AMD has disclosed a critical vulnerability affecting its Zen 5 processor lineup that compromises the reliability of random number generation, a fundamental security feature in modern computing.
The flaw, tracked as CVE-2025-62626, impacts the RDSEED instruction used by systems to generate cryptographically secure random numbers essential for encryption, authentication, and other security operations.
The vulnerability stems from a defect in the RDSEED instruction implementation on Zen 5 processors. Under certain conditions, the instruction returns a value of zero while incorrectly signaling success through the carry flag (CF=1).
This behavior creates a dangerous scenario where software believes it has received a valid random number when it has actually obtained a predictable zero value. The issue affects both 16-bit and 32-bit forms of the RDSEED instruction, though the 64-bit version remains unaffected.
Understanding the RDSEED Flaw
AMD learned about this bug through an unconventional channel. The issue was first reported publicly on the Linux kernel mailing list rather than through AMD’s standard Coordinated Vulnerability Disclosure process.
This public disclosure path highlights the collaborative nature of open-source security research but also underscores the challenge of managing security information across diverse reporting channels.
The severity of this vulnerability cannot be understated. Random number generation forms the backbone of cryptographic security in modern systems.
When RDSEED fails silently by returning zeros while indicating success, applications may generate weak encryption keys, predictable authentication tokens, or compromised security protocols.
| CVE | CVE Description | CVSS Score | 
|---|---|---|
| CVE-2025-62626 | Improper handling of insufficient entropy in the AMD CPUs could allow a local attacker to influence the values returned by the RDSEED instruction, potentially resulting in the consumption of insufficiently random values. | 7.2 (High) CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N | 
An attacker with local system access could potentially exploit this weakness to predict or influence cryptographic operations, leading to data breaches or unauthorized access.
System administrators can utilize the 64-bit form of RDSEED exclusively, mask the RDSEED capability from software detection by modifying boot parameters, or implement software logic to treat zero returns as failures requiring retry attempts. The company plans to release microcode updates and AGESA firmware revisions across its product portfolio.
AMD EPYC 9005 Series processors will receive updates by mid-November 2025, while consumer Ryzen 9000 Series, Ryzen AI 300 Series, and Threadripper 9000 processors target late November releases. Embedded processor variants will see patches deployed through January 2026.
Organizations running affected Zen 5 systems should prioritize applying these updates once available through their original equipment manufacturers.
Until patches are deployed, implementing the recommended software workarounds provides essential protection against potential exploitation of this random integrity vulnerability.
Follow us on Google News, LinkedIn, and X for daily cybersecurity updates. Contact us to feature your stories.




