CVE-2025-62862: n/a
Ampere AmpereOne AC03 devices before 3.5.9.3, AmpereOne AC04 devices before 4.4.5.2, and AmpereOne M devices before 5.4.5.1 allow an incorrectly formed SMC call to UEFI-MM Boot Error Record Table driver that could result in (1) an out-of-bounds read which leaks Secure-EL0 information to a process running in Non-Secure state or (2) an out-of-bounds write which corrupts Secure or Non-Secure memory, limited to memory mapped to UEFI-MM Secure Partition by the Secure Partition Manager.
AI Analysis
Technical Summary
CVE-2025-62862 is a vulnerability identified in Ampere AmpereOne AC03, AC04, and M devices running firmware versions before 3.5.9.3, 4.4.5.2, and 5.4.5.1 respectively. The issue stems from an improperly validated Secure Monitor Call (SMC) directed at the UEFI-MM Boot Error Record Table driver. This driver operates within the UEFI Memory Management (UEFI-MM) Secure Partition, managed by the Secure Partition Manager. The malformed SMC can cause an out-of-bounds read (CWE-125) or out-of-bounds write (CWE-787) in memory regions allocated to the secure partition. The out-of-bounds read can leak sensitive Secure-EL0 information—data accessible only in the highest privilege level of the ARM TrustZone secure world—to processes running in the non-secure state, potentially exposing confidential information. The out-of-bounds write can corrupt memory in either secure or non-secure partitions, risking system stability and integrity. Exploitation requires local access with high privileges, no user interaction is needed, and the attack surface is limited to systems running vulnerable firmware. The CVSS v3.1 base score is 4.6 (medium), reflecting the limited attack vector (local), the requirement for high privileges, and the partial impact on integrity and availability but no direct confidentiality impact. No patches or exploits are currently publicly available, but the vulnerability highlights risks in secure firmware interfaces and the importance of robust input validation in secure partition management.
Potential Impact
For European organizations, especially those operating critical infrastructure, cloud data centers, or telecommunications relying on AmpereOne hardware, this vulnerability poses a risk of sensitive secure-world data leakage and potential system corruption. Leakage of Secure-EL0 information could expose cryptographic keys, secure boot parameters, or other sensitive firmware data, undermining trust in device security. Memory corruption could lead to denial of service or privilege escalation scenarios if combined with other vulnerabilities. Although exploitation requires high privileges and local access, insider threats or compromised administrative accounts could leverage this flaw to escalate attacks. The impact on confidentiality and integrity could affect compliance with GDPR and other data protection regulations, particularly if sensitive data is exposed. Availability risks could disrupt services relying on these devices. The absence of known exploits reduces immediate risk but does not eliminate the threat, especially as attackers may develop exploits once patches are released.
Mitigation Recommendations
European organizations should inventory their hardware to identify use of AmpereOne AC03, AC04, and M devices and verify firmware versions. Until patches are available, restrict administrative and local access to trusted personnel only, and monitor for unusual activity on affected devices. Implement strict access controls and network segmentation to limit exposure of vulnerable systems. Employ runtime integrity monitoring and anomaly detection to identify potential exploitation attempts. Coordinate with Ampere for timely firmware updates and apply patches as soon as they are released. Additionally, review Secure Partition Manager configurations to ensure minimal attack surface and validate that only authorized SMC calls are permitted. Conduct regular security audits of firmware and UEFI components to detect similar vulnerabilities proactively. Finally, maintain incident response readiness to quickly contain and remediate any exploitation attempts.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland, Poland, Italy
CVE-2025-62862: n/a
Description
Ampere AmpereOne AC03 devices before 3.5.9.3, AmpereOne AC04 devices before 4.4.5.2, and AmpereOne M devices before 5.4.5.1 allow an incorrectly formed SMC call to UEFI-MM Boot Error Record Table driver that could result in (1) an out-of-bounds read which leaks Secure-EL0 information to a process running in Non-Secure state or (2) an out-of-bounds write which corrupts Secure or Non-Secure memory, limited to memory mapped to UEFI-MM Secure Partition by the Secure Partition Manager.
AI-Powered Analysis
Technical Analysis
CVE-2025-62862 is a vulnerability identified in Ampere AmpereOne AC03, AC04, and M devices running firmware versions before 3.5.9.3, 4.4.5.2, and 5.4.5.1 respectively. The issue stems from an improperly validated Secure Monitor Call (SMC) directed at the UEFI-MM Boot Error Record Table driver. This driver operates within the UEFI Memory Management (UEFI-MM) Secure Partition, managed by the Secure Partition Manager. The malformed SMC can cause an out-of-bounds read (CWE-125) or out-of-bounds write (CWE-787) in memory regions allocated to the secure partition. The out-of-bounds read can leak sensitive Secure-EL0 information—data accessible only in the highest privilege level of the ARM TrustZone secure world—to processes running in the non-secure state, potentially exposing confidential information. The out-of-bounds write can corrupt memory in either secure or non-secure partitions, risking system stability and integrity. Exploitation requires local access with high privileges, no user interaction is needed, and the attack surface is limited to systems running vulnerable firmware. The CVSS v3.1 base score is 4.6 (medium), reflecting the limited attack vector (local), the requirement for high privileges, and the partial impact on integrity and availability but no direct confidentiality impact. No patches or exploits are currently publicly available, but the vulnerability highlights risks in secure firmware interfaces and the importance of robust input validation in secure partition management.
Potential Impact
For European organizations, especially those operating critical infrastructure, cloud data centers, or telecommunications relying on AmpereOne hardware, this vulnerability poses a risk of sensitive secure-world data leakage and potential system corruption. Leakage of Secure-EL0 information could expose cryptographic keys, secure boot parameters, or other sensitive firmware data, undermining trust in device security. Memory corruption could lead to denial of service or privilege escalation scenarios if combined with other vulnerabilities. Although exploitation requires high privileges and local access, insider threats or compromised administrative accounts could leverage this flaw to escalate attacks. The impact on confidentiality and integrity could affect compliance with GDPR and other data protection regulations, particularly if sensitive data is exposed. Availability risks could disrupt services relying on these devices. The absence of known exploits reduces immediate risk but does not eliminate the threat, especially as attackers may develop exploits once patches are released.
Mitigation Recommendations
European organizations should inventory their hardware to identify use of AmpereOne AC03, AC04, and M devices and verify firmware versions. Until patches are available, restrict administrative and local access to trusted personnel only, and monitor for unusual activity on affected devices. Implement strict access controls and network segmentation to limit exposure of vulnerable systems. Employ runtime integrity monitoring and anomaly detection to identify potential exploitation attempts. Coordinate with Ampere for timely firmware updates and apply patches as soon as they are released. Additionally, review Secure Partition Manager configurations to ensure minimal attack surface and validate that only authorized SMC calls are permitted. Conduct regular security audits of firmware and UEFI components to detect similar vulnerabilities proactively. Finally, maintain incident response readiness to quickly contain and remediate any exploitation attempts.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- mitre
- Date Reserved
- 2025-10-24T00:00:00.000Z
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 694194749050fe8508060890
Added to database: 12/16/2025, 5:18:44 PM
Last enriched: 12/23/2025, 6:14:12 PM
Last updated: 2/7/2026, 12:26:55 AM
Views: 38
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-25762: CWE-400: Uncontrolled Resource Consumption in adonisjs core
HighCVE-2026-25754: CWE-1321: Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution') in adonisjs core
HighCVE-2026-25644: CWE-295: Improper Certificate Validation in datahub-project datahub
HighCVE-2026-25804: CWE-287: Improper Authentication in antrea-io antrea
HighCVE-2026-25803: CWE-798: Use of Hard-coded Credentials in denpiligrim 3dp-manager
CriticalActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.