AMD ASP Bootloader Buffer Overflow Enables Priv Escalation
CVE-2025-29951 Published on February 10, 2026
A buffer overflow in the AMD Secure Processor (ASP) bootloader could allow an attacker to overwrite memory, potentially resulting in privilege escalation and arbitrary code execution.
Weakness Type
What is a Stack Overflow Vulnerability?
A stack-based buffer overflow condition is a condition where the buffer being overwritten is allocated on the stack (i.e., is a local variable or, rarely, a parameter to a function).
CVE-2025-29951 has been classified to as a Stack Overflow vulnerability or weakness.
Affected Versions
AMD Athlon™ 3000 Series Mobile Processors with Radeon™ Graphics:- Version PicassoPI-FP5_1.0.1.2d is unaffected.
- Version EmbeddedPI-FP5 1212 is unaffected.
- Version EmbeddedR2KPI-FP5 1007 is unaffected.
- Version EmbeddedPI-FP5 1212 is unaffected.
Exploit Probability
EPSS (Exploit Prediction Scoring System) scores estimate the probability that a vulnerability will be exploited in the wild within the next 30 days. The percentile shows you how this score compares to all other vulnerabilities.