Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-48509: CWE-665 Improper Initialization in AMD AMD EPYC™ 9004 Series Processors

0
Low
VulnerabilityCVE-2025-48509cvecve-2025-48509cwe-665
Published: Tue Feb 10 2026 (02/10/2026, 19:13:21 UTC)
Source: CVE Database V5
Vendor/Project: AMD
Product: AMD EPYC™ 9004 Series Processors

Description

Missing Checks in certain functions related to RMP initialization can allow a local admin privileged attacker to cause misidentification of I/O memory, potentially resulting in a loss of guest memory integrity

AI-Powered Analysis

AILast updated: 02/18/2026, 10:09:00 UTC

Technical Analysis

CVE-2025-48509 is a vulnerability classified under CWE-665 (Improper Initialization) affecting AMD EPYC™ 9004 Series processors. The issue arises from missing validation checks in certain functions responsible for Reverse Map (RMP) initialization. RMP is a hardware mechanism used to manage and track I/O memory mappings, particularly in virtualization contexts where guest virtual machines rely on accurate memory isolation and integrity. Due to improper initialization, a local attacker with administrative privileges on the host system can cause the processor to misidentify I/O memory regions. This misidentification can lead to a loss of guest memory integrity, potentially allowing unauthorized access or corruption of guest VM memory. The vulnerability requires the attacker to have high privileges locally, and the attack complexity is high, meaning exploitation is non-trivial. No user interaction is required, and the scope is limited to the local system. The CVSS 4.0 score is 1.8, reflecting low severity primarily because of the high complexity and required privileges. No known exploits have been reported in the wild, and AMD has not yet published patches, but the issue is publicly disclosed and should be addressed in future firmware or microcode updates.

Potential Impact

For European organizations, the primary impact of CVE-2025-48509 lies in environments utilizing AMD EPYC 9004 Series processors, especially in cloud data centers and virtualized infrastructures. The vulnerability could compromise the integrity of guest virtual machines by allowing a privileged local attacker to manipulate memory mappings, potentially leading to data corruption or unauthorized data access within VMs. This poses risks to confidentiality and integrity of sensitive workloads, including financial, governmental, and critical infrastructure data. Although the vulnerability does not directly affect availability and requires local admin access, insider threats or compromised administrative accounts could exploit it. Given the growing adoption of AMD EPYC processors in European data centers for cost-effective and high-performance computing, organizations in sectors such as finance, telecommunications, and public administration could be impacted if they do not apply mitigations. The low CVSS score suggests limited immediate risk, but the potential for subtle guest memory integrity issues warrants proactive management.

Mitigation Recommendations

1. Monitor AMD advisories closely and apply firmware, microcode, or BIOS updates as soon as AMD releases patches addressing this vulnerability. 2. Restrict local administrative privileges strictly to trusted personnel and implement strong access controls to reduce the risk of insider exploitation. 3. Employ hardware-based security features and virtualization security best practices, such as secure boot and trusted platform modules, to enhance system integrity. 4. Regularly audit and monitor virtualization environments for unusual memory access patterns or integrity violations that could indicate exploitation attempts. 5. Use hypervisor-level security tools that can detect anomalies in guest memory mappings. 6. Consider network segmentation and isolation of critical virtualized workloads to limit lateral movement if a host is compromised. 7. Educate system administrators about the risks of local privilege misuse and enforce multi-factor authentication for administrative access. 8. Maintain up-to-date backups of critical virtual machines to enable recovery in case of memory corruption.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
AMD
Date Reserved
2025-05-22T16:34:02.896Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 698b8b0c4b57a58fa12667bc

Added to database: 2/10/2026, 7:46:20 PM

Last enriched: 2/18/2026, 10:09:00 AM

Last updated: 2/21/2026, 12:16:03 AM

Views: 31

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats