CVE-2025-62626
Improper handling of insufficient entropy in the AMD CPUs could allow a local attacker to influence the values returned by the RDSEED instruction, potentially resulting in the consumption of insufficiently random values.
https://nvd.nist.gov/vuln/detail/CVE-2025-62626
Categories
CWE-333 : Improper Handling of Insufficient Entropy in TRNG
The rate at which true random numbers can be generated is limited. It is important that one uses them only when they are needed for security.
References
AFFECTED (from MITRE)
| Vendor |
Product |
Versions |
| AMD |
AMD Ryzen⢠9000HX Series Processors |
- FireRangeFL1PI 1.0.0.0e [unaffected]
|
| AMD |
AMD EPYC⢠9005 Series Processors |
- Turin C1 : 0x0B00215A Turin Dense / B0: 0x0B101054 [unaffected]
|
| © 2022 The MITRE Corporation. This work is reproduced and distributed with the permission of The MITRE Corporation. |
CPE
REMEDIATION
EXPLOITS
Exploit-db.com
| id |
description |
date |
|
| No known exploits |
POC Github
Other Nist (github, ...)
CAPEC
Common Attack Pattern Enumerations and Classifications
| id |
description |
severity |
| No entry |
Cybersecurity needs ?
Strengthen software security from the outset with our DevSecOps expertise
Integrate security right from the start of the software development cycle for more robust applications and greater customer confidence.
Our team of DevSecOps experts can help you secure your APIs, data pipelines, CI/CD chains, Docker containers and Kubernetes deployments.
Discover this offer