Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-48502: CWE-1285 Improper Validation of Specified Index, Position, or Offset in Input in AMD AMD μProf

0
Medium
VulnerabilityCVE-2025-48502cvecve-2025-48502cwe-1285
Published: Fri Nov 21 2025 (11/21/2025, 19:07:34 UTC)
Source: CVE Database V5
Vendor/Project: AMD
Product: AMD μProf

Description

Improper input validation within AMD uprof can allow a local attacker to overwrite MSR registers, potentially resulting in crash or denial of service.

AI-Powered Analysis

AILast updated: 11/28/2025, 22:45:36 UTC

Technical Analysis

CVE-2025-48502 is a vulnerability identified in AMD μProf, a performance profiling tool used primarily for analyzing AMD processor behavior. The root cause is improper validation of specified indexes, positions, or offsets in input parameters, classified under CWE-1285. This flaw allows a local attacker with limited privileges to overwrite Model-Specific Registers (MSRs), which are special CPU registers used to control hardware functions and performance monitoring. Overwriting MSRs improperly can lead to system instability, crashes, or denial of service conditions. The vulnerability requires local access (AV:L) and low attack complexity (AC:L), with privileges required (PR:L) but no user interaction (UI:N). The scope is unchanged (S:U), and the impact affects availability only (A:H), with no confidentiality or integrity impact. The CVSS v3.1 base score is 5.5, indicating a medium severity. No patches or known exploits are currently available, but the vulnerability is publicly disclosed and assigned a CVE ID. The lack of patch links suggests that mitigation depends on future vendor updates or workarounds. Since AMD μProf is used mainly by system administrators and performance engineers, the attack surface is limited to local users with some privileges on affected systems.

Potential Impact

For European organizations, the primary impact of CVE-2025-48502 is operational disruption due to potential system crashes or denial of service on machines running AMD μProf. This can affect performance monitoring and profiling activities critical for optimizing server and workstation environments. Industries relying heavily on AMD hardware for compute-intensive tasks, such as finance, manufacturing, research, and critical infrastructure, may experience downtime or degraded system reliability. While confidentiality and integrity are not directly compromised, availability issues can lead to loss of productivity and increased operational costs. Organizations with strict uptime requirements or those using AMD μProf in production environments should be particularly cautious. The vulnerability does not enable remote exploitation, limiting its impact to insider threats or compromised local accounts.

Mitigation Recommendations

To mitigate CVE-2025-48502, European organizations should: 1) Monitor AMD’s official channels for patches or updates addressing this vulnerability and apply them promptly once released. 2) Restrict access to AMD μProf and related profiling tools to trusted administrators only, minimizing the number of users with local privileges. 3) Implement strict local user account management and auditing to detect unauthorized access attempts. 4) Use endpoint protection solutions capable of monitoring unusual local activity or attempts to manipulate MSRs. 5) Consider isolating systems running AMD μProf from critical production environments until a patch is available. 6) Educate system administrators about the risks of improper input validation vulnerabilities and the importance of applying security updates. 7) If possible, disable or uninstall AMD μProf on systems where it is not essential to reduce the attack surface.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
AMD
Date Reserved
2025-05-22T16:34:02.895Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6920b9ca4429ea99a5688864

Added to database: 11/21/2025, 7:13:14 PM

Last enriched: 11/28/2025, 10:45:36 PM

Last updated: 1/8/2026, 12:42:41 PM

Views: 66

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats