Cyber Posture

CVE-2025-52541

High

Published: 11 February 2026

Published
11 February 2026
Modified
15 April 2026
KEV Added
Patch
CVSS Score 7.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H
EPSS Score 0.0001 0.6th percentile
Risk Priority 15 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2025-52541 is a high-severity Uncontrolled Search Path Element (CWE-427) vulnerability in Amd (inferred from references). Its CVSS base score is 7.3 (High).

Operationally, exploitation aligns with the MITRE ATT&CK technique DLL Search Order Hijacking (T1038); ranked at the 0.6th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.

Threat & Defense at a Glance

What attackers do: exploitation maps to DLL Search Order Hijacking (T1038) and 2 other techniques.
Threat & Defense Details

MITRE ATT&CK Enterprise TechniquesAI

T1038 DLL Search Order Hijacking Persistence
Windows systems use a common method to look for required DLLs to load into a program.
T1574.002 DLL Side-Loading Stealth
Adversaries may execute their own malicious payloads by side-loading DLLs.
T1068 Exploitation for Privilege Escalation Privilege Escalation
Adversaries may exploit software vulnerabilities in an attempt to elevate privileges.
Why these techniques?

CVE directly describes DLL hijacking (CWE-427) enabling local privilege escalation and arbitrary code execution.

Confidence: HIGH · MITRE ATT&CK Enterprise v18.1

NVD Description

A DLL hijacking vulnerability in Vivado could allow a local attacker to achieve privilege escalation, potentially resulting in arbitrary code execution.

Deeper analysisAI

CVE-2025-52541 is a DLL hijacking vulnerability (CWE-427) in Vivado that could allow a local attacker to achieve privilege escalation, potentially resulting in arbitrary code execution. The vulnerability carries a CVSS v3.1 base score of 7.3 (AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H) and was published on 2026-02-11T15:16:15.403.

A local attacker with low privileges (PR:L) can exploit this vulnerability, which has low attack complexity (AC:L) but requires user interaction (UI:R). Successful exploitation enables privilege escalation and arbitrary code execution with high impacts on confidentiality, integrity, and availability.

AMD has published security bulletin AMD-SB-8013 with details on the vulnerability at https://www.amd.com/en/resources/product-security/bulletin/AMD-SB-8013.html.

Details

CWE(s)

Affected Products

Amd
inferred from references and description; NVD did not file a CPE for this CVE

CVEs Like This One

CVE-2026-3091Shared CWE-427
CVE-2025-33229Shared CWE-427
CVE-2026-21420Shared CWE-427
CVE-2024-9492Shared CWE-427
CVE-2024-9498Shared CWE-427
CVE-2026-3775Shared CWE-427
CVE-2024-55543Shared CWE-427
CVE-2025-54519Shared CWE-427
CVE-2026-7279Shared CWE-427
CVE-2025-0069Shared CWE-427

References