Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-29949: CWE-787 Out-of-bounds Write in AMD AMD Ryzen™ 4000 Series Mobile Processors with Radeon™ Graphics

0
Medium
VulnerabilityCVE-2025-29949cvecve-2025-29949cwe-787
Published: Tue Feb 10 2026 (02/10/2026, 19:46:42 UTC)
Source: CVE Database V5
Vendor/Project: AMD
Product: AMD Ryzen™ 4000 Series Mobile Processors with Radeon™ Graphics

Description

Insufficient input parameter sanitization in AMD Secure Processor (ASP) Boot Loader (legacy recovery mode only) could allow an attacker to write out-of-bounds to corrupt Secure DRAM potentially resulting in denial of service.

AI-Powered Analysis

AILast updated: 02/10/2026, 20:17:05 UTC

Technical Analysis

CVE-2025-29949 is a vulnerability classified under CWE-787 (Out-of-bounds Write) affecting the AMD Secure Processor (ASP) Boot Loader component in AMD Ryzen 4000 Series Mobile Processors with Radeon Graphics. The flaw exists specifically in the legacy recovery mode of the ASP Boot Loader, where insufficient sanitization of input parameters allows an attacker to write data beyond the intended memory boundaries. This out-of-bounds write targets the Secure DRAM, a protected memory region used by the ASP to maintain secure operations and sensitive data. By corrupting this memory, an attacker can cause instability or denial of service (DoS) conditions in the secure processor environment. The vulnerability requires local access with low privileges (PR:L) and does not require user interaction (UI:N). The attack complexity is low (AC:L), and no authentication beyond low privilege is needed. The CVSS 4.0 base score is 4.8, reflecting a medium severity primarily due to the limited impact scope and the requirement for local access. No known exploits have been reported in the wild, and no patches were listed at the time of publication, indicating that mitigation may rely on future firmware updates or operational controls. The vulnerability does not appear to allow code execution or privilege escalation, limiting its impact to denial of service scenarios affecting the secure processor's functionality.

Potential Impact

For European organizations, the primary impact of CVE-2025-29949 is the potential for denial of service on systems using AMD Ryzen 4000 Series Mobile Processors with Radeon Graphics. This could disrupt critical business operations, especially in sectors relying on mobile computing devices for secure processing tasks, such as government, finance, and healthcare. The inability to maintain secure processor integrity may lead to system instability or forced reboots, impacting availability. Since the vulnerability requires local access with low privileges, the risk is higher in environments where endpoint security controls are weak or where insider threats exist. The lack of remote exploitability reduces the risk of widespread attacks but does not eliminate targeted attacks against high-value assets. Organizations with extensive deployment of affected AMD mobile processors in laptops or mobile workstations may experience operational disruptions if exploited. Additionally, the secure processor's role in cryptographic operations and secure boot processes means that denial of service could indirectly affect system trustworthiness and compliance with security standards.

Mitigation Recommendations

1. Monitor AMD's official channels for firmware or microcode updates addressing CVE-2025-29949 and apply them promptly once available. 2. Restrict physical and local access to devices equipped with AMD Ryzen 4000 mobile processors to trusted personnel only, minimizing the risk of local exploitation. 3. Implement strict endpoint security policies, including least privilege principles and robust user account management, to reduce the likelihood of low-privilege attackers gaining access. 4. Employ system integrity monitoring and alerting to detect unusual reboots, crashes, or secure processor failures indicative of exploitation attempts. 5. Consider deploying hardware-based security solutions or endpoint detection and response (EDR) tools capable of identifying anomalous behavior related to secure processor operations. 6. Educate IT staff and users about the risks of local attacks and the importance of device security, especially in mobile and remote work scenarios. 7. For critical environments, evaluate the feasibility of temporarily limiting use of affected hardware until patches are available or alternative hardware is deployed.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
AMD
Date Reserved
2025-03-12T15:15:04.911Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 698b8e904b57a58fa1272705

Added to database: 2/10/2026, 8:01:20 PM

Last enriched: 2/10/2026, 8:17:05 PM

Last updated: 2/21/2026, 12:22:03 AM

Views: 8

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats