Improper access control between the Joint Test Action Group (JTAG) and Advanced Extensible Interface (AXI) could allow an attacker with physical access to read or overwrite the contents of cross-chip debug (XCD) registers potentially resulting in loss of data integrity or confidentiality.
Project Subscriptions
No data.
Advisories
No advisories yet.
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Fri, 15 May 2026 04:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Title | Physical Access Enables Reading and Writing of Debug Registers on AMD Ryzen Processors |
Fri, 15 May 2026 03:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Improper access control between the Joint Test Action Group (JTAG) and Advanced Extensible Interface (AXI) could allow an attacker with physical access to read or overwrite the contents of cross-chip debug (XCD) registers potentially resulting in loss of data integrity or confidentiality. | |
| Weaknesses | CWE-284 | |
| References |
| |
| Metrics |
cvssV4_0
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: AMD
Published:
Updated: 2026-05-15T02:09:35.182Z
Reserved: 2024-11-21T16:18:07.633Z
Link: CVE-2025-0040
No data.
Status : Received
Published: 2026-05-15T03:16:21.210
Modified: 2026-05-15T03:16:21.210
Link: CVE-2025-0040
No data.
OpenCVE Enrichment
Updated: 2026-05-15T04:30:36Z
Weaknesses