Home

Description

Improper Access Control in an on-chip debug interface could allow a privileged attacker to enable a debug interface and potentially compromise data confidentiality or integrity.

PUBLISHED Reserved 2025-06-17 | Published 2026-02-12 | Updated 2026-02-12 | Assigner AMD




HIGH: 8.7CVSS:4.0/AV:N/AC:H/AT:P/PR:H/UI:N/VC:H/VI:H/VA:N/SC:H/SI:H/SA:N

Problem types

CWE-1191 On-Chip Debug and Test Interface With Improper Access Control

Product status

Default status
affected

MilanPI 1.0.0.G
unaffected

Default status
affected

No Fix Planned
affected

Default status
affected

No Fix Planned
affected

Default status
affected

Update to Key Distribution Server (KDS)
unaffected

Default status
affected

Update to Key Distribution Server (KDS)
unaffected

Default status
affected

Update to Key Distribution Server (KDS)
unaffected

Default status
affected

Update to Key Distribution Server (KDS)
unaffected

Default status
affected

Update to Key Distribution Server (KDS)
unaffected

Default status
affected

Update to Key Distribution Server (KDS)
unaffected

Default status
affected

Update to Key Distribution Server (KDS)
unaffected

Default status
affected

Update to Key Distribution Server (KDS)
unaffected

Default status
affected

Update to Key Distribution Server (KDS)
unaffected

Default status
affected

Update to Key Distribution Server (KDS)
unaffected

Default status
affected

Update to Key Distribution Server (KDS)
unaffected

Default status
affected

Update to Key Distribution Server (KDS)
unaffected

Default status
affected

Update to Key Distribution Server (KDS)
unaffected

Default status
affected

Update to Key Distribution Server (KDS)
unaffected

Default status
affected

Update to Key Distribution Server (KDS)
unaffected

Default status
affected

Update to Key Distribution Server (KDS)
unaffected

Default status
affected

Update to Key Distribution Server (KDS)
unaffected

Default status
affected

Update to Key Distribution Server (KDS)
unaffected

Default status
affected

Update to Key Distribution Server (KDS)
unaffected

Default status
affected

Update to Key Distribution Server (KDS)
unaffected

Default status
affected

Update to Key Distribution Server (KDS)
unaffected

Default status
affected

Update to Key Distribution Server (KDS)
unaffected

Default status
affected

Update to Key Distribution Server (KDS)
unaffected

Default status
affected

Update to Key Distribution Server (KDS)
unaffected

Default status
affected

Update to Key Distribution Server (KDS)
unaffected

Default status
affected

No fix planned
affected

Default status
affected

No fix planned
affected

Default status
affected

EmbMilanPI-SP3 v9 1.0.0.C
unaffected

Default status
affected

Update to Key Distribution Server (KDS)
unaffected

Default status
affected

Update to Key Distribution Server (KDS)
unaffected

Default status
affected

Update to Key Distribution Server (KDS)
unaffected

Default status
affected

Update to Key Distribution Server (KDS)
unaffected

Default status
affected

Update to Key Distribution Server (KDS)
unaffected

Default status
affected

Update to Key Distribution Server (KDS)
unaffected

Default status
affected

Update to Key Distribution Server (KDS)
unaffected

Default status
affected

Update to Key Distribution Server (KDS)
unaffected

References

www.amd.com/...es/product-security/bulletin/AMD-SB-4013.html

www.amd.com/...es/product-security/bulletin/AMD-SB-3023.html

cve.org (CVE-2025-52533)

nvd.nist.gov (CVE-2025-52533)

Download JSON