Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-62863: n/a

0
Critical
VulnerabilityCVE-2025-62863cvecve-2025-62863
Published: Tue Dec 16 2025 (12/16/2025, 00:00:00 UTC)
Source: CVE Database V5

Description

Ampere AmpereOne AC03 devices before 3.5.9.3, AmpereOne AC04 devices before 4.4.5.2, and AmpereOne M devices before 5.4.5.1 allow an incorrectly formed SMC call to UEFI-MM PCIe driver that could result in an out-of-bounds write within PCIe driver’s S-EL0 address space.

AI-Powered Analysis

AILast updated: 12/23/2025, 18:17:43 UTC

Technical Analysis

CVE-2025-62863 is a critical vulnerability identified in Ampere's AmpereOne AC03, AC04, and M series devices, specifically affecting firmware versions before 3.5.9.3, 4.4.5.2, and 5.4.5.1 respectively. The flaw arises from an out-of-bounds write condition within the PCIe driver's S-EL0 address space, triggered by an incorrectly formed Secure Monitor Call (SMC) to the UEFI-MM PCIe driver. This vulnerability is classified under CWE-787 (Out-of-bounds Write), which can lead to memory corruption. Exploitation does not require any privileges or user interaction, making it highly accessible to remote attackers. Successful exploitation can result in arbitrary code execution at a low privilege level, potentially escalating to full system compromise, or cause denial of service through system crashes. The vulnerability impacts the confidentiality, integrity, and availability of affected systems. Although no public exploits have been reported yet, the critical CVSS score of 9.8 underscores the severity and ease of exploitation. The affected devices are commonly deployed in cloud and data center environments, where they manage PCIe device communications at the firmware level, making this vulnerability particularly dangerous in high-value infrastructure contexts.

Potential Impact

For European organizations, the impact of CVE-2025-62863 is substantial. Given the critical nature of the vulnerability and the high CVSS score, exploitation could lead to complete system compromise, data breaches, or service outages. Organizations relying on AmpereOne AC03, AC04, or M devices in their data centers or cloud infrastructure could face operational disruptions and loss of sensitive data. The vulnerability's ability to be exploited remotely without authentication increases the attack surface, especially for exposed management interfaces or multi-tenant environments. This could affect sectors such as finance, telecommunications, government, and cloud service providers, where uptime and data integrity are paramount. Additionally, the potential for arbitrary code execution at the firmware level could allow attackers to bypass traditional security controls, making detection and remediation more challenging. The absence of known exploits in the wild currently provides a window for proactive defense, but the risk of rapid weaponization remains high.

Mitigation Recommendations

Immediate mitigation involves monitoring for firmware updates from Ampere and applying them as soon as they become available to address the out-of-bounds write vulnerability. Until patches are released, organizations should restrict access to management interfaces and PCIe device communication channels to trusted networks only. Implement network segmentation to isolate affected devices and reduce exposure. Employ enhanced logging and anomaly detection focused on SMC calls and PCIe driver interactions to identify potential exploitation attempts. Conduct thorough firmware integrity checks and consider deploying runtime firmware protection mechanisms if supported. Coordinate with hardware vendors and cloud providers to confirm the presence of vulnerable firmware versions and remediation timelines. Additionally, review and harden supply chain security to prevent introduction of compromised firmware images. Finally, prepare incident response plans specific to firmware-level compromises to enable rapid containment and recovery.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
mitre
Date Reserved
2025-10-24T00:00:00.000Z
Cvss Version
null
State
PUBLISHED

Threat ID: 694194749050fe850806087a

Added to database: 12/16/2025, 5:18:44 PM

Last enriched: 12/23/2025, 6:17:43 PM

Last updated: 2/7/2026, 9:32:25 PM

Views: 36

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats