Improper access control between the Joint Test Action Group (JTAG) and Advanced Extensible Interface (AXI) could allow an attacker with physical access to read or overwrite the contents of cross-chip debug (XCD) registers potentially resulting in loss of data integrity or confidentiality.

Project Subscriptions

No data.

Advisories

No advisories yet.

Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Fri, 15 May 2026 04:45:00 +0000

Type Values Removed Values Added
Title Physical Access Enables Reading and Writing of Debug Registers on AMD Ryzen Processors

Fri, 15 May 2026 03:00:00 +0000

Type Values Removed Values Added
Description Improper access control between the Joint Test Action Group (JTAG) and Advanced Extensible Interface (AXI) could allow an attacker with physical access to read or overwrite the contents of cross-chip debug (XCD) registers potentially resulting in loss of data integrity or confidentiality.
Weaknesses CWE-284
References
Metrics cvssV4_0

{'score': 5.3, 'vector': 'CVSS:4.0/AV:P/AC:H/AT:P/PR:N/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N'}


Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: AMD

Published:

Updated: 2026-05-15T02:09:35.182Z

Reserved: 2024-11-21T16:18:07.633Z

Link: CVE-2025-0040

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2026-05-15T03:16:21.210

Modified: 2026-05-15T03:16:21.210

Link: CVE-2025-0040

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-15T04:30:36Z

Weaknesses