Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-48510: CWE-394 Unexpected Status Code or Return Value in AMD AMD μProf

0
High
VulnerabilityCVE-2025-48510cvecve-2025-48510cwe-394
Published: Mon Nov 24 2025 (11/24/2025, 20:56:39 UTC)
Source: CVE Database V5
Vendor/Project: AMD
Product: AMD μProf

Description

Improper return value within AMD uProf can allow a local attacker to bypass KSLR, potentially resulting in loss of confidentiality or availability.

AI-Powered Analysis

AILast updated: 11/24/2025, 21:23:31 UTC

Technical Analysis

CVE-2025-48510 is a vulnerability identified in AMD μProf, a performance profiling tool used on AMD processors. The root cause is improper handling of return values within the software, classified under CWE-394 (Unexpected Status Code or Return Value). This flaw enables a local attacker with limited privileges (PR:L) to bypass Kernel Shadow Stack Return (KSLR) protections, a security mechanism designed to prevent control-flow hijacking attacks by protecting return addresses on the stack. By circumventing KSLR, an attacker can potentially execute unauthorized code paths or manipulate kernel execution flow, leading to loss of confidentiality and availability. The vulnerability does not require user interaction (UI:N) and affects the confidentiality (C:H) and availability (A:H) of the system, but not integrity (I:N). The attack vector is local (AV:L) with low attack complexity (AC:L), meaning an attacker must have some level of local access but can exploit the vulnerability without complex conditions. No patches or exploits are currently publicly available, but the vulnerability is published and should be considered a significant risk. The lack of affected versions specified suggests the issue may impact multiple or all versions of AMD μProf in use. This vulnerability is particularly concerning for environments where AMD μProf is deployed on critical systems, as it could allow privilege escalation or denial of service through kernel-level bypasses.

Potential Impact

For European organizations, the impact of CVE-2025-48510 can be substantial, especially in sectors relying heavily on AMD hardware and performance profiling tools, such as finance, telecommunications, government, and critical infrastructure. Successful exploitation could lead to unauthorized access to sensitive kernel memory, potentially exposing confidential data or disrupting system availability. This could result in operational downtime, data breaches, or compromise of critical services. Since the vulnerability requires local access with some privileges, insider threats or attackers who gain initial footholds could leverage this flaw to escalate privileges or disable security protections. The loss of confidentiality and availability at the kernel level could undermine trust in system integrity and complicate incident response. European organizations with stringent data protection regulations (e.g., GDPR) may face compliance risks if this vulnerability is exploited to leak personal or sensitive data.

Mitigation Recommendations

Organizations should monitor AMD’s official channels for patches addressing CVE-2025-48510 and apply them promptly once available. Until patches are released, restrict local access to systems running AMD μProf to trusted administrators only, employing strict access control policies and multi-factor authentication where possible. Implement robust endpoint detection and response (EDR) solutions to detect unusual kernel-level activities or attempts to bypass KSLR protections. Conduct regular audits of user privileges and remove unnecessary local accounts or permissions. Consider isolating systems running AMD μProf in segmented network zones to limit lateral movement. Additionally, maintain up-to-date system and kernel security configurations, and employ kernel integrity monitoring tools to detect anomalies. Educate system administrators about the risks of local privilege escalation vulnerabilities and encourage vigilance for suspicious behaviors. Finally, document and test incident response plans to quickly address potential exploitation scenarios.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
AMD
Date Reserved
2025-05-22T16:34:02.896Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6924c9b1e1f3fb2621007d74

Added to database: 11/24/2025, 9:10:09 PM

Last enriched: 11/24/2025, 9:23:31 PM

Last updated: 11/25/2025, 3:57:57 AM

Views: 8

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats