Join the Cyber Forum: Threat Intel on May 12, 2026 to learn how AI is reshaping threat defense.Join the Virtual Cyber Forum: Threat IntelRegister Now
Experiencing a Breach?Blog
Get StartedContact Us
SentinelOne
  • Platform
    Platform Overview
    • Singularity Platform
      Welcome to Integrated Enterprise Security
    • AI for Security
      Leading the Way in AI-Powered Security Solutions
    • Securing AI
      Accelerate AI Adoption with Secure AI Tools, Apps, and Agents.
    • How It Works
      The Singularity XDR Difference
    • Singularity Marketplace
      One-Click Integrations to Unlock the Power of XDR
    • Pricing & Packaging
      Comparisons and Guidance at a Glance
    Data & AI
    • Purple AI
      Accelerate SecOps with Generative AI
    • Singularity Hyperautomation
      Easily Automate Security Processes
    • AI-SIEM
      The AI SIEM for the Autonomous SOC
    • AI Data Pipelines
      Security Data Pipeline for AI SIEM and Data Optimization
    • Singularity Data Lake
      AI-Powered, Unified Data Lake
    • Singularity Data Lake for Log Analytics
      Seamlessly Ingest Data from On-Prem, Cloud or Hybrid Environments
    Endpoint Security
    • Singularity Endpoint
      Autonomous Prevention, Detection, and Response
    • Singularity XDR
      Native & Open Protection, Detection, and Response
    • Singularity RemoteOps Forensics
      Orchestrate Forensics at Scale
    • Singularity Threat Intelligence
      Comprehensive Adversary Intelligence
    • Singularity Vulnerability Management
      Application & OS Vulnerability Management
    • Singularity Identity
      Identity Threat Detection and Response
    Cloud Security
    • Singularity Cloud Security
      Block Attacks with an AI-Powered CNAPP
    • Singularity Cloud Native Security
      Secure Cloud and Development Resources
    • Singularity Cloud Workload Security
      Real-Time Cloud Workload Protection Platform
    • Singularity Cloud Data Security
      AI-Powered Threat Detection for Cloud Storage
    • Singularity Cloud Security Posture Management
      Detect and Remediate Cloud Misconfigurations
    Securing AI
    • Prompt Security
      Secure AI Tools Across Your Enterprise
  • Why SentinelOne?
    Why SentinelOne?
    • Why SentinelOne?
      Cybersecurity Built for What’s Next
    • Our Customers
      Trusted by the World’s Leading Enterprises
    • Industry Recognition
      Tested and Proven by the Experts
    • About Us
      The Industry Leader in Autonomous Cybersecurity
    Compare SentinelOne
    • Arctic Wolf
    • Broadcom
    • CrowdStrike
    • Cybereason
    • Microsoft
    • Palo Alto Networks
    • Sophos
    • Splunk
    • Trellix
    • Trend Micro
    • Wiz
    Verticals
    • Energy
    • Federal Government
    • Finance
    • Healthcare
    • Higher Education
    • K-12 Education
    • Manufacturing
    • Retail
    • State and Local Government
  • Services
    Managed Services
    • Managed Services Overview
      Wayfinder Threat Detection & Response
    • Threat Hunting
      World-Class Expertise and Threat Intelligence
    • Managed Detection & Response
      24/7/365 Expert MDR Across Your Entire Environment
    • Incident Readiness & Response
      DFIR, Breach Readiness, & Compromise Assessments
    Support, Deployment, & Health
    • Technical Account Management
      Customer Success with Personalized Service
    • SentinelOne GO
      Guided Onboarding & Deployment Advisory
    • SentinelOne University
      Live and On-Demand Training
    • Services Overview
      Comprehensive Solutions for Seamless Security Operations
    • SentinelOne Community
      Community Login
  • Partners
    Our Network
    • MSSP Partners
      Succeed Faster with SentinelOne
    • Singularity Marketplace
      Extend the Power of S1 Technology
    • Cyber Risk Partners
      Enlist Pro Response and Advisory Teams
    • Technology Alliances
      Integrated, Enterprise-Scale Solutions
    • SentinelOne for AWS
      Hosted in AWS Regions Around the World
    • Channel Partners
      Deliver the Right Solutions, Together
    • SentinelOne for Google Cloud
      Unified, Autonomous Security Giving Defenders the Advantage at Global Scale
    • Partner Locator
      Your Go-to Source for Our Top Partners in Your Region
    Partner Portal→
  • Resources
    Resource Center
    • Case Studies
    • Data Sheets
    • eBooks
    • Reports
    • Videos
    • Webinars
    • Whitepapers
    • Events
    View All Resources→
    Blog
    • Feature Spotlight
    • For CISO/CIO
    • From the Front Lines
    • Identity
    • Cloud
    • macOS
    • SentinelOne Blog
    Blog→
    Tech Resources
    • SentinelLABS
    • Ransomware Anthology
    • Cybersecurity 101
  • About
    About SentinelOne
    • About SentinelOne
      The Industry Leader in Cybersecurity
    • Investor Relations
      Financial Information & Events
    • SentinelLABS
      Threat Research for the Modern Threat Hunter
    • Careers
      The Latest Job Opportunities
    • Press & News
      Company Announcements
    • Cybersecurity Blog
      The Latest Cybersecurity Threats, News, & More
    • FAQ
      Get Answers to Our Most Frequently Asked Questions
    • DataSet
      The Live Data Platform
    • S Foundation
      Securing a Safer Future for All
    • S Ventures
      Investing in the Next Generation of Security, Data and AI
  • Pricing
Get StartedContact Us
CVE Vulnerability Database
Vulnerability Database/CVE-2025-54502

CVE-2025-54502: AMD APCB SMM Privilege Escalation Flaw

CVE-2025-54502 is a privilege escalation vulnerability in AMD Platform Configuration Blob SMM driver that enables Ring 0 attackers to execute arbitrary code. This article covers technical details, impact, and mitigation.

Published: April 16, 2026

CVE-2025-54502 Overview

CVE-2025-54502 is a privilege escalation vulnerability affecting the AMD Platform Configuration Blob (APCB) System Management Mode (SMM) driver. The vulnerability stems from incorrect use of boot services within the APCB SMM driver, which could allow a privileged attacker with local access at Ring 0 (kernel level) to escalate privileges and potentially achieve arbitrary code execution.

Critical Impact

This vulnerability allows attackers who already possess kernel-level access to escalate privileges into SMM, one of the most privileged execution contexts in x86 architecture. Successful exploitation could enable arbitrary code execution with SMM privileges, potentially bypassing security mechanisms and persisting beyond operating system reinstallation.

Affected Products

  • AMD Platform Configuration Blob (APCB) SMM Driver
  • AMD BIOS/UEFI firmware implementations utilizing the vulnerable APCB driver
  • Systems with AMD processors running affected firmware versions

Discovery Timeline

  • April 16, 2026 - CVE-2025-54502 published to NVD
  • April 16, 2026 - Last updated in NVD database

Technical Details for CVE-2025-54502

Vulnerability Analysis

This vulnerability is classified under CWE-668 (Exposure of Resource to Wrong Sphere), which indicates that a resource intended for one execution context is improperly exposed to another. In the context of SMM drivers, this represents a critical security boundary violation.

SMM operates as the most privileged execution mode on x86 systems, running at Ring -2 and having unrestricted access to all system memory and hardware. The APCB driver, responsible for handling platform configuration during boot, incorrectly utilizes boot services in a manner that can be abused by an attacker with Ring 0 (kernel) access.

The attack requires local access and high privileges (kernel-level access) to exploit. However, the complexity of the attack is considered high due to the specialized knowledge required to manipulate SMM operations. If successful, the attacker can achieve complete compromise of confidentiality, integrity, and availability of the affected system.

Root Cause

The root cause of CVE-2025-54502 lies in the improper use of UEFI Boot Services within the SMM context. Boot Services are intended to be available only during the boot phase and should be terminated before the operating system takes control. When SMM handlers incorrectly reference or utilize boot service pointers after the ExitBootServices() call, the memory previously occupied by these services can be reclaimed and manipulated by OS-level code.

An attacker with kernel access can allocate memory at the addresses where boot service function pointers were previously stored, placing malicious code at these locations. When the vulnerable SMM handler is triggered and attempts to call the now-invalid boot service, execution is redirected to the attacker-controlled code, which then runs with SMM privileges.

Attack Vector

The attack requires local access with Ring 0 (kernel-level) privileges. The attacker must:

  1. Identify the memory addresses previously used by boot services
  2. Allocate and control memory at those locations after ExitBootServices() has been called
  3. Place malicious shellcode in the controlled memory regions
  4. Trigger the vulnerable SMM handler through System Management Interrupt (SMI)
  5. The SMM handler attempts to call the stale boot service pointer, executing attacker code with SMM privileges

This type of vulnerability is commonly referred to as a "call-out" vulnerability in SMM security research. The attack enables SMM code execution, which operates outside the visibility of the operating system and most security software, making it extremely valuable for persistent, stealthy attacks.

Detection Methods for CVE-2025-54502

Indicators of Compromise

  • Unexpected System Management Interrupt (SMI) activity or anomalous SMI frequency patterns
  • Memory allocation attempts targeting known UEFI boot service address ranges
  • Firmware integrity check failures or unexpected modifications to BIOS/UEFI components
  • Unusual kernel driver loading or memory mapping operations targeting low memory regions

Detection Strategies

  • Implement firmware integrity monitoring using platform security features such as AMD Platform Secure Boot
  • Deploy endpoint detection solutions capable of monitoring SMI activity and kernel-level operations
  • Utilize SentinelOne Singularity Platform for real-time kernel activity monitoring and behavioral analysis
  • Establish baseline SMI frequency metrics and alert on significant deviations

Monitoring Recommendations

  • Enable AMD Secure Boot and firmware TPM measurements to detect firmware tampering
  • Configure logging for kernel-level memory allocation operations, particularly those targeting typical UEFI memory ranges
  • Implement periodic firmware version auditing against known vulnerable versions
  • Monitor for unauthorized kernel driver installations that could be used as a staging point for this attack

How to Mitigate CVE-2025-54502

Immediate Actions Required

  • Review AMD Security Bulletin SB-7054 for specific affected products and remediation guidance
  • Identify all systems with AMD processors running potentially vulnerable BIOS/UEFI firmware versions
  • Apply firmware updates from your system or motherboard manufacturer as they become available
  • Restrict local administrative and kernel-level access to trusted personnel only

Patch Information

AMD has published Security Bulletin SB-7054 addressing this vulnerability. System administrators should consult this bulletin and coordinate with their hardware vendors (OEMs) to obtain updated BIOS/UEFI firmware that addresses the incorrect boot service usage in the APCB SMM driver.

Firmware updates must be applied through your specific hardware manufacturer's update process, as AMD provides mitigation guidance to OEMs who then distribute platform-specific updates.

Workarounds

  • Restrict physical access to affected systems to reduce the risk of local exploitation
  • Implement strict controls on kernel-mode driver loading using application control policies
  • Enable Secure Boot to help prevent unauthorized firmware modifications
  • Deploy SentinelOne agents to monitor and protect against kernel-level threats that could be used as prerequisites for this attack
bash
# Example: Verify AMD Secure Boot status (system-dependent)
# Check BIOS/UEFI settings for Platform Secure Boot configuration
# Consult your system vendor documentation for specific commands

# Example: Query firmware version on Linux systems
sudo dmidecode -t bios | grep -E "Vendor|Version|Release"

# Review AMD security bulletin for your specific platform
# https://www.amd.com/en/resources/product-security/bulletin/AMD-SB-7054.html

Disclaimer: This content was generated using AI. While we strive for accuracy, please verify critical information with official sources.

  • Vulnerability Details
  • TypePrivilege Escalation

  • Vendor/TechAmd

  • SeverityHIGH

  • CVSS Score7.1

  • Known ExploitedNo
  • CVSS Vector
  • CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
  • Impact Assessment
  • ConfidentialityHigh
  • IntegrityNone
  • AvailabilityHigh
  • CWE References
  • CWE-668
  • Technical References
  • AMD Security Bulletin SB-7054
  • Related CVEs
  • CVE-2025-54510: AMD Zen 5 Privilege Escalation Vulnerability

  • CVE-2024-36319: AMD VCN Firmware Privilege Escalation Flaw

  • CVE-2024-36320: atihdwt6.sys Integer Overflow Vulnerability

  • CVE-2025-61969: AMD µProf Privilege Escalation Flaw
Default Legacy - Prefooter | Experience the World’s Most Advanced Cybersecurity Platform

Experience the World’s Most Advanced Cybersecurity Platform

See how our intelligent, autonomous cybersecurity platform can protect your organization now and into the future.

Try SentinelOne
  • Get Started
  • Get a Demo
  • Product Tour
  • Why SentinelOne
  • Pricing & Packaging
  • FAQ
  • Contact
  • Contact Us
  • Customer Support
  • SentinelOne Status
  • Language
  • Platform
  • Singularity Platform
  • Singularity Endpoint
  • Singularity Cloud
  • Singularity AI-SIEM
  • Singularity Identity
  • Singularity Marketplace
  • Purple AI
  • Services
  • Wayfinder TDR
  • SentinelOne GO
  • Technical Account Management
  • Support Services
  • Verticals
  • Energy
  • Federal Government
  • Finance
  • Healthcare
  • Higher Education
  • K-12 Education
  • Manufacturing
  • Retail
  • State and Local Government
  • Cybersecurity for SMB
  • Resources
  • Blog
  • Labs
  • Case Studies
  • Videos
  • Product Tours
  • Events
  • Cybersecurity 101
  • eBooks
  • Webinars
  • Whitepapers
  • Press
  • News
  • Ransomware Anthology
  • Company
  • About Us
  • Our Customers
  • Careers
  • Partners
  • Legal & Compliance
  • Security & Compliance
  • Investor Relations
  • S Foundation
  • S Ventures

©2026 SentinelOne, All Rights Reserved.

Privacy Notice Terms of Use

English