Insufficient validation within Xilinx Run Time framework could allow a local attacker to escalate privileges from user space to kernel space, potentially compromising confidentiality, integrity, and/or availability.
Metrics
Affected Vendors & Products
References
History
Wed, 26 Nov 2025 11:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Amd
Amd xilinx Run Time |
|
| Vendors & Products |
Amd
Amd xilinx Run Time |
Mon, 24 Nov 2025 21:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Mon, 24 Nov 2025 20:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Insufficient validation within Xilinx Run Time framework could allow a local attacker to escalate privileges from user space to kernel space, potentially compromising confidentiality, integrity, and/or availability. | |
| Weaknesses | CWE-710 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: AMD
Published:
Updated: 2025-11-24T20:56:23.146Z
Reserved: 2024-10-10T20:27:43.895Z
Link: CVE-2025-0007
Updated: 2025-11-24T20:56:15.685Z
Status : Awaiting Analysis
Published: 2025-11-24T21:16:02.023
Modified: 2025-11-25T22:16:16.690
Link: CVE-2025-0007
No data.