Home

Description

Improper isolation of shared resources on a system on a chip by a malicious local attacker with high privileges could potentially lead to a partial loss of integrity.

PUBLISHED Reserved 2025-07-23 | Published 2026-02-10 | Updated 2026-02-11 | Assigner AMD




MEDIUM: 4.8CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N

Problem types

CWE-1189 Improper Isolation of Shared Resources on System-on-a-Chip (SoC)

Product status

Default status
affected

TurinPI 1.0.0.6
unaffected

Default status
affected

FireRangeFL1 PI-1.0.0.0d
unaffected

Default status
affected

StrixKrackanPI-FP8_1.1.0.0d
unaffected

GorgonPI-FP8_1.0.0.0
unaffected

Default status
affected

ComboAM5 PI 1.2.0.3h
unaffected

Default status
affected

StrixHaloPI-FP11_1.0.0.1c
unaffected

Default status
affected

StrixKrackanPI-FP8_1.1.0.0d
unaffected

Default status
affected

GorgonPI-FP8_1.0.0.0
unaffected

Default status
affected

ShimadaPeakPI-SP6_1.0.0.1b
unaffected

Default status
affected

ShimadaPeakPI-SP6_1.0.0.1b
unaffected

Default status
affected

EmbTurinPI-SP5_1.0.0.1
unaffected

References

www.amd.com/...es/product-security/bulletin/AMD-SB-4013.html

www.amd.com/...es/product-security/bulletin/AMD-SB-3023.html

cve.org (CVE-2025-54514)

nvd.nist.gov (CVE-2025-54514)

Download JSON