DLL Hijacking in AMD Software Installer (Priv Esc)
CVE-2025-48503 Published on February 11, 2026

A DLL hijacking vulnerability in the AMD Software Installer could allow an attacker to achieve privilege escalation potentially resulting in arbitrary code execution.

NVD

Vulnerability Analysis

CVE-2025-48503 can be exploited with local system access, and requires small amount of user privileges. This vulnerability is consided to have a high level of attack complexity. The potential impact of an exploit of this vulnerability is considered to be very high.

Attack Vector:
LOCAL
Attack Complexity:
HIGH
Privileges Required:
LOW
User Interaction:
NONE
Scope:
CHANGED
Confidentiality Impact:
HIGH
Integrity Impact:
HIGH
Availability Impact:
HIGH

Weakness Type

What is a DLL preloading Vulnerability?

The product uses a fixed or controlled search path to find resources, but one or more locations in that path can be under the control of unintended actors.

CVE-2025-48503 has been classified to as a DLL preloading vulnerability or weakness.


Affected Versions

AMD Ryzen™ 4000 Series Mobile Processors with Radeon™ Graphics (formerly codenamed "Renoir"): AMD Ryzen™ 7035 Series Processors with Radeon™ Graphics (formerly codenamed "Rembrandt R"): AMD Athlon™ 3000 Series Mobile Processors with Radeon™ Graphics (formerly codenamed "Picasso"): AMD Ryzen™ 7040 Series Mobile Processors with Radeon™ Graphics (formerly codenamed "Phoenix"): AMD Ryzen™ 7020 Series Processors with Radeon™ Graphics (formerly codenamed "Mendocino"): AMD Ryzen™ 7045 Series Mobile Processors with Radeon™ Graphics (formerly codenamed "Dragon Range"): AMD Ryzen™ 7000 Series Desktop Processors (formerly codenamed "Raphael"/"Raphael X3D"): AMD Ryzen™ 7030 Series Mobile Processors with Radeon™ Graphics (formerly codenamed "Barcelo R"): AMD Ryzen™ AI 300 Series Processors (formerly codenamed "Strix Point"): AMD Ryzen™ 7000 Series Desktop Processors (formerly codenamed "Raphael"/"Raphael-X3D"): AMD Ryzen™ 8000 Series Desktop Processors (formerly codenamed "Phoenix"): AMD Ryzen™ 8000 Series Desktop Processors (formerly codenamed "Phoenix"): AMD Ryzen™ 9000 Series Desktop Processors (formerly codenamed "Granite Ridge"): AMD Ryzen™ 5000 Series Mobile Processors with Radeon™ Graphics (formerly codenamed "Cezanne"): AMD Ryzen™ 5000 Series Mobile Processors with Radeon™ Graphics (formerly codenamed "Lucienne"): AMD Ryzen™ 5000 Series Mobile Processors with Radeon™ Graphics (formerly codenamed "Barcelo"): AMD Ryzen™ 4000 Series Desktop Processors (formerly codenamed "Renoir"): AMD Ryzen™ 5000 Series Desktop Processors with Radeon™ Graphics (formerly codenamed "Cezanne"): AMD Ryzen™ 8040 Series Mobile Processors with Radeon™ Graphics (formerly codenamed "Hawk Point"): AMD Ryzen™ 3000 Series Mobile Processors with Radeon™ Graphics (formerly codenamed "Dali"): AMD Athlon™ 3000 Series Mobile Processors with Radeon™ Graphics (formerly codenamed "Dali"): AMD Radeon™ RX 5000 Series Graphics Products: AMD Radeon™ RX 6000 Series Graphics Products: AMD Radeon™ RX 7000 Series Graphics Products: AMD Placeholder: AMD Radeon™ PRO W5000 Series Graphics Products: AMD Radeon™ PRO W6000 Series Graphics Products: AMD Radeon™ PRO W7000 Series Graphics Products: AMD Radeon™ RX 9000 Series Graphics Products:

Exploit Probability

EPSS
0.01%
Percentile
0.60%

EPSS (Exploit Prediction Scoring System) scores estimate the probability that a vulnerability will be exploited in the wild within the next 30 days. The percentile shows you how this score compares to all other vulnerabilities.