{"api_version":"1","generated_at":"2026-05-15T11:36:18+00:00","cve":"CVE-2025-29936","urls":{"html":"https://cve.report/CVE-2025-29936","api":"https://cve.report/api/cve/CVE-2025-29936.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2025-29936","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2025-29936"},"summary":{"title":"CVE-2025-29936","description":"Improper input validation within the AMD Platform Management Framework (PMF) could allow an attacker to unmap arbitrary memory pages potentially impacting integrity and availability, or allowing privilege escalation resulting in loss of confidentiality.","state":"PUBLISHED","assigner":"AMD","published_at":"2026-05-15 03:16:21","updated_at":"2026-05-15 03:16:21"},"problem_types":["CWE-20","CWE-20 CWE-20  Improper Input Validation"],"metrics":[{"version":"4.0","source":"psirt@amd.com","type":"Secondary","score":"8.4","severity":"HIGH","vector":"CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:H/SI:H/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X","data":{"version":"4.0","vectorString":"CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:H/SI:H/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X","baseScore":8.4,"baseSeverity":"HIGH","attackVector":"LOCAL","attackComplexity":"LOW","attackRequirements":"NONE","privilegesRequired":"LOW","userInteraction":"NONE","vulnConfidentialityImpact":"NONE","vulnIntegrityImpact":"HIGH","vulnAvailabilityImpact":"HIGH","subConfidentialityImpact":"HIGH","subIntegrityImpact":"HIGH","subAvailabilityImpact":"HIGH","exploitMaturity":"NOT_DEFINED","confidentialityRequirement":"NOT_DEFINED","integrityRequirement":"NOT_DEFINED","availabilityRequirement":"NOT_DEFINED","modifiedAttackVector":"NOT_DEFINED","modifiedAttackComplexity":"NOT_DEFINED","modifiedAttackRequirements":"NOT_DEFINED","modifiedPrivilegesRequired":"NOT_DEFINED","modifiedUserInteraction":"NOT_DEFINED","modifiedVulnConfidentialityImpact":"NOT_DEFINED","modifiedVulnIntegrityImpact":"NOT_DEFINED","modifiedVulnAvailabilityImpact":"NOT_DEFINED","modifiedSubConfidentialityImpact":"NOT_DEFINED","modifiedSubIntegrityImpact":"NOT_DEFINED","modifiedSubAvailabilityImpact":"NOT_DEFINED","Safety":"NOT_DEFINED","Automatable":"NOT_DEFINED","Recovery":"NOT_DEFINED","valueDensity":"NOT_DEFINED","vulnerabilityResponseEffort":"NOT_DEFINED","providerUrgency":"NOT_DEFINED"}},{"version":"4.0","source":"CNA","type":"CVSS","score":"8.4","severity":"HIGH","vector":"CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:H/SI:H/SA:H","data":{"attackComplexity":"LOW","attackVector":"LOCAL","baseScore":8.4,"baseSeverity":"HIGH","privilegesRequired":"LOW","userInteraction":"NONE","vectorString":"CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:H/SI:H/SA:H","version":"4.0"}}],"references":[{"url":"https://www.amd.com/en/resources/product-security/bulletin/AMD-SB-4015.html","name":"https://www.amd.com/en/resources/product-security/bulletin/AMD-SB-4015.html","refsource":"psirt@amd.com","tags":[],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://www.cve.org/CVERecord?id=CVE-2025-29936","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2025-29936","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[{"source":"CNA","vendor":"AMD","product":"AMD Ryzen™ 7035 Series Processors with Radeon™ Graphics (formerly codenamed \"Rembrandt R\")","version":"unaffected 7.06.02.123","platforms":[]},{"source":"CNA","vendor":"AMD","product":"AMD Ryzen™ 7040 Series Mobile Processors with Radeon™ Graphics (formerly codenamed \"Phoenix\")","version":"unaffected 7.06.02.123","platforms":[]},{"source":"CNA","vendor":"AMD","product":"AMD Ryzen™ AI 300 Series Processors (formerly codenamed \"Strix Point\")","version":"unaffected 7.06.02.123","platforms":[]},{"source":"CNA","vendor":"AMD","product":"AMD Ryzen™ 8040 Series Mobile Processors with Radeon™ Graphics (formerly codenamed \"Hawk Point\")","version":"unaffected 7.06.02.123","platforms":[]},{"source":"CNA","vendor":"AMD","product":"AMD Ryzen™ 6000 Series Processors with Radeon™ Graphics (formerly codenamed \"Rembrandt\")","version":"unaffected 7.06.02.123","platforms":[]},{"source":"CNA","vendor":"AMD","product":"AMD Ryzen™ Al Max+","version":"unaffected 7.06.02.123","platforms":[]},{"source":"CNA","vendor":"AMD","product":"AMD Ryzen™ Embedded 8000 Series Processors","version":"unaffected amd_chipset_software_7.06.02.123.exe","platforms":[]}],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[{"source":"CNA","value":"Reported through AMD Bug Bounty Program","lang":"en"}],"nvd_cpes":[],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[]},"source_records":{"cve_program":{"containers":{"cna":{"affected":[{"defaultStatus":"affected","product":"AMD Ryzen™ 7035 Series Processors with Radeon™ Graphics (formerly codenamed \"Rembrandt R\")","vendor":"AMD","versions":[{"status":"unaffected","version":"7.06.02.123"}]},{"defaultStatus":"affected","product":"AMD Ryzen™ 7040 Series Mobile Processors with Radeon™ Graphics (formerly codenamed \"Phoenix\")","vendor":"AMD","versions":[{"status":"unaffected","version":"7.06.02.123"}]},{"defaultStatus":"affected","product":"AMD Ryzen™ AI 300 Series Processors (formerly codenamed \"Strix Point\")","vendor":"AMD","versions":[{"status":"unaffected","version":"7.06.02.123"}]},{"defaultStatus":"affected","product":"AMD Ryzen™ 8040 Series Mobile Processors with Radeon™ Graphics (formerly codenamed \"Hawk Point\")","vendor":"AMD","versions":[{"status":"unaffected","version":"7.06.02.123"}]},{"defaultStatus":"affected","product":"AMD Ryzen™ 6000 Series Processors with Radeon™ Graphics (formerly codenamed \"Rembrandt\")","vendor":"AMD","versions":[{"status":"unaffected","version":"7.06.02.123"}]},{"defaultStatus":"affected","product":"AMD Ryzen™ Al Max+","vendor":"AMD","versions":[{"status":"unaffected","version":"7.06.02.123"}]},{"defaultStatus":"affected","product":"AMD Ryzen™ Embedded 8000 Series Processors","vendor":"AMD","versions":[{"status":"unaffected","version":"amd_chipset_software_7.06.02.123.exe"}]}],"credits":[{"lang":"en","value":"Reported through AMD Bug Bounty Program"}],"datePublic":"2026-05-15T01:50:04.190Z","descriptions":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"Improper input validation within the AMD Platform Management Framework (PMF) could allow an attacker to unmap arbitrary memory pages potentially impacting integrity and availability, or allowing privilege escalation resulting in loss of confidentiality.<br>"}],"value":"Improper input validation within the AMD Platform Management Framework (PMF) could allow an attacker to unmap arbitrary memory pages potentially impacting integrity and availability, or allowing privilege escalation resulting in loss of confidentiality."}],"metrics":[{"cvssV4_0":{"attackComplexity":"LOW","attackVector":"LOCAL","baseScore":8.4,"baseSeverity":"HIGH","privilegesRequired":"LOW","userInteraction":"NONE","vectorString":"CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:H/SI:H/SA:H","version":"4.0"},"format":"CVSS","scenarios":[{"lang":"en","value":"GENERAL"}]}],"problemTypes":[{"descriptions":[{"cweId":"CWE-20","description":"CWE-20  Improper Input Validation","lang":"en","type":"CWE"}]}],"providerMetadata":{"dateUpdated":"2026-05-15T01:52:13.641Z","orgId":"b58fc414-a1e4-4f92-9d70-1add41838648","shortName":"AMD"},"references":[{"url":"https://www.amd.com/en/resources/product-security/bulletin/AMD-SB-4015.html"}],"source":{"discovery":"UNKNOWN"},"x_generator":{"engine":"AMD PSIRT Automation 1.0"}}},"cveMetadata":{"assignerOrgId":"b58fc414-a1e4-4f92-9d70-1add41838648","assignerShortName":"AMD","cveId":"CVE-2025-29936","datePublished":"2026-05-15T01:52:13.641Z","dateReserved":"2025-03-12T15:14:59.391Z","dateUpdated":"2026-05-15T01:52:13.641Z","state":"PUBLISHED"},"dataType":"CVE_RECORD","dataVersion":"5.2"},"nvd":{"publishedDate":"2026-05-15 03:16:21","lastModifiedDate":"2026-05-15 03:16:21","problem_types":["CWE-20","CWE-20 CWE-20  Improper Input Validation"],"metrics":{"cvssMetricV40":[{"source":"psirt@amd.com","type":"Secondary","cvssData":{"version":"4.0","vectorString":"CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:H/SI:H/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X","baseScore":8.4,"baseSeverity":"HIGH","attackVector":"LOCAL","attackComplexity":"LOW","attackRequirements":"NONE","privilegesRequired":"LOW","userInteraction":"NONE","vulnConfidentialityImpact":"NONE","vulnIntegrityImpact":"HIGH","vulnAvailabilityImpact":"HIGH","subConfidentialityImpact":"HIGH","subIntegrityImpact":"HIGH","subAvailabilityImpact":"HIGH","exploitMaturity":"NOT_DEFINED","confidentialityRequirement":"NOT_DEFINED","integrityRequirement":"NOT_DEFINED","availabilityRequirement":"NOT_DEFINED","modifiedAttackVector":"NOT_DEFINED","modifiedAttackComplexity":"NOT_DEFINED","modifiedAttackRequirements":"NOT_DEFINED","modifiedPrivilegesRequired":"NOT_DEFINED","modifiedUserInteraction":"NOT_DEFINED","modifiedVulnConfidentialityImpact":"NOT_DEFINED","modifiedVulnIntegrityImpact":"NOT_DEFINED","modifiedVulnAvailabilityImpact":"NOT_DEFINED","modifiedSubConfidentialityImpact":"NOT_DEFINED","modifiedSubIntegrityImpact":"NOT_DEFINED","modifiedSubAvailabilityImpact":"NOT_DEFINED","Safety":"NOT_DEFINED","Automatable":"NOT_DEFINED","Recovery":"NOT_DEFINED","valueDensity":"NOT_DEFINED","vulnerabilityResponseEffort":"NOT_DEFINED","providerUrgency":"NOT_DEFINED"}}]},"configurations":[]},"legacy_mitre":{"record":{"CveYear":"2025","CveId":"29936","Ordinal":"1","Title":"CVE-2025-29936","CVE":"CVE-2025-29936","Year":"2025"},"notes":[{"CveYear":"2025","CveId":"29936","Ordinal":"1","NoteData":"Improper input validation within the AMD Platform Management Framework (PMF) could allow an attacker to unmap arbitrary memory pages potentially impacting integrity and availability, or allowing privilege escalation resulting in loss of confidentiality.","Type":"Description","Title":"CVE-2025-29936"}]}}}