CVE-2025-0035

7.3 HIGH

📋 TL;DR

This vulnerability allows a local attacker to escalate privileges by exploiting an unquoted search path in AMD Cloud Manageability Service. Attackers could place malicious executables in directories that the service searches, leading to arbitrary code execution with elevated privileges. This affects systems running vulnerable versions of AMD Cloud Manageability Service.

💻 Affected Systems

Products:
  • AMD Cloud Manageability Service
Versions: Specific versions not detailed in advisory; check AMD SB-9015 for exact affected versions
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects systems with AMD Cloud Manageability Service installed. The vulnerability exists in how the service handles path searches for executables.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full system compromise with administrative privileges, allowing installation of persistent malware, data theft, and complete control over the affected system.

🟠

Likely Case

Local privilege escalation enabling attackers to bypass security controls, install additional malware, and access sensitive system resources.

🟢

If Mitigated

Limited impact if proper access controls prevent local users from writing to vulnerable directories or if the service runs with minimal privileges.

🌐 Internet-Facing: LOW - This requires local access to the system and cannot be exploited remotely over the internet.
🏢 Internal Only: HIGH - Malicious insiders or attackers who gain initial access through other means can exploit this to escalate privileges within the network.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires local access and ability to write to directories in the search path. This is a classic unquoted service path vulnerability.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check AMD advisory SB-9015 for specific patched versions

Vendor Advisory: https://www.amd.com/en/resources/product-security/bulletin/amd-sb-9015.html

Restart Required: Yes

Instructions:

1. Visit AMD advisory SB-9015. 2. Download the latest version of AMD Cloud Manageability Service. 3. Install the update following AMD's instructions. 4. Restart the system to ensure the updated service loads.

🔧 Temporary Workarounds

Restrict directory permissions

windows

Modify permissions on directories in the service's search path to prevent non-administrative users from writing executable files.

icacls "C:\Program Files\AMD\Cloud Manageability" /deny Users:(OI)(CI)W

Quote service paths

windows

Manually edit the service configuration to use fully quoted paths in the service executable path.

sc config "AMD Cloud Manageability Service" binPath= "\"C:\Program Files\AMD\Cloud Manageability\service.exe\""

🧯 If You Can't Patch

  • Implement strict access controls to prevent unauthorized local users from writing to directories in the service's search path.
  • Monitor for suspicious file creation in directories associated with AMD Cloud Manageability Service and for unexpected service restarts.

🔍 How to Verify

Check if Vulnerable:

Check if AMD Cloud Manageability Service is installed and review the service path configuration for unquoted paths containing spaces.

Check Version:

sc query "AMD Cloud Manageability Service" | findstr /C:"BINARY_PATH_NAME"

Verify Fix Applied:

Verify the service version matches the patched version from AMD advisory SB-9015 and confirm the service path is properly quoted.

📡 Detection & Monitoring

Log Indicators:

  • Unexpected service restarts of AMD Cloud Manageability Service
  • File creation events in AMD Cloud Manageability directories by non-admin users

Network Indicators:

  • None - this is a local privilege escalation vulnerability

SIEM Query:

EventID=4688 AND ProcessName LIKE '%AMD Cloud Manageability%' AND CommandLine CONTAINS 'unusual'

🔗 References

📤 Share & Export