2 vulnerabilities classified as CWE-1189. AI Chinese analysis included.
CWE-1189 represents a critical architectural weakness where a System-on-a-Chip fails to enforce strict isolation between trusted and untrusted agents sharing internal resources. This vulnerability typically arises from improper configuration of pin multiplexing or shared memory interfaces, allowing malicious actors to exploit the lack of boundaries. Attackers can leverage this flaw to intercept sensitive data, manipulate control signals, or execute unauthorized commands by accessing resources intended for secure subsystems. To mitigate this risk, developers must implement rigorous hardware-level access controls and memory protection units that strictly segregate privileged and non-privileged domains. Furthermore, engineers should conduct thorough threat modeling during the design phase to identify shared resource conflicts and apply least-privilege principles, ensuring that only authorized agents can interact with critical hardware components, thereby preserving system integrity and confidentiality.
| CVE ID | Title | CVSS | Severity | Published |
|---|---|---|---|---|
| CVE-2025-54514 | AMD Processors 安全漏洞 — AMD EPYC™ 9005 Series Processors | 2.3AI | LowAI | 2026-02-10 |
| CVE-2023-31325 | AMD Graphics Driver和AMD Client Processor 安全漏洞 — AMD Ryzen™ 8000 Series Desktop Processors | 7.2 | High | 2025-09-06 |
Vulnerabilities classified as CWE-1189 represent 2 CVEs. The CWE taxonomy describes the weakness; review individual CVEs for product-specific impact.