Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-62864: n/a

0
Critical
VulnerabilityCVE-2025-62864cvecve-2025-62864
Published: Tue Dec 16 2025 (12/16/2025, 00:00:00 UTC)
Source: CVE Database V5

Description

Ampere AmpereOne AC03 devices before 3.5.9.3, AmpereOne AC04 devices before 4.4.5.2, and AmpereOne M devices before 5.4.5.1 allow an incorrectly formed SMC call to UEFI-MM MMCommunicate service that could result in an out-of-bounds write within the UEFI-MM Secure Partition context.

AI-Powered Analysis

AILast updated: 12/23/2025, 18:17:55 UTC

Technical Analysis

CVE-2025-62864 is a critical vulnerability identified in Ampere AmpereOne AC03, AC04, and M series devices running UEFI firmware versions prior to 3.5.9.3, 4.4.5.2, and 5.4.5.1 respectively. The vulnerability stems from an out-of-bounds write condition triggered by an incorrectly formed Secure Monitor Call (SMC) to the UEFI-MM MMCommunicate service, which operates within the UEFI Management Mode (MM) Secure Partition context. This context is a highly privileged execution environment responsible for secure firmware operations. The out-of-bounds write (CWE-787) can corrupt memory, potentially allowing an attacker to execute arbitrary code with elevated privileges, leading to full compromise of the firmware layer. The vulnerability is remotely exploitable over the network without requiring any authentication or user interaction, as indicated by the CVSS vector (AV:N/AC:L/PR:N/UI:N). Exploitation could result in complete loss of confidentiality, integrity, and availability of the affected systems. Although no known exploits are currently reported in the wild, the critical CVSS score of 9.8 underscores the urgency of addressing this flaw. The affected devices are typically deployed in data centers and enterprise environments, where firmware integrity is paramount. The lack of available patches at the time of disclosure necessitates immediate risk mitigation through network controls and monitoring until official updates are released.

Potential Impact

The impact of CVE-2025-62864 on European organizations is significant due to the critical nature of the vulnerability and the privileged execution context it affects. Successful exploitation can lead to complete firmware compromise, allowing attackers to bypass operating system security controls, persist undetected, and potentially manipulate or disrupt critical infrastructure systems. This poses a high risk to data confidentiality, system integrity, and availability, especially in sectors relying on AmpereOne devices for server and network infrastructure. European enterprises and government agencies using these devices could face severe operational disruptions, data breaches, and long-term security ramifications. The vulnerability's network exploitability without authentication increases the attack surface, making it a prime target for sophisticated threat actors. The absence of patches at disclosure heightens the risk window, necessitating immediate defensive measures. Additionally, the potential for firmware-level compromise complicates incident response and recovery efforts, as reimaging or replacing hardware may be required to fully remediate the threat.

Mitigation Recommendations

1. Monitor vendor communications closely and apply firmware updates for AmpereOne AC03, AC04, and M devices as soon as patches become available to remediate the vulnerability. 2. Implement network-level filtering to restrict or block malformed SMC calls to the UEFI-MM MMCommunicate service, limiting exposure to remote exploitation. 3. Employ intrusion detection and prevention systems (IDPS) capable of identifying anomalous UEFI-related traffic or behavior indicative of exploitation attempts. 4. Conduct firmware integrity checks and enable secure boot features to detect unauthorized modifications to the UEFI firmware. 5. Isolate critical infrastructure systems using these devices within segmented network zones to reduce attack surface and lateral movement opportunities. 6. Develop and test incident response plans that include firmware compromise scenarios to ensure rapid containment and recovery. 7. Engage with hardware vendors for guidance on interim mitigations and best practices until official patches are deployed. 8. Maintain up-to-date asset inventories to identify all affected devices and prioritize remediation efforts accordingly.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
mitre
Date Reserved
2025-10-24T00:00:00.000Z
Cvss Version
null
State
PUBLISHED

Threat ID: 694194749050fe850806087e

Added to database: 12/16/2025, 5:18:44 PM

Last enriched: 12/23/2025, 6:17:55 PM

Last updated: 2/7/2026, 3:47:48 PM

Views: 53

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats