Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-54515: CWE-1284 Improper Validation of Specified Quantity in Input in AMD Versal™ Adaptive SoC Devices

0
Low
VulnerabilityCVE-2025-54515cvecve-2025-54515cwe-1284
Published: Sun Nov 23 2025 (11/23/2025, 17:15:28 UTC)
Source: CVE Database V5
Vendor/Project: AMD
Product: Versal™ Adaptive SoC Devices

Description

The Secure Flag passed to Versal™ Adaptive SoC’s Arm® Trusted Firmware for Cortex®-A processors (TF-A) for Arm’s Power State Coordination Interface (PSCI) commands were incorrectly set to secure instead of using the processor’s actual security state. This would allow the PSCI requests to appear they were from processors in the secure state instead of the non-secure state.

AI-Powered Analysis

AILast updated: 11/23/2025, 17:30:13 UTC

Technical Analysis

CVE-2025-54515 is a vulnerability identified in AMD's Versal™ Adaptive System on Chip (SoC) devices, specifically within the Arm Trusted Firmware (TF-A) implementation for Cortex-A processors. The flaw stems from improper validation of the Secure Flag in Power State Coordination Interface (PSCI) commands. PSCI is a standard interface used by the operating system to request power state changes from the firmware. In this vulnerability, the Secure Flag passed to the firmware is incorrectly set to indicate a secure processor state regardless of the actual security state of the processor core. This misrepresentation causes PSCI requests originating from non-secure processor states to be treated as if they come from secure states. The consequence is that the firmware may process PSCI commands with elevated trust, potentially allowing unauthorized or malicious PSCI requests to influence power state management or other privileged operations. The vulnerability is classified under CWE-1284, which relates to improper validation of specified quantities in input, highlighting the failure to correctly validate the security state parameter. The CVSS 4.0 score is 1.0 (low severity), reflecting that exploitation requires local access with low privileges, partial user interaction, and results in limited impact on confidentiality, integrity, and availability. No known exploits have been reported in the wild, and no patches have been published at the time of disclosure. This vulnerability primarily affects embedded systems and edge devices using AMD Versal Adaptive SoCs, which are often deployed in industrial, telecommunications, and specialized computing environments. The flaw could be leveraged by an attacker with local access to escalate privileges or disrupt power management functions, but the overall risk is mitigated by the requirement for local presence and limited impact scope.

Potential Impact

For European organizations, the impact of CVE-2025-54515 is generally low but context-dependent. Organizations deploying AMD Versal Adaptive SoC devices in critical infrastructure, industrial control systems, or telecommunications equipment could face risks if attackers gain local access to these devices. The vulnerability could allow unauthorized PSCI commands to be processed with elevated privileges, potentially leading to denial of service through improper power state transitions or limited privilege escalation. However, the low CVSS score and requirement for local access reduce the likelihood of widespread exploitation. Confidentiality and integrity impacts are minimal, but availability could be affected if power management is disrupted. European sectors with embedded systems in manufacturing, energy, or telecom may need to consider this vulnerability in their risk assessments. The absence of known exploits and patches means organizations should prioritize monitoring and access controls while awaiting vendor remediation. Overall, the threat is unlikely to cause large-scale disruption but could be leveraged in targeted attacks against specific high-value embedded systems.

Mitigation Recommendations

To mitigate CVE-2025-54515, European organizations should implement strict local access controls on devices using AMD Versal Adaptive SoCs to prevent unauthorized users from issuing PSCI commands. This includes enforcing strong authentication mechanisms, limiting physical and remote access to trusted personnel, and employing device hardening techniques. Monitoring and logging of PSCI command usage should be enabled to detect anomalous or unauthorized requests indicative of exploitation attempts. Organizations should maintain close communication with AMD and subscribe to security advisories to promptly apply patches or firmware updates once available. In environments where these SoCs are deployed in critical infrastructure, network segmentation and isolation of embedded devices can reduce exposure. Additionally, conducting security audits and penetration testing focused on firmware interfaces may help identify exploitation attempts. Finally, integrating these devices into broader endpoint detection and response (EDR) solutions can enhance visibility into suspicious activities related to PSCI commands.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
AMD
Date Reserved
2025-07-23T15:01:52.882Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69234496a8cb427b79e9d239

Added to database: 11/23/2025, 5:29:58 PM

Last enriched: 11/23/2025, 5:30:13 PM

Last updated: 11/23/2025, 7:42:19 PM

Views: 6

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats