In AMD Zynq UltraScale+ devices, the lack of address validation when executing CSU runtime services through the PMU Firmware can allow access to isolated or protected memory spaces resulting in the loss of integrity and confidentiality.
Metrics
Affected Vendors & Products
References
History
Wed, 08 Oct 2025 13:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Amd
Amd zynq Ultrascale+ |
|
Vendors & Products |
Amd
Amd zynq Ultrascale+ |
Mon, 06 Oct 2025 18:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Mon, 06 Oct 2025 16:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | In AMD Zynq UltraScale+ devices, the lack of address validation when executing CSU runtime services through the PMU Firmware can allow access to isolated or protected memory spaces resulting in the loss of integrity and confidentiality. | |
Weaknesses | CWE-1284 | |
References |
| |
Metrics |
cvssV3_1
|

Status: PUBLISHED
Assigner: AMD
Published: 2025-10-06T16:08:59.227Z
Updated: 2025-10-06T17:16:22.921Z
Reserved: 2024-11-21T16:18:05.485Z
Link: CVE-2025-0038

Updated: 2025-10-06T17:00:58.497Z

Status : Received
Published: 2025-10-06T17:16:03.100
Modified: 2025-10-06T17:16:03.100
Link: CVE-2025-0038

No data.