Home

Description

Improper isolation of shared resources within the CPU operation cache on Zen 2-based products could allow an attacker to corrupt instructions executed at a different privilege level, potentially resulting in privilege escalation.

PUBLISHED Reserved 2025-07-23 | Published 2026-05-15 | Updated 2026-05-16 | Assigner AMD




HIGH: 7.3CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N

Problem types

CWE-1189 Improper Isolation of Shared Resources on System-on-a-Chip (SoC)

Product status

Default status
affected

os kernel
unaffected

Default status
affected

RenoirPI-FP6_1.0.0.Ed
unaffected

Default status
affected

MendocinoPI-FT6_1.0.0.7f
unaffected

Default status
affected

ComboAM4v2 1.2.0.10
unaffected

Default status
affected

ChagallWSPI-sWRX8-1.0.0.D
unaffected

Default status
affected

CezannePI-FP6_1.0.1.1d
unaffected

Default status
affected

CastlePeakWSPI-sWRX8 1.0.0.I
unaffected

Default status
affected

CezannePI-FP6_1.0.1.1d
unaffected

Default status
affected

CezannePI-FP6_1.0.1.1d
unaffected

Default status
affected

ComboAM4v2 1.2.0.10
unaffected

Default status
affected

ComboAM4v2 1.2.0.10
unaffected

Default status
affected

ComboAM4PI 1.0.0.10
unaffected

Default status
affected

OS kernel
unaffected

Default status
affected

EmbeddedV2KAPI-FP6 1.0.0.A
unaffected

Default status
affected

EmbeddedPI-FP6_1.0.0.D
unaffected

References

www.openwall.com/lists/oss-security/2026/05/12/15

xenbits.xen.org/xsa/advisory-490.html

www.amd.com/...es/product-security/bulletin/AMD-SB-7052.html

cve.org (CVE-2025-54518)

nvd.nist.gov (CVE-2025-54518)

Download JSON