CVE-2025-29949: CWE-787 Out-of-bounds Write in AMD AMD Ryzen™ 4000 Series Mobile Processors with Radeon™ Graphics
Insufficient input parameter sanitization in AMD Secure Processor (ASP) Boot Loader (legacy recovery mode only) could allow an attacker to write out-of-bounds to corrupt Secure DRAM potentially resulting in denial of service.
AI Analysis
Technical Summary
CVE-2025-29949 is a vulnerability classified under CWE-787 (Out-of-bounds Write) affecting the AMD Secure Processor (ASP) Boot Loader component in AMD Ryzen 4000 Series Mobile Processors with Radeon Graphics. The flaw exists specifically in the legacy recovery mode of the ASP Boot Loader, where insufficient sanitization of input parameters allows an attacker to write data beyond the intended memory boundaries. This out-of-bounds write targets the Secure DRAM, a protected memory region used by the ASP to maintain secure operations and sensitive data. By corrupting this memory, an attacker can cause instability or denial of service (DoS) conditions in the secure processor environment. The vulnerability requires local access with low privileges (PR:L) and does not require user interaction (UI:N). The attack complexity is low (AC:L), and no authentication beyond low privilege is needed. The CVSS 4.0 base score is 4.8, reflecting a medium severity primarily due to the limited impact scope and the requirement for local access. No known exploits have been reported in the wild, and no patches were listed at the time of publication, indicating that mitigation may rely on future firmware updates or operational controls. The vulnerability does not appear to allow code execution or privilege escalation, limiting its impact to denial of service scenarios affecting the secure processor's functionality.
Potential Impact
For European organizations, the primary impact of CVE-2025-29949 is the potential for denial of service on systems using AMD Ryzen 4000 Series Mobile Processors with Radeon Graphics. This could disrupt critical business operations, especially in sectors relying on mobile computing devices for secure processing tasks, such as government, finance, and healthcare. The inability to maintain secure processor integrity may lead to system instability or forced reboots, impacting availability. Since the vulnerability requires local access with low privileges, the risk is higher in environments where endpoint security controls are weak or where insider threats exist. The lack of remote exploitability reduces the risk of widespread attacks but does not eliminate targeted attacks against high-value assets. Organizations with extensive deployment of affected AMD mobile processors in laptops or mobile workstations may experience operational disruptions if exploited. Additionally, the secure processor's role in cryptographic operations and secure boot processes means that denial of service could indirectly affect system trustworthiness and compliance with security standards.
Mitigation Recommendations
1. Monitor AMD's official channels for firmware or microcode updates addressing CVE-2025-29949 and apply them promptly once available. 2. Restrict physical and local access to devices equipped with AMD Ryzen 4000 mobile processors to trusted personnel only, minimizing the risk of local exploitation. 3. Implement strict endpoint security policies, including least privilege principles and robust user account management, to reduce the likelihood of low-privilege attackers gaining access. 4. Employ system integrity monitoring and alerting to detect unusual reboots, crashes, or secure processor failures indicative of exploitation attempts. 5. Consider deploying hardware-based security solutions or endpoint detection and response (EDR) tools capable of identifying anomalous behavior related to secure processor operations. 6. Educate IT staff and users about the risks of local attacks and the importance of device security, especially in mobile and remote work scenarios. 7. For critical environments, evaluate the feasibility of temporarily limiting use of affected hardware until patches are available or alternative hardware is deployed.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland, Sweden
CVE-2025-29949: CWE-787 Out-of-bounds Write in AMD AMD Ryzen™ 4000 Series Mobile Processors with Radeon™ Graphics
Description
Insufficient input parameter sanitization in AMD Secure Processor (ASP) Boot Loader (legacy recovery mode only) could allow an attacker to write out-of-bounds to corrupt Secure DRAM potentially resulting in denial of service.
AI-Powered Analysis
Technical Analysis
CVE-2025-29949 is a vulnerability classified under CWE-787 (Out-of-bounds Write) affecting the AMD Secure Processor (ASP) Boot Loader component in AMD Ryzen 4000 Series Mobile Processors with Radeon Graphics. The flaw exists specifically in the legacy recovery mode of the ASP Boot Loader, where insufficient sanitization of input parameters allows an attacker to write data beyond the intended memory boundaries. This out-of-bounds write targets the Secure DRAM, a protected memory region used by the ASP to maintain secure operations and sensitive data. By corrupting this memory, an attacker can cause instability or denial of service (DoS) conditions in the secure processor environment. The vulnerability requires local access with low privileges (PR:L) and does not require user interaction (UI:N). The attack complexity is low (AC:L), and no authentication beyond low privilege is needed. The CVSS 4.0 base score is 4.8, reflecting a medium severity primarily due to the limited impact scope and the requirement for local access. No known exploits have been reported in the wild, and no patches were listed at the time of publication, indicating that mitigation may rely on future firmware updates or operational controls. The vulnerability does not appear to allow code execution or privilege escalation, limiting its impact to denial of service scenarios affecting the secure processor's functionality.
Potential Impact
For European organizations, the primary impact of CVE-2025-29949 is the potential for denial of service on systems using AMD Ryzen 4000 Series Mobile Processors with Radeon Graphics. This could disrupt critical business operations, especially in sectors relying on mobile computing devices for secure processing tasks, such as government, finance, and healthcare. The inability to maintain secure processor integrity may lead to system instability or forced reboots, impacting availability. Since the vulnerability requires local access with low privileges, the risk is higher in environments where endpoint security controls are weak or where insider threats exist. The lack of remote exploitability reduces the risk of widespread attacks but does not eliminate targeted attacks against high-value assets. Organizations with extensive deployment of affected AMD mobile processors in laptops or mobile workstations may experience operational disruptions if exploited. Additionally, the secure processor's role in cryptographic operations and secure boot processes means that denial of service could indirectly affect system trustworthiness and compliance with security standards.
Mitigation Recommendations
1. Monitor AMD's official channels for firmware or microcode updates addressing CVE-2025-29949 and apply them promptly once available. 2. Restrict physical and local access to devices equipped with AMD Ryzen 4000 mobile processors to trusted personnel only, minimizing the risk of local exploitation. 3. Implement strict endpoint security policies, including least privilege principles and robust user account management, to reduce the likelihood of low-privilege attackers gaining access. 4. Employ system integrity monitoring and alerting to detect unusual reboots, crashes, or secure processor failures indicative of exploitation attempts. 5. Consider deploying hardware-based security solutions or endpoint detection and response (EDR) tools capable of identifying anomalous behavior related to secure processor operations. 6. Educate IT staff and users about the risks of local attacks and the importance of device security, especially in mobile and remote work scenarios. 7. For critical environments, evaluate the feasibility of temporarily limiting use of affected hardware until patches are available or alternative hardware is deployed.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- AMD
- Date Reserved
- 2025-03-12T15:15:04.911Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 698b8e904b57a58fa1272705
Added to database: 2/10/2026, 8:01:20 PM
Last enriched: 2/10/2026, 8:17:05 PM
Last updated: 2/21/2026, 12:22:03 AM
Views: 8
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-27203: CWE-15: External Control of System or Configuration Setting in YosefHayim ebay-mcp
HighCVE-2026-27168: CWE-122: Heap-based Buffer Overflow in HappySeaFox sail
HighCVE-2026-27134: CWE-287: Improper Authentication in strimzi strimzi-kafka-operator
HighCVE-2026-27190: CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in denoland deno
HighCVE-2026-27026: CWE-770: Allocation of Resources Without Limits or Throttling in py-pdf pypdf
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.