VYPR

Secure Processor (ASP) TEE SOC Driver

by AMD

CVEs (3)

  • CVE-2025-48521MedMay 15, 2026
    risk 0.45cvss epss 0.00

    Improper input validation in the AMD Secure Processor (ASP) PCI driver could allow a local attacker to trigger a Use-After-Free (UAF) condition, potentially resulting in a loss of platform integrity or crash.

  • CVE-2025-0045MedMay 15, 2026
    risk 0.45cvss epss 0.00

    Improper Input validation in the AMD Secure Processor (ASP) PCI driver may allow a local attacker to create a buffer overflow condition, potentially resulting in a crash or denial of service

  • CVE-2025-66664MedMay 15, 2026
    risk 0.30cvss epss 0.00

    Insufficient parameter sanitization in AMD Secure Processor (ASP) TEE SOC Driver could allow an attacker to issue a malformed DRV_SOC_CMD_ID_LOAD_GFX_IP_FW SR-IOV command to cause out-of-bounds read, potentially resulting in SOC Driver memory contents exposure or an exception

VYPR — Vulnerability Intelligence