Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Wed, 26 Nov 2025 19:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:amd:uprof:*:*:*:*:*:freebsd:*:* cpe:2.3:a:amd:uprof:*:*:*:*:*:linux:*:* cpe:2.3:a:amd:uprof:*:*:*:*:*:windows:*:* |
Wed, 26 Nov 2025 11:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Amd
Amd uprof |
|
| Vendors & Products |
Amd
Amd uprof |
Mon, 24 Nov 2025 22:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Mon, 24 Nov 2025 21:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Improper input validation within AMD uprof can allow a local attacker to write to an arbitrary physical address, potentially resulting in crash or denial of service. | |
| Weaknesses | CWE-1285 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: AMD
Published:
Updated: 2025-11-24T21:13:33.411Z
Reserved: 2025-05-22T16:34:02.896Z
Link: CVE-2025-48511
Updated: 2025-11-24T21:13:17.519Z
Status : Analyzed
Published: 2025-11-24T21:16:03.437
Modified: 2025-11-26T18:45:48.097
Link: CVE-2025-48511
No data.
OpenCVE Enrichment
Updated: 2025-11-26T11:10:48Z