In AMD Zynq UltraScale+ devices, the lack of address validation when executing CSU runtime services through the PMU Firmware can allow access to isolated or protected memory spaces resulting in the loss of integrity and confidentiality.
Metrics
Affected Vendors & Products
References
History
Wed, 08 Oct 2025 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Amd
Amd zynq Ultrascale+ |
|
| Vendors & Products |
Amd
Amd zynq Ultrascale+ |
Mon, 06 Oct 2025 18:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Mon, 06 Oct 2025 16:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | In AMD Zynq UltraScale+ devices, the lack of address validation when executing CSU runtime services through the PMU Firmware can allow access to isolated or protected memory spaces resulting in the loss of integrity and confidentiality. | |
| Weaknesses | CWE-1284 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: AMD
Published: 2025-10-06T16:08:59.227Z
Updated: 2025-10-06T17:16:22.921Z
Reserved: 2024-11-21T16:18:05.485Z
Link: CVE-2025-0038
Updated: 2025-10-06T17:00:58.497Z
Status : Awaiting Analysis
Published: 2025-10-06T17:16:03.100
Modified: 2025-10-08T19:38:32.610
Link: CVE-2025-0038
No data.