AMD

AMD

AMD disclosed a critical security flaw named **RMPocalypse (CVE-2025-0033)** in its **Secure Encrypted Virtualization with Secure Nested Paging (SEV-SNP)** mechanism, affecting multiple **EPYC processor series (7003, 8004, 9004, 9005, and Embedded variants)**. The vulnerability stems from **incomplete protections in the Reverse Map Paging (RMP) table initialization**, allowing attackers with **admin-level hypervisor access** to exploit a **race condition** during AMD Secure Processor (PSP) setup.Exploitation enables **arbitrary memory corruption**, bypassing SEV-SNP’s confidentiality and integrity guarantees. Attackers can **inject malicious code, forge security attestations, replay old states, or activate debug modes**, leading to **full compromise of confidential virtual machines (CVMs)** and **100% success rate in exfiltrating secrets**. While no evidence of active exploitation exists, the flaw undermines **cloud security foundations**, particularly in **Azure Confidential Computing (ACC)** and enterprise environments relying on AMD’s hardware-based isolation.Patches are available for most affected processors, though **Embedded 7003 and 9005 series fixes are delayed until November 2025**. The vulnerability highlights systemic risks in **trusted execution environments (TEEs)**, where **initialization gaps** can nullify all subsequent security assurances.

Source: https://thehackernews.com/2025/10/rmpocalypse-single-8-byte-write.html

TPRM report: https://www.rankiteo.com/company/amd

"id": "amd1932419101425",
"linkid": "amd",
"type": "Vulnerability",
"date": "10/2025",
"severity": "85",
"impact": "4",
"explanation": "Attack with significant impact with customers data leaks"
{'affected_entities': [{'customers_affected': ['Cloud Service Providers (e.g., '
                                               'Microsoft Azure)',
                                               'Enterprise Customers Using '
                                               'EPYC Processors',
                                               'Supermicro Motherboard Users'],
                        'industry': 'Semiconductors/Chipmaking',
                        'location': 'Santa Clara, California, USA',
                        'name': 'Advanced Micro Devices (AMD)',
                        'type': 'Corporation'},
                       {'customers_affected': ['Azure Customers Using '
                                               'AMD-based Confidential '
                                               'Computing Clusters'],
                        'industry': 'Cloud Computing',
                        'location': 'Redmond, Washington, USA',
                        'name': 'Microsoft (Azure Confidential Computing)',
                        'type': 'Corporation'},
                       {'customers_affected': ['Customers Using Affected '
                                               'Motherboard SKUs'],
                        'industry': 'Hardware/Server Manufacturing',
                        'location': 'San Jose, California, USA',
                        'name': 'Supermicro',
                        'type': 'Corporation'}],
 'attack_vector': ['Local (Admin-Privileged Hypervisor)',
                   'Memory Manipulation'],
 'customer_advisories': ['Apply firmware updates for affected EPYC processors.',
                         'Azure customers: Monitor Microsoft advisories for '
                         'ACC cluster remediation.',
                         'Review confidential workloads for potential exposure '
                         'due to SEV-SNP bypass.'],
 'data_breach': {'data_encryption': ['SEV-SNP (Compromised Due to RMP '
                                     'Corruption)'],
                 'data_exfiltration': True,
                 'sensitivity_of_data': 'High (Confidential Computing Secrets, '
                                        'VM Memory Contents)',
                 'type_of_data_compromised': ['Guest Memory in CVMs',
                                              'Secrets',
                                              'Security Metadata in RMP '
                                              'Table']},
 'description': 'AMD has released fixes for a security flaw dubbed '
                "'RMPocalypse' (CVE-2025-0033) that undermines the "
                'confidentiality and integrity protections of Secure Encrypted '
                'Virtualization with Secure Nested Paging (SEV-SNP). The '
                'vulnerability, discovered by ETH Zürich researchers Benedict '
                'Schlüter and Shweta Shinde, exploits incomplete protections '
                "in AMD's Reverse Map Paging (RMP) table initialization, "
                'allowing attackers to perform a single memory write to '
                'corrupt the RMP. This can lead to arbitrary tampering with '
                'confidential virtual machines (CVMs), exfiltration of '
                'secrets, activation of hidden functions (e.g., debug mode), '
                'attestation forgeries, replay attacks, and foreign code '
                'injection. The flaw stems from a race condition during the '
                'AMD Secure Processor (PSP) initialization of the RMP, '
                'enabling a malicious hypervisor to manipulate its content. '
                'AMD has assigned a CVSS v4 score of 5.9 to the vulnerability.',
 'impact': {'brand_reputation_impact': ["Potential Erosion of Trust in AMD's "
                                        'Confidential Computing Guarantees'],
            'data_compromised': ['Sensitive Information in Confidential '
                                 'Virtual Machines (CVMs)',
                                 'Secrets (100% Success Rate)',
                                 'Guest Memory Integrity'],
            'operational_impact': ['Loss of SEV-SNP Guest Memory Integrity',
                                   'Full Breach of Confidentiality',
                                   'Bypass of Protective Functions in CVMs'],
            'systems_affected': ['AMD EPYC™ 7003 Series Processors',
                                 'AMD EPYC™ 8004 Series Processors',
                                 'AMD EPYC™ 9004 Series Processors',
                                 'AMD EPYC™ 9005 Series Processors',
                                 'AMD EPYC™ Embedded 7003 Series Processors '
                                 '(Fix planned for November 2025)',
                                 'AMD EPYC™ Embedded 8004 Series Processors',
                                 'AMD EPYC™ Embedded 9004 Series Processors',
                                 'AMD EPYC™ Embedded 9005 Series Processors '
                                 '(Fix planned for November 2025)',
                                 'Azure Confidential Computing (ACC) AMD-based '
                                 'clusters',
                                 'Supermicro motherboards (requiring BIOS '
                                 'updates)']},
 'investigation_status': 'Ongoing (Patches Released; Embedded Series Fixes '
                         'Planned for November 2025)',
 'lessons_learned': ['Incomplete protection mechanisms in hardware security '
                     'features (e.g., RMP) can create critical attack '
                     'surfaces.',
                     'Race conditions during initialization phases of security '
                     'components (e.g., PSP/RMP) require robust safeguards.',
                     'Single memory corruption (e.g., 8-byte overwrite in RMP) '
                     'can fully compromise system-wide integrity and '
                     'confidentiality.',
                     'Hypervisor-level attacks can undermine confidential '
                     'computing guarantees, necessitating defense-in-depth '
                     'strategies.'],
 'post_incident_analysis': {'corrective_actions': ['AMD patches to eliminate '
                                                   'race condition in RMP '
                                                   'initialization.',
                                                   'BIOS updates for '
                                                   'Supermicro motherboards to '
                                                   'enforce RMP integrity.',
                                                   'Microsoft remediation for '
                                                   'Azure ACC clusters to '
                                                   'prevent hypervisor-level '
                                                   'exploitation.',
                                                   'Planned fixes for embedded '
                                                   'EPYC series (November '
                                                   '2025).'],
                            'root_causes': ['Race condition during AMD Secure '
                                            'Processor (PSP) initialization of '
                                            'the RMP table.',
                                            'Inadequate protection of RMP '
                                            'during VM startup, creating a '
                                            'window for corruption.',
                                            'Single memory write vulnerability '
                                            'in RMP leading to system-wide '
                                            'compromise.',
                                            'Design assumption that RMP would '
                                            'be fully protected during '
                                            'initialization proved flawed.']},
 'recommendations': ['Apply AMD-provided patches and BIOS updates immediately '
                     'for affected EPYC processors.',
                     'Cloud providers (e.g., Azure) should prioritize '
                     'remediation for confidential computing clusters.',
                     'Implement additional runtime integrity checks for RMP '
                     'tables to detect tampering.',
                     'Conduct third-party audits of hardware security '
                     'mechanisms (e.g., SEV-SNP) to identify design gaps.',
                     'Monitor for anomalous hypervisor activity that may '
                     'indicate RMP manipulation attempts.',
                     'Evaluate compensatory controls (e.g., memory encryption, '
                     'attestation enhancements) for systems awaiting patches.'],
 'references': [{'source': 'AMD Security Advisory for CVE-2025-0033'},
                {'source': 'ETH Zürich Research Paper on RMPocalypse'},
                {'source': 'Microsoft Azure Advisory on CVE-2025-0033'},
                {'source': 'Supermicro Security Bulletin'},
                {'source': "The Hacker News - 'RMPocalypse: New AMD Flaw "
                           'Breaks SEV-SNP Confidential Computing '
                           "Guarantees'"}],
 'response': {'communication_strategy': ['AMD Security Advisory (Released '
                                         'Monday)',
                                         'Public Disclosure via ETH Zürich '
                                         'Research Paper'],
              'containment_measures': ['AMD-Released Patches',
                                       'BIOS Updates for Supermicro '
                                       'Motherboards',
                                       'Microsoft Remediation for Azure ACC'],
              'incident_response_plan_activated': True,
              'remediation_measures': ['Fixes for EPYC Processors (Planned for '
                                       'November 2025 for Embedded 7003/9005 '
                                       'Series)'],
              'third_party_assistance': ['ETH Zürich Researchers (Benedict '
                                         'Schlüter, Shweta Shinde)']},
 'stakeholder_advisories': ['AMD Customers',
                            'Cloud Service Providers',
                            'Enterprise IT Administrators',
                            'Supermicro Motherboard Users'],
 'title': 'RMPocalypse Vulnerability in AMD SEV-SNP (CVE-2025-0033)',
 'type': ['Vulnerability',
          'Memory Corruption',
          'Race Condition',
          'Privilege Escalation'],
 'vulnerability_exploited': 'CVE-2025-0033 (Race Condition in AMD SEV-SNP RMP '
                            'Initialization)'}
Great! Next, complete checkout for full access to Rankiteo Blog.
Welcome back! You've successfully signed in.
You've successfully subscribed to Rankiteo Blog.
Success! Your account is fully activated, you now have access to all content.
Success! Your billing info has been updated.
Your billing was not updated.