{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2025-54518","assignerOrgId":"b58fc414-a1e4-4f92-9d70-1add41838648","state":"PUBLISHED","assignerShortName":"AMD","dateReserved":"2025-07-23T15:01:52.883Z","datePublished":"2026-05-15T03:06:30.822Z","dateUpdated":"2026-05-16T03:56:02.809Z"},"containers":{"cna":{"providerMetadata":{"orgId":"b58fc414-a1e4-4f92-9d70-1add41838648","shortName":"AMD","dateUpdated":"2026-05-15T03:06:57.446Z"},"datePublic":"2026-05-15T03:05:00.000Z","problemTypes":[{"descriptions":[{"lang":"en","cweId":"CWE-1189","description":"CWE-1189  Improper Isolation of Shared Resources on System-on-a-Chip (SoC)","type":"CWE"}]}],"affected":[{"vendor":"AMD","product":"AMD EPYC™ 7002 Series Processors","versions":[{"status":"unaffected","version":"os kernel"}],"defaultStatus":"affected"},{"vendor":"AMD","product":"AMD Ryzen™ 4000 Series Mobile Processors with Radeon™ Graphics","versions":[{"status":"unaffected","version":"RenoirPI-FP6_1.0.0.Ed"}],"defaultStatus":"affected"},{"vendor":"AMD","product":"AMD Ryzen™ 7020 Series Processors with Radeon™ Graphics","versions":[{"status":"unaffected","version":"MendocinoPI-FT6_1.0.0.7f"}],"defaultStatus":"affected"},{"vendor":"AMD","product":"AMD Ryzen™ 3000 Series Desktop Processors","versions":[{"status":"unaffected","version":"ComboAM4v2 1.2.0.10"}],"defaultStatus":"affected"},{"vendor":"AMD","product":"AMD Ryzen™ Threadripper™ PRO 3000 WX-Series Processors","versions":[{"status":"unaffected","version":"ChagallWSPI-sWRX8-1.0.0.D"}],"defaultStatus":"affected"},{"vendor":"AMD","product":"AMD Ryzen™ 7030 Series Mobile Processors with Radeon™ Graphics","versions":[{"status":"unaffected","version":"CezannePI-FP6_1.0.1.1d"}],"defaultStatus":"affected"},{"vendor":"AMD","product":"AMD Ryzen™ Threadripper™ PRO 3000 WX-Series Processors","versions":[{"status":"unaffected","version":"CastlePeakWSPI-sWRX8 1.0.0.I"}],"defaultStatus":"affected"},{"vendor":"AMD","product":"AMD Ryzen™ 5000 Series Mobile Processors with Radeon™ Graphics","versions":[{"status":"unaffected","version":"CezannePI-FP6_1.0.1.1d"}],"defaultStatus":"affected"},{"vendor":"AMD","product":"AMD Ryzen™ 5000 Series Mobile Processors with Radeon™ Graphics","versions":[{"status":"unaffected","version":"CezannePI-FP6_1.0.1.1d"}],"defaultStatus":"affected"},{"vendor":"AMD","product":"AMD Ryzen™ 4000 Series Desktop Processors","versions":[{"status":"unaffected","version":"ComboAM4v2 1.2.0.10"}],"defaultStatus":"affected"},{"vendor":"AMD","product":"AMD Ryzen™ 5000 Series Desktop Processors with Radeon™ Graphics","versions":[{"status":"unaffected","version":"ComboAM4v2 1.2.0.10"}],"defaultStatus":"affected"},{"vendor":"AMD","product":"AMD Ryzen™ 3000 Series Desktop Processors","versions":[{"status":"unaffected","version":"ComboAM4PI 1.0.0.10"}],"defaultStatus":"affected"},{"vendor":"AMD","product":"AMD EPYC™ Embedded 7002 Series Processors","versions":[{"status":"unaffected","version":"OS kernel"}],"defaultStatus":"affected"},{"vendor":"AMD","product":"AMD Ryzen Embedded V2000A Series Processors","versions":[{"status":"unaffected","version":"EmbeddedV2KAPI-FP6 1.0.0.A"}],"defaultStatus":"affected"},{"vendor":"AMD","product":"AMD Ryzen™ Embedded V2000 Series Processors","versions":[{"status":"unaffected","version":"EmbeddedPI-FP6_1.0.0.D"}],"defaultStatus":"affected"}],"descriptions":[{"lang":"en","value":"Improper isolation of shared resources within the CPU operation cache on Zen 2-based products could allow an attacker to corrupt instructions executed at a different privilege level, potentially resulting in privilege escalation.","supportingMedia":[{"type":"text/html","base64":false,"value":"Improper isolation of shared resources within the CPU operation cache on Zen 2-based products could allow an attacker to corrupt instructions executed at a different privilege level, potentially resulting in privilege escalation.<br>"}]}],"references":[{"url":"https://www.amd.com/en/resources/product-security/bulletin/AMD-SB-7052.html"}],"metrics":[{"format":"CVSS","scenarios":[{"lang":"en","value":"GENERAL"}],"cvssV4_0":{"attackVector":"LOCAL","attackComplexity":"HIGH","attackRequirements":"NONE","privilegesRequired":"LOW","userInteraction":"NONE","vulnConfidentialityImpact":"HIGH","subConfidentialityImpact":"NONE","vulnIntegrityImpact":"HIGH","subIntegrityImpact":"NONE","vulnAvailabilityImpact":"HIGH","subAvailabilityImpact":"NONE","exploitMaturity":"NOT_DEFINED","Safety":"NOT_DEFINED","Automatable":"NOT_DEFINED","Recovery":"NOT_DEFINED","valueDensity":"NOT_DEFINED","vulnerabilityResponseEffort":"NOT_DEFINED","providerUrgency":"NOT_DEFINED","version":"4.0","baseSeverity":"HIGH","baseScore":7.3,"vectorString":"CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N"}}],"source":{"discovery":"UNKNOWN"},"x_generator":{"engine":"AMD PSIRT Automation 1.0"}},"adp":[{"title":"CVE Program Container","references":[{"url":"http://www.openwall.com/lists/oss-security/2026/05/12/15"},{"url":"http://xenbits.xen.org/xsa/advisory-490.html"}],"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2026-05-15T03:09:03.940Z"}},{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2026-05-15T00:00:00+00:00","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"total"}],"role":"CISA Coordinator","version":"2.0.3","id":"CVE-2025-54518"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2026-05-16T03:56:02.809Z"}}]}}