Improper access control within AMD SEV-SNP could allow an admin privileged attacker to write to the RMP during SNP initialization, potentially resulting in a loss of SEV-SNP guest memory integrity.

Project Subscriptions

Vendors Products
Epyc 7003 Subscribe
Epyc 9005 Subscribe
Advisories

No advisories yet.

Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Tue, 21 Oct 2025 09:45:00 +0000

Type Values Removed Values Added
First Time appeared Amd
Amd epyc
Amd epyc 7003
Amd epyc 9005
Vendors & Products Amd
Amd epyc
Amd epyc 7003
Amd epyc 9005

Tue, 14 Oct 2025 19:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Tue, 14 Oct 2025 15:00:00 +0000

Type Values Removed Values Added
Description Improper access control within AMD SEV-SNP could allow an admin privileged attacker to write to the RMP during SNP initialization, potentially resulting in a loss of SEV-SNP guest memory integrity.
Weaknesses CWE-284
References
Metrics cvssV3_1

{'score': 6, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:H/A:N'}


Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: AMD

Published:

Updated: 2025-10-14T19:10:33.818Z

Reserved: 2024-11-21T16:17:59.196Z

Link: CVE-2025-0033

cve-icon Vulnrichment

Updated: 2025-10-14T19:10:29.185Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2025-10-14T15:16:00.787

Modified: 2025-10-14T19:36:29.240

Link: CVE-2025-0033

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2025-10-21T09:42:44Z

Weaknesses