Cyber Posture

CVE-2025-54519

High

Published: 12 February 2026

Published
12 February 2026
Modified
15 April 2026
KEV Added
Patch
CVSS Score 7.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H
EPSS Score 0.0002 5.1th percentile
Risk Priority 15 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2025-54519 is a high-severity Uncontrolled Search Path Element (CWE-427) vulnerability in Amd (inferred from references). Its CVSS base score is 7.3 (High).

Operationally, exploitation aligns with the MITRE ATT&CK technique DLL Side-Loading (T1574.002); ranked at the 5.1th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.

Threat & Defense at a Glance

What attackers do: exploitation maps to DLL Side-Loading (T1574.002) and 1 other technique.
Threat & Defense Details

MITRE ATT&CK Enterprise TechniquesAI

T1574.002 DLL Side-Loading Stealth
Adversaries may execute their own malicious payloads by side-loading DLLs.
T1068 Exploitation for Privilege Escalation Privilege Escalation
Adversaries may exploit software vulnerabilities in an attempt to elevate privileges.
Why these techniques?

CVE directly describes a DLL hijacking flaw (CWE-427) enabling local privilege escalation and arbitrary code execution, mapping to DLL Side-Loading and Exploitation for Privilege Escalation.

Confidence: HIGH · MITRE ATT&CK Enterprise v18.1

NVD Description

A DLL hijacking vulnerability in Doc Nav could allow a local attacker to achieve privilege escalation, potentially resulting in arbitrary code execution.

Deeper analysisAI

CVE-2025-54519 is a DLL hijacking vulnerability (CWE-427) in Doc Nav that could allow a local attacker to achieve privilege escalation, potentially resulting in arbitrary code execution. The vulnerability affects Doc Nav and was published on 2026-02-12 with a CVSS v3.1 base score of 7.3 (AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H).

A local attacker with low privileges can exploit this vulnerability through low-complexity attack methods that require user interaction. Successful exploitation enables high-impact consequences, including unauthorized access to sensitive data, modification of system integrity, and disruption of availability, all within the original privilege context.

Mitigation details are provided in the AMD security bulletin AMD-SB-8013, available at https://www.amd.com/en/resources/product-security/bulletin/AMD-SB-8013.html.

Details

CWE(s)

Affected Products

Amd
inferred from references and description; NVD did not file a CPE for this CVE

CVEs Like This One

CVE-2024-55543Shared CWE-427
CVE-2025-0069Shared CWE-427
CVE-2026-25655Shared CWE-427
CVE-2024-55898Shared CWE-427
CVE-2024-55540Shared CWE-427
CVE-2025-57836Shared CWE-427
CVE-2025-69784Shared CWE-427
CVE-2025-21206Shared CWE-427
CVE-2025-48503Shared CWE-427
CVE-2024-9491Shared CWE-427

References