CVE-2025-36357
vulnerability analysis and mitigation

Overview

CVE-2025-36357 is a critical vulnerability affecting AMD's L1 Data Queue, discovered in July 2025 as part of Microsoft's Patch Tuesday updates. This vulnerability is classified as a Transient Scheduler Attack that could lead to information disclosure in AMD processors (Bleeping Computer, GBHackers).

Technical details

The vulnerability is rated as Critical with potential for information disclosure through side-channel attacks targeting AMD's L1 Data Queue scheduler. It was disclosed alongside another AMD vulnerability (CVE-2025-36350) affecting the Store Queue, both involving Transient Scheduler Attacks that could potentially allow attackers to extract sensitive information from AMD processors (GBHackers).

Impact

The vulnerability poses a significant security risk as it could allow attackers to access sensitive information through side-channel attacks on AMD processors. As a critical-rated vulnerability, it has the potential for high impact on system confidentiality (Cybersecurity News).

Mitigation and workarounds

The primary mitigation strategy is to apply the security updates provided in Microsoft's July 2025 Patch Tuesday release. No alternative workarounds have been listed for this vulnerability, indicating that patching is the only effective mitigation method (Cybersecurity News).

Additional resources


SourceThis report was generated using AI

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management