Impact
The vulnerability stems from insufficient checks of the RMP on host buffer access in the IOMMU. A privileged attacker who has already compromised the hypervisor can trigger an out‑of‑bounds condition that bypasses RMP checks, leading to a potential loss of confidential guest integrity. The description does not state other impacts such as privilege escalation or data read/write beyond the loss of integrity.
Affected Systems
The flaw affects AMD EPYC 7003 Series Processors, AMD EPYC 9004 Series Processors, AMD EPYC Embedded 7003 Series Processors, and AMD EPYC Embedded 9004 Series Processors. No specific firmware or minor version details are provided, so all processors listed are considered potentially vulnerable.
Risk and Exploitability
A CVSS score of 5.6 indicates medium severity. No EPSS score is available and the vulnerability is not listed in CISA's KEV catalog, implying limited public exploitation. Exploitation requires a hypervisor that has already been compromised and sufficient privileges to direct host buffer accesses, which reduces the potential scope of broad attacks but still presents a meaningful risk to virtualized environments using these processors.
OpenCVE Enrichment