Improper input validation in the AMD Secure Processor (ASP) PCI driver could allow a local attacker to trigger a Use-After-Free (UAF) condition, potentially resulting in a loss of platform integrity or crash.
Metrics
Affected Vendors & Products
References
History
Fri, 15 May 2026 03:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Title | Improper Input Validation In AMD Secure Processor PCI Driver Leads To Local Use‑After‑Free |
Fri, 15 May 2026 02:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Improper input validation in the AMD Secure Processor (ASP) PCI driver could allow a local attacker to trigger a Use-After-Free (UAF) condition, potentially resulting in a loss of platform integrity or crash. | |
| Weaknesses | CWE-416 | |
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: AMD
Published: 2026-05-15T01:45:34.221Z
Updated: 2026-05-15T01:45:34.221Z
Reserved: 2025-05-22T16:34:07.748Z
Link: CVE-2025-48521
No data.
Status : Received
Published: 2026-05-15T02:16:23.077
Modified: 2026-05-15T02:16:23.077
Link: CVE-2025-48521
No data.
ReportizFlow