CVE-2025-48502

5.5 MEDIUM

📋 TL;DR

This vulnerability in AMD uprof allows a local attacker to overwrite Model-Specific Registers (MSRs) due to improper input validation. This could lead to system crashes or denial of service. It affects systems running vulnerable versions of AMD uprof software.

💻 Affected Systems

Products:
  • AMD uprof
Versions: Specific versions not detailed in provided reference; check AMD advisory for exact affected versions.
Operating Systems: Linux, Windows, Other OS where AMD uprof is installed
Default Config Vulnerable: ⚠️ Yes
Notes: Requires local access to execute uprof with malicious parameters. Systems without uprof installed are not affected.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system crash requiring hard reboot, potential data loss from interrupted operations, and persistent denial of service until system is restored.

🟠

Likely Case

System instability leading to application crashes or temporary denial of service, requiring system restart to recover normal operation.

🟢

If Mitigated

Limited impact with proper access controls preventing unauthorized local execution, resulting in no successful exploitation.

🌐 Internet-Facing: LOW - Requires local access to the system, cannot be exploited remotely over the network.
🏢 Internal Only: MEDIUM - Local attackers with user-level access could potentially exploit this, but requires specific conditions and knowledge of the vulnerability.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires local access and knowledge of how to craft malicious input to trigger the MSR overwrite. No public exploit code is currently known.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check AMD advisory for specific patched versions

Vendor Advisory: https://www.amd.com/en/resources/product-security/bulletin/AMD-SB-9019.html

Restart Required: Yes

Instructions:

1. Review AMD advisory AMD-SB-9019. 2. Identify affected uprof version. 3. Download and apply the latest patched version from AMD. 4. Restart the system to ensure changes take effect.

🔧 Temporary Workarounds

Restrict uprof execution

linux

Limit execution of uprof to trusted users only through file permissions or access controls.

chmod 750 /path/to/uprof
setfacl -m u:trusteduser:rx /path/to/uprof

Remove or disable uprof

linux

If uprof is not required for system operation, uninstall or disable it completely.

sudo apt remove amd-uprof
sudo yum remove amd-uprof

🧯 If You Can't Patch

  • Implement strict access controls to limit who can execute uprof on the system.
  • Monitor system logs for unusual uprof execution patterns or system crashes that might indicate exploitation attempts.

🔍 How to Verify

Check if Vulnerable:

Check installed uprof version against AMD advisory. Run: uprof --version or check package manager.

Check Version:

uprof --version

Verify Fix Applied:

Verify uprof version matches patched version from AMD advisory after update. Confirm system stability during normal uprof operations.

📡 Detection & Monitoring

Log Indicators:

  • Unexpected system crashes or reboots
  • Unusual uprof process execution patterns
  • Kernel panic logs related to MSR access

Network Indicators:

  • None - this is a local vulnerability

SIEM Query:

Process execution where process_name contains 'uprof' by non-privileged users OR System events where event_type='crash' AND process_name='uprof'

🔗 References

📤 Share & Export