7.2
CVE-2025-62626
- EPSS 0.02%
- Veröffentlicht 21.11.2025 18:52:57
- Zuletzt bearbeitet 15.04.2026 00:35:42
- Quelle psirt@amd.com
- CVE-Watchlists
- Unerledigt
Improper handling of insufficient entropy in the AMD CPUs could allow a local attacker to influence the values returned by the RDSEED instruction, potentially resulting in the consumption of insufficiently random values.
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
HerstellerAMD
≫
Produkt
AMD Ryzen™ 9000HX Series Processors
Default Statusaffected
Version
FireRangeFL1PI 1.0.0.0e
Status
unaffected
HerstellerAMD
≫
Produkt
AMD EPYC™ 9005 Series Processors
Default Statusaffected
Version
Turin C1 : 0x0B00215A Turin Dense / B0: 0x0B101054
Status
unaffected
VulnDex Vulnerability Enrichment
| Typ | Quelle | Score | Percentile |
|---|---|---|---|
| EPSS | FIRST.org | 0.02% | 0.044 |
| Quelle | Base Score | Exploit Score | Impact Score | Vector String |
|---|---|---|---|---|
| psirt@amd.com | 7.2 | 0 | 0 |
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
|
CWE-333 Improper Handling of Insufficient Entropy in TRNG
True random number generators (TRNG) generally have a limited source of entropy and therefore can fail or block.