VYPR
Low severityNVD Advisory· Published Apr 27, 2026· Updated Apr 29, 2026

CVE-2025-54505

CVE-2025-54505

Description

A transient execution vulnerability within AMD CPUs may allow a local user-privileged attacker to leak data via the floating point divisor unit, potentially resulting in loss of confidentiality.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

AMD Zen1 CPUs leak data via floating point divider transient execution, allowing local user-privileged attackers to infer sensitive information.

Vulnerability

Overview

CVE-2025-54505, also known as Floating Point Divider State Sampling (FPDSS), is a transient execution vulnerability affecting AMD CPUs based on the Zen1 microarchitecture (Fam17h). The root cause lies in the floating point divisor unit, where microarchitectural state can be sampled during transient execution, leaking data that should be isolated between different security contexts [1].

Exploitation

Conditions

Exploitation requires local user-level privileges on a system running a vulnerable AMD Zen1 CPU. The attacker must be able to execute code on the same physical core as the victim context. No special hardware or network access is needed beyond local user access. The vulnerability can be triggered across virtual machine boundaries, as noted in the Xen Security Advisory, where an attacker in one guest may infer data belonging to other guests [1].

Impact

A successful attack allows an unprivileged local attacker to infer sensitive data from other contexts, including other virtual machines or processes. The primary impact is loss of confidentiality, as the attacker can leak data that should be protected by hardware isolation mechanisms. The CVSS score of 3.3 (Low) reflects the requirement for local access and the specific hardware dependency [1].

Mitigation

Status

AMD has acknowledged the issue and provided a security bulletin [1]. Xen has released patches for all supported versions (4.17 through 4.21.x) to mitigate the vulnerability by preventing the sampling of floating point divider state. There are no software-only workarounds; applying the hypervisor patch is the recommended resolution. Systems running other CPU architectures or newer AMD microarchitectures are not believed not affected [1].

AI Insight generated on May 18, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

1

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

2

News mentions

0

No linked articles in our index yet.