Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-29933: CWE-787 Out-of-bounds Write in AMD AMD μProf

0
Medium
VulnerabilityCVE-2025-29933cvecve-2025-29933cwe-787
Published: Mon Nov 24 2025 (11/24/2025, 21:03:48 UTC)
Source: CVE Database V5
Vendor/Project: AMD
Product: AMD μProf

Description

Improper input validation within AMD uProf can allow a local attacker to write out of bounds, potentially resulting in a crash or denial of service

AI-Powered Analysis

AILast updated: 11/24/2025, 21:23:44 UTC

Technical Analysis

CVE-2025-29933 is a vulnerability identified in AMD μProf, a performance profiling tool designed for AMD processors. The root cause is improper input validation that leads to an out-of-bounds write (CWE-787). This type of vulnerability occurs when the software writes data outside the boundaries of allocated memory buffers, which can corrupt memory, cause application instability, or crashes. In this case, a local attacker with limited privileges (PR:L) can exploit the flaw without requiring user interaction (UI:N). The attack vector is local, meaning the attacker must have access to the system to trigger the vulnerability. The impact is limited to availability (A:H), as the vulnerability can cause denial of service by crashing the profiling tool or potentially other dependent processes. Confidentiality and integrity are not affected. The CVSS v3.1 base score is 5.5, reflecting medium severity due to the local attack vector and limited impact scope. No known exploits have been reported in the wild, and no patches are currently linked, indicating that mitigation may rely on vendor updates in the near future. AMD μProf is typically used by developers and performance engineers to analyze AMD CPU performance, so the affected systems are likely development or testing environments rather than general production systems. However, if μProf is used in production monitoring or diagnostic contexts, availability impacts could affect operational continuity.

Potential Impact

For European organizations, the primary impact is potential denial of service on systems running AMD μProf. This could disrupt performance profiling activities, delay development cycles, or impair diagnostic capabilities. Organizations relying on μProf in production environments for monitoring may experience temporary outages or degraded service availability. Since exploitation requires local access, the threat is more relevant to insider threats or attackers who have already compromised user accounts with limited privileges. Confidentiality and integrity of data remain unaffected, reducing the risk of data breaches. However, operational disruptions could impact sectors with critical development or testing workflows, such as automotive, aerospace, and financial services industries prevalent in Europe. The medium severity score suggests the vulnerability should be addressed promptly but does not represent an immediate critical threat. The lack of known exploits reduces the urgency but does not eliminate the risk of future exploitation.

Mitigation Recommendations

European organizations should implement the following specific mitigations: 1) Restrict local access to systems running AMD μProf to trusted personnel only, enforcing strict user account controls and monitoring. 2) Monitor for unusual application crashes or denial of service symptoms related to μProf usage. 3) Apply vendor patches or updates as soon as AMD releases them addressing CVE-2025-29933. 4) If immediate patching is not possible, consider disabling or limiting the use of AMD μProf on production or critical systems to reduce exposure. 5) Employ application whitelisting and endpoint protection solutions to detect and prevent unauthorized execution of profiling tools by untrusted users. 6) Conduct regular security awareness training emphasizing the risks of local privilege misuse. 7) Review and harden system configurations to minimize the attack surface, including disabling unnecessary services and enforcing least privilege principles. These targeted actions go beyond generic advice by focusing on controlling local access and monitoring specific to the profiling tool environment.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
AMD
Date Reserved
2025-03-12T15:14:59.391Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6924ccc0338d19296f824bda

Added to database: 11/24/2025, 9:23:12 PM

Last enriched: 11/24/2025, 9:23:44 PM

Last updated: 11/25/2025, 3:01:18 AM

Views: 7

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats