Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-61969: CWE-732 Incorrect Permission Assignment for Critical Resource in AMD AMD µProf

0
High
VulnerabilityCVE-2025-61969cvecve-2025-61969cwe-732
Published: Wed Feb 11 2026 (02/11/2026, 14:47:35 UTC)
Source: CVE Database V5
Vendor/Project: AMD
Product: AMD µProf

Description

Incorrect permission assignment in AMD µProf may allow a local user-privileged attacker to achieve privilege escalation, potentially resulting in arbitrary code execution.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/27/2026, 08:21:20 UTC

Technical Analysis

CVE-2025-61969 is a vulnerability identified in AMD's performance profiling tool, AMD µProf. The root cause is an incorrect permission assignment (CWE-732) on critical resources within the software, which allows a local user with limited privileges to escalate their privileges to a higher level. This escalation can lead to arbitrary code execution, compromising the confidentiality, integrity, and availability of the system. The vulnerability requires local access and some user interaction but does not require prior authentication, making it a significant risk in environments where multiple users share access or where local user accounts are not tightly controlled. The CVSS 4.0 score of 7 reflects a high severity, with low attack complexity but requiring local access and user interaction. While no exploits are currently known in the wild, the potential impact on systems running AMD µProf is considerable, especially in enterprise and research environments relying on AMD processors and profiling tools. The vulnerability highlights the importance of proper permission management in software components that interact closely with system resources and hardware profiling features.

Potential Impact

The vulnerability allows local attackers to escalate privileges, potentially gaining administrative or system-level control. This can lead to arbitrary code execution, enabling attackers to install malware, alter system configurations, or exfiltrate sensitive data. The compromise of integrity and availability could disrupt critical performance monitoring and profiling activities, impacting system diagnostics and optimization. Organizations with shared user environments or insufficient local user restrictions are particularly vulnerable. The impact extends to any environment using AMD µProf, including development, testing, and production systems, potentially affecting cloud providers, research institutions, and enterprises relying on AMD hardware. The absence of known exploits currently limits immediate widespread impact, but the vulnerability presents a significant risk if weaponized.

Mitigation Recommendations

1. Monitor AMD’s official channels for patches or updates addressing CVE-2025-61969 and apply them promptly once available. 2. Restrict local user permissions rigorously, ensuring that only trusted users have access to AMD µProf and related profiling tools. 3. Limit the installation of AMD µProf to trusted administrative environments and avoid unnecessary deployment on multi-user systems. 4. Implement application whitelisting and endpoint protection to detect and prevent unauthorized code execution attempts. 5. Conduct regular audits of file and resource permissions related to AMD µProf to detect and remediate improper assignments. 6. Educate users about the risks of local privilege escalation and enforce strict user interaction policies to reduce exploitation likelihood. 7. Consider isolating profiling tools in virtualized or containerized environments to limit the scope of potential compromise.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
AMD
Date Reserved
2025-10-04T18:09:57.018Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 698c99bc4b57a58fa19e33d4

Added to database: 2/11/2026, 3:01:16 PM

Last enriched: 2/27/2026, 8:21:20 AM

Last updated: 3/30/2026, 8:32:03 AM

Views: 65

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses