CVE-2025-0044: CWE-125 Out-of-bounds Read in AMD AMD Ryzen™ Al Max+
An out-of-bounds read in power management firmware by a malicious local attacker with low privileges could potentially lead to a partial loss of confidentiality and availability.
AI Analysis
Technical Summary
This vulnerability involves an out-of-bounds read (CWE-125) in the power management firmware of AMD Ryzen™ Al Max+ processors. A local attacker with low privileges can exploit this flaw to potentially cause partial confidentiality and availability impacts. The CVSS 4.0 vector indicates low attack complexity and privileges required, with no user interaction needed. No official remediation or patch has been announced by AMD, and no known exploits have been reported.
Potential Impact
The vulnerability may allow a local attacker with low privileges to read memory outside intended boundaries in the power management firmware, leading to partial loss of confidentiality and availability. The impact is limited to local attackers and does not involve remote exploitation or integrity compromise based on current data.
Mitigation Recommendations
Patch status is not yet confirmed — check the vendor advisory for current remediation guidance. Since no official fix or mitigation is currently documented by AMD, users should monitor AMD advisories for updates. No specific mitigations are recommended at this time based on available information.
CVE-2025-0044: CWE-125 Out-of-bounds Read in AMD AMD Ryzen™ Al Max+
Description
An out-of-bounds read in power management firmware by a malicious local attacker with low privileges could potentially lead to a partial loss of confidentiality and availability.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
This vulnerability involves an out-of-bounds read (CWE-125) in the power management firmware of AMD Ryzen™ Al Max+ processors. A local attacker with low privileges can exploit this flaw to potentially cause partial confidentiality and availability impacts. The CVSS 4.0 vector indicates low attack complexity and privileges required, with no user interaction needed. No official remediation or patch has been announced by AMD, and no known exploits have been reported.
Potential Impact
The vulnerability may allow a local attacker with low privileges to read memory outside intended boundaries in the power management firmware, leading to partial loss of confidentiality and availability. The impact is limited to local attackers and does not involve remote exploitation or integrity compromise based on current data.
Mitigation Recommendations
Patch status is not yet confirmed — check the vendor advisory for current remediation guidance. Since no official fix or mitigation is currently documented by AMD, users should monitor AMD advisories for updates. No specific mitigations are recommended at this time based on available information.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- AMD
- Date Reserved
- 2024-11-21T16:18:12.240Z
- Cvss Version
- 4.0
- State
- PUBLISHED
- Remediation Level
- null
Threat ID: 6a068dbfec166c07b09ac97f
Added to database: 5/15/2026, 3:06:39 AM
Last enriched: 5/15/2026, 3:23:15 AM
Last updated: 5/16/2026, 6:27:44 AM
Views: 8
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.