential impact.

Mitigation Recommendations

To mitigate CVE-2025-0035, organizations should implement the following specific measures: 1) Monitor for updates and patches from AMD and apply them promptly once available. 2) Restrict local user permissions to the minimum necessary, preventing untrusted users from writing to directories in the service's search path. 3) Audit and correct unquoted paths in service configurations and startup scripts to ensure all executable paths are properly quoted. 4) Employ application whitelisting to prevent unauthorized executables from running. 5) Use endpoint detection and response (EDR) tools to monitor for suspicious local execution activities. 6) Limit user interaction requirements by educating users about the risks of executing unknown files and restricting software installation rights. 7) Regularly review and harden system and service permissions to reduce the attack surface. These steps go beyond generic advice by focusing on path quoting, permission hygiene, and proactive monitoring tailored to the nature of this vulnerability.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
AMD
Date Reserved
2024-11-21T16:18:01.721Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682cd0fa1484d88663aec0a1

Added to database: 5/20/2025, 6:59:06 PM

Last enriched: 2/26/2026, 8:27:42 PM

Last updated: 3/25/2026, 3:12:56 AM

Views: 67

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses