Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
Vulnerability Details :

CVE-2025-29939

Summary
Assigner-AMD
Assigner Org ID-b58fc414-a1e4-4f92-9d70-1add41838648
Published At-10 Feb, 2026 | 19:11
Updated At-10 Feb, 2026 | 20:59
Rejected At-
Credits

Improper access control in secure encrypted virtualization (SEV) could allow a privileged attacker to write to the reverse map page (RMP) during secure nested paging (SNP) initialization, potentially resulting in a loss of guest memory confidentiality and integrity.

Vendors
-
Not available
Products
-
Metrics (CVSS)
VersionBase scoreBase severityVector
Weaknesses
Attack Patterns
Solution/Workaround
References
HyperlinkResource Type
EPSS History
Score
Latest Score
-
N/A
No data available for selected date range
Percentile
Latest Percentile
-
N/A
No data available for selected date range
Stakeholder-Specific Vulnerability Categorization (SSVC)
▼Common Vulnerabilities and Exposures (CVE)
cve.org
Assigner:AMD
Assigner Org ID:b58fc414-a1e4-4f92-9d70-1add41838648
Published At:10 Feb, 2026 | 19:11
Updated At:10 Feb, 2026 | 20:59
Rejected At:
▼CVE Numbering Authority (CNA)

Improper access control in secure encrypted virtualization (SEV) could allow a privileged attacker to write to the reverse map page (RMP) during secure nested paging (SNP) initialization, potentially resulting in a loss of guest memory confidentiality and integrity.

Affected Products
Vendor
Advanced Micro Devices, Inc.AMD
Product
AMD EPYC™ 9004 Series Processors
Default Status
affected
Versions
Unaffected
  • GenoaPI 1.0.0.G
Vendor
Advanced Micro Devices, Inc.AMD
Product
AMD EPYC™ 7003 Series Processors
Default Status
affected
Versions
Unaffected
  • MilanPI 1.0.0.H
Vendor
Advanced Micro Devices, Inc.AMD
Product
AMD EPYC™ 9005 Series Processors
Default Status
affected
Versions
Unaffected
  • TurinPI 1.0.0.6
Vendor
Advanced Micro Devices, Inc.AMD
Product
AMD EPYC™ 8004 Series Processors
Default Status
affected
Versions
Unaffected
  • GenoaPI 1.0.0.G
Vendor
Advanced Micro Devices, Inc.AMD
Product
AMD EPYC™ Embedded 7003 Series Processors
Default Status
affected
Versions
Unaffected
  • EmbMilanPI-SP3 v9 1.0.0.C
Vendor
Advanced Micro Devices, Inc.AMD
Product
AMD EPYC™ Embedded 9004 Series Processors (formerly codenamed "Genoa")
Default Status
affected
Versions
Unaffected
  • EmbGenoaPI-SP5 1.0.0.B
Vendor
Advanced Micro Devices, Inc.AMD
Product
AMD EPYC™ Embedded 9005 Series Processors
Default Status
affected
Versions
Unaffected
  • EmbTurinPI-SP5_1.0.0.1
Vendor
Advanced Micro Devices, Inc.AMD
Product
AMD EPYC™ Embedded 9004 Series Processors (formerly codenamed "Bergamo")
Default Status
affected
Versions
Unaffected
  • EmbGenoaPI-SP5 1.0.0.B
Vendor
Advanced Micro Devices, Inc.AMD
Product
AMD EPYC™ Embedded 8004 Series Processors
Default Status
affected
Versions
Unaffected
  • EmbGenoaPI-SP5 1.0.0.B
Problem Types
TypeCWE IDDescription
CWECWE-284CWE-284 Improper Access Control
Type: CWE
CWE ID: CWE-284
Description: CWE-284 Improper Access Control
Metrics
VersionBase scoreBase severityVector
4.06.9MEDIUM
CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:H/VA:N/SC:H/SI:H/SA:N
Version: 4.0
Base score: 6.9
Base severity: MEDIUM
Vector:
CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:H/VA:N/SC:H/SI:H/SA:N
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://www.amd.com/en/resources/product-security/bulletin/AMD-SB-3023.html
N/A
Hyperlink: https://www.amd.com/en/resources/product-security/bulletin/AMD-SB-3023.html
Resource: N/A
▼Authorized Data Publishers (ADP)
CISA ADP Vulnrichment
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
Information is not available yet
▼National Vulnerability Database (NVD)
nvd.nist.gov
Source:psirt@amd.com
Published At:10 Feb, 2026 | 20:16
Updated At:10 Feb, 2026 | 21:51

Improper access control in secure encrypted virtualization (SEV) could allow a privileged attacker to write to the reverse map page (RMP) during secure nested paging (SNP) initialization, potentially resulting in a loss of guest memory confidentiality and integrity.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Date Added: N/A
Due Date: N/A
Vulnerability Name: N/A
Required Action: N/A
Metrics
TypeVersionBase scoreBase severityVector
Secondary4.06.9MEDIUM
CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:H/VA:N/SC:H/SI:H/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Type: Secondary
Version: 4.0
Base score: 6.9
Base severity: MEDIUM
Vector:
CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:H/VA:N/SC:H/SI:H/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
CPE Matches

Weaknesses
CWE IDTypeSource
CWE-284Secondarypsirt@amd.com
CWE ID: CWE-284
Type: Secondary
Source: psirt@amd.com
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
https://www.amd.com/en/resources/product-security/bulletin/AMD-SB-3023.htmlpsirt@amd.com
N/A
Hyperlink: https://www.amd.com/en/resources/product-security/bulletin/AMD-SB-3023.html
Source: psirt@amd.com
Resource: N/A

Change History

0
Information is not available yet

Similar CVEs

10Records found

CVE-2021-26334
Matching Score-6
Assigner-Advanced Micro Devices Inc.
ShareView Details
Matching Score-6
Assigner-Advanced Micro Devices Inc.
CVSS Score-9.9||CRITICAL
EPSS-0.51% / 65.74%
||
7 Day CHG~0.00%
Published-01 Dec, 2021 | 15:43
Updated-17 Sep, 2024 | 00:40
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
AMD Chipset Driver Information Disclosure Vulnerability

The AMDPowerProfiler.sys driver of AMD μProf tool may allow lower privileged users to access MSRs in kernel which may lead to privilege escalation and ring-0 code execution by the lower privileged user.

Action-Not Available
Vendor-Advanced Micro Devices, Inc.Linux Kernel Organization, IncMicrosoft Corporation
Product-windowsamd_uproflinux_kernelμProf Tool
CWE ID-CWE-284
Improper Access Control
CVE-2021-26360
Matching Score-6
Assigner-Advanced Micro Devices Inc.
ShareView Details
Matching Score-6
Assigner-Advanced Micro Devices Inc.
CVSS Score-7.8||HIGH
EPSS-0.04% / 13.68%
||
7 Day CHG~0.00%
Published-09 Nov, 2022 | 20:44
Updated-01 May, 2025 | 15:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An attacker with local access to the system can make unauthorized modifications of the security configuration of the SOC registers. This could allow potential corruption of AMD secure processor’s encrypted memory contents which may lead to arbitrary code execution in ASP.

Action-Not Available
Vendor-Advanced Micro Devices, Inc.
Product-radeon_softwareradeon_rx_6800mradeon_rx_6500_xtradeon_pro_w6600mradeon_rx_6300mradeon_rx_6750_xtradeon_rx_6800radeon_pro_w6800radeon_rx_6900_xtradeon_rx_6600sradeon_pro_w6600radeon_rx_6650m_xtradeon_pro_w6900xradeon_pro_w6400radeon_rx_6500mradeon_rx_6800sradeon_rx_6950_xtradeon_rx_6600_xtradeon_rx_6600mradeon_rx_6700mradeon_rx_6700_xtradeon_pro_w6800x_duoradeon_pro_softwareradeon_rx_6700radeon_rx_6850m_xtradeon_rx_6700sradeon_pro_w6800xradeon_rx_6650mradeon_rx_6800_xtenterprise_driverradeon_rx_6400radeon_rx_6600radeon_pro_w6300mradeon_rx_6650_xtradeon_pro_w6600xradeon_pro_w6500mAMD Radeon RX 6000 Series & PRO W6000 Series
CWE ID-CWE-284
Improper Access Control
CVE-2021-26338
Matching Score-6
Assigner-Advanced Micro Devices Inc.
ShareView Details
Matching Score-6
Assigner-Advanced Micro Devices Inc.
CVSS Score-7.5||HIGH
EPSS-0.31% / 54.10%
||
7 Day CHG~0.00%
Published-16 Nov, 2021 | 17:53
Updated-17 Sep, 2024 | 01:56
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Improper access controls in System Management Unit (SMU) may allow for an attacker to override performance control tables located in DRAM resulting in a potential lack of system resources.

Action-Not Available
Vendor-Advanced Micro Devices, Inc.
Product-epyc_7543epyc_7502_firmwareepyc_7402epyc_7262_firmwareepyc_7443_firmwareepyc_7402pepyc_7343epyc_7252_firmwareepyc_7543_firmwareepyc_7282_firmwareepyc_7542_firmwareepyc_7f32epyc_7763_firmwareepyc_7272_firmwareepyc_7713pepyc_7443epyc_7513epyc_7313p_firmwareepyc_7252epyc_7502pepyc_7232p_firmwareepyc_7702epyc_7302p_firmwareepyc_7453epyc_7642_firmwareepyc_7h12epyc_7452epyc_7513_firmwareepyc_7543p_firmwareepyc_7542epyc_7302epyc_7413_firmwareepyc_7h12_firmwareepyc_7232pepyc_7643_firmwareepyc_7f52epyc_7663epyc_7552_firmwareepyc_75f3epyc_72f3_firmwareepyc_7f72epyc_7f32_firmwareepyc_7662epyc_7f72_firmwareepyc_7662_firmwareepyc_7502epyc_75f3_firmwareepyc_7642epyc_7343_firmwareepyc_7532_firmwareepyc_7502p_firmwareepyc_7413epyc_7313pepyc_7313epyc_7663_firmwareepyc_7552epyc_7302pepyc_7702p_firmwareepyc_74f3_firmwareepyc_7352epyc_7302_firmwareepyc_7763epyc_7713_firmwareepyc_7402_firmwareepyc_7742epyc_7713p_firmwareepyc_7272epyc_73f3_firmwareepyc_7702pepyc_7f52_firmwareepyc_7262epyc_7713epyc_7443p_firmwareepyc_72f3epyc_7643epyc_7452_firmwareepyc_7402p_firmwareepyc_7543pepyc_7313_firmwareepyc_7443pepyc_7742_firmwareepyc_7453_firmwareepyc_7282epyc_7702_firmwareepyc_7352_firmwareepyc_74f3epyc_7532epyc_73f32nd Gen AMD EPYC™3rd Gen AMD EPYC™
CWE ID-CWE-284
Improper Access Control
CVE-2023-31341
Matching Score-6
Assigner-Advanced Micro Devices Inc.
ShareView Details
Matching Score-6
Assigner-Advanced Micro Devices Inc.
CVSS Score-7.3||HIGH
EPSS-0.07% / 22.37%
||
7 Day CHG~0.00%
Published-13 Aug, 2024 | 16:57
Updated-26 Feb, 2025 | 07:14
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Insufficient validation of the Input Output Control (IOCTL) input buffer in AMD μProf may allow an authenticated attacker to cause an out-of-bounds write, potentially causing a Windows® OS crash, resulting in denial of service.

Action-Not Available
Vendor-Advanced Micro Devices, Inc.
Product-uprofμProf Toolamd_uprof
CWE ID-CWE-284
Improper Access Control
CVE-2022-27673
Matching Score-6
Assigner-Advanced Micro Devices Inc.
ShareView Details
Matching Score-6
Assigner-Advanced Micro Devices Inc.
CVSS Score-7.5||HIGH
EPSS-0.28% / 50.61%
||
7 Day CHG~0.00%
Published-09 Nov, 2022 | 20:46
Updated-01 May, 2025 | 14:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Insufficient access controls in the AMD Link Android app may potentially result in information disclosure.

Action-Not Available
Vendor-Advanced Micro Devices, Inc.
Product-amd_linkAMD Link Android
CWE ID-CWE-284
Improper Access Control
CVE-2022-23829
Matching Score-6
Assigner-Advanced Micro Devices Inc.
ShareView Details
Matching Score-6
Assigner-Advanced Micro Devices Inc.
CVSS Score-8.2||HIGH
EPSS-0.01% / 0.41%
||
7 Day CHG~0.00%
Published-18 Jun, 2024 | 19:01
Updated-29 Aug, 2024 | 21:35
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A potential weakness in AMD SPI protection features may allow a malicious attacker with Ring0 (kernel mode) access to bypass the native System Management Mode (SMM) ROM protections.

Action-Not Available
Vendor-Advanced Micro Devices, Inc.
Product-AMD Ryzen™ 3000 Series Desktop ProcessorsAMD EPYC™ Embedded 70033rd Gen AMD EPYC™ ProcessorsAMD RyzenTM Embedded R1000AMD Ryzen™ 4000 Series Mobile ProcessorsAMD Ryzen™ 5000 Series Desktop Processors2nd Gen AMD EPYC™ ProcessorsAMD Ryzen™ 7000 Series Desktop ProcessorsAMD Ryzen™ 5000 Series Mobile Processors with Radeon™ GraphicsAMD RyzenTM Embedded V30001st Gen AMD EPYC™ ProcessorsAMD Ryzen™ 6000 Series Mobile Processors and WorkstationsAMD RyzenTM Embedded R2000AMD Ryzen™ 5000 Series Mobile ProcessorsAMD EPYC™ Embedded 3000AMD RyzenTM Embedded V2000AMD Ryzen™ Threadripper™ PRO Processors 5900 WX-SeriesAMD RyzenTM Embedded 5000AMD RyzenTM Embedded V1000AMD Ryzen™ 3000 Series Mobile Processor / 2nd Gen AMD Ryzen™ Mobile Processor with Radeon™ GraphicsAMD Athlon™ 3000 Series Mobile Processors with Radeon™ GraphicsAMD Ryzen™ Threadripper™ PRO ProcessorAMD EPYC (TM) Embedded 7002AMD Ryzen™ 4000 Series Desktop Processors with Radeon™ Graphicsryzen_threadripper_pro_5995wxryzen_6980hx
CWE ID-CWE-284
Improper Access Control
CVE-2023-31346
Matching Score-6
Assigner-Advanced Micro Devices Inc.
ShareView Details
Matching Score-6
Assigner-Advanced Micro Devices Inc.
CVSS Score-6||MEDIUM
EPSS-0.04% / 10.51%
||
7 Day CHG~0.00%
Published-13 Feb, 2024 | 19:18
Updated-20 Mar, 2025 | 21:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Failure to initialize memory in SEV Firmware may allow a privileged attacker to access stale data from other guests.

Action-Not Available
Vendor-Advanced Micro Devices, Inc.
Product-epyc_9224epyc_9654p_firmwareepyc_7303epyc_7643_firmwareepyc_9474f_firmwareepyc_9374fepyc_9534epyc_7313pepyc_7663_firmwareepyc_9254_firmwareepyc_7203pepyc_7313p_firmwareepyc_9174f_firmwareepyc_9384x_firmwareepyc_7543p_firmwareepyc_7203p_firmwareepyc_9654_firmwareepyc_7443pepyc_9554_firmwareepyc_7763_firmwareepyc_9634epyc_9654pepyc_9454pepyc_7663epyc_8324pepyc_9124_firmwareepyc_7713epyc_7543epyc_7713_firmwareepyc_9684xepyc_7643epyc_7663p_firmwareepyc_8224pn_firmwareepyc_8434pn_firmwareepyc_9454p_firmwareepyc_7773x_firmwareepyc_7543pepyc_72f3_firmwareepyc_7573x_firmwareepyc_8534pnepyc_9374f_firmwareepyc_9274f_firmwareepyc_7343_firmwareepyc_7643pepyc_9124epyc_7573xepyc_9224_firmwareepyc_9534_firmwareepyc_7513_firmwareepyc_7763epyc_8534pepyc_8224p_firmwareepyc_7303_firmwareepyc_7513epyc_7543_firmwareepyc_7303p_firmwareepyc_8024pnepyc_7473xepyc_9184x_firmwareepyc_7453epyc_7413epyc_7443p_firmwareepyc_8224pepyc_75f3epyc_8434pepyc_9354epyc_8434pnepyc_74f3epyc_7303pepyc_9354_firmwareepyc_9474fepyc_75f3_firmwareepyc_7373x_firmwareepyc_9254epyc_9354p_firmwareepyc_9634_firmwareepyc_8024pepyc_9684x_firmwareepyc_7443epyc_9384xepyc_8024p_firmwareepyc_7203_firmwareepyc_8534p_firmwareepyc_7313_firmwareepyc_9554p_firmwareepyc_9554pepyc_72f3epyc_7643p_firmwareepyc_8224pnepyc_8124p_firmwareepyc_7453_firmwareepyc_7713p_firmwareepyc_8324p_firmwareepyc_9334_firmwareepyc_74f3_firmwareepyc_9354pepyc_7473x_firmwareepyc_9174fepyc_7773xepyc_7373xepyc_73f3epyc_8434p_firmwareepyc_9274fepyc_9184xepyc_8534pn_firmwareepyc_7713pepyc_9654epyc_8324pnepyc_7663pepyc_8124pnepyc_8124pepyc_9454epyc_7343epyc_7313epyc_8324pn_firmwareepyc_9334epyc_73f3_firmwareepyc_7443_firmwareepyc_9454_firmwareepyc_8024pn_firmwareepyc_9554epyc_8124pn_firmwareepyc_7413_firmware4th Gen AMD EPYC™ Processors 3rd Gen AMD EPYC™ Processors
CWE ID-CWE-284
Improper Access Control
CVE-2023-20587
Matching Score-6
Assigner-Advanced Micro Devices Inc.
ShareView Details
Matching Score-6
Assigner-Advanced Micro Devices Inc.
CVSS Score-7.1||HIGH
EPSS-0.03% / 9.90%
||
7 Day CHG~0.00%
Published-13 Feb, 2024 | 19:31
Updated-07 May, 2025 | 22:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Improper Access Control in System Management Mode (SMM) may allow an attacker access to the SPI flash potentially leading to arbitrary code execution.

Action-Not Available
Vendor-Advanced Micro Devices, Inc.
Product-4th Gen AMD EPYC™ Processors3rd Gen AMD EPYC™ ProcessorsAMD EPYC(TM) Embedded 7003AMD EPYC(TM) Embedded 90032nd Gen AMD EPYC™ Processors1st Gen AMD EPYC™ ProcessorsAMD EPYC(TM) Embedded 7002 AMD EPYC(TM) Embedded 3000
CWE ID-CWE-284
Improper Access Control
CVE-2023-20579
Matching Score-6
Assigner-Advanced Micro Devices Inc.
ShareView Details
Matching Score-6
Assigner-Advanced Micro Devices Inc.
CVSS Score-4.4||MEDIUM
EPSS-0.01% / 0.45%
||
7 Day CHG~0.00%
Published-13 Feb, 2024 | 19:32
Updated-14 Mar, 2025 | 18:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Improper Access Control in the AMD SPI protection feature may allow a user with Ring0 (kernel mode) privileged access to bypass protections potentially resulting in loss of integrity and availability.

Action-Not Available
Vendor-Advanced Micro Devices, Inc.
Product-ryzen_7_5700geryzen_9_6900hs_firmwareryzen_3_5125cryzen_5_5600uryzen_7_pro_7840uryzen_7_5800hsryzen_7_3780uryzen_3_5300g_firmwareryzen_5_3450uryzen_9_5980hs_firmwareryzen_5_7645hx_firmwareryzen_7_7840h_firmwareryzen_3_5400u_firmwareryzen_5_5500gt_firmwareryzen_7_pro_7745ryzen_embedded_v3c14_firmwareryzen_9_7900x3dryzen_embedded_v2546ryzen_5_pro_7645_firmwareryzen_7_4700g_firmwareryzen_embedded_v3c48_firmwareryzen_7_7700x_firmwareryzen_threadripper_pro_7975wxryzen_embedded_v3c44ryzen_7_4700geryzen_9_4900hryzen_threadripper_pro_7945wx_firmwareryzen_5_7235hsryzen_5_5625cryzen_5_5560u_firmwareryzen_9_7950x_firmwareryzen_5_3580u_firmwareryzen_7_6800h_firmwareryzen_5_7535u_firmwareryzen_9_6980hx_firmwareryzen_7_4800h_firmwareryzen_5_pro_7645ryzen_9_6980hs_firmwareryzen_5_4600gryzen_5_7640hryzen_5_7520u_firmwareryzen_7_5800u_firmwareryzen_7_7735hs_firmwareryzen_5_5600hs_firmwareryzen_5_6600h_firmwareryzen_3_7335u_firmwareryzen_threadripper_pro_7985wxryzen_7_5800hs_firmwareryzen_3_3200u_firmwareryzen_threadripper_pro_7985wx_firmwareryzen_7_3700uryzen_5_5600geryzen_7_7800x3d_firmwareryzen_5_7600ryzen_5_4500uryzen_9_7940hxryzen_threadripper_7980x_firmwareryzen_9_7945hxryzen_5_4600geryzen_7_7700ryzen_3_5125c_firmwareryzen_7_7736u_firmwareryzen_3_3300u_firmwareryzen_5_pro_7640hs_firmwareryzen_9_7940hryzen_threadripper_7960x_firmwareryzen_7_5825cryzen_5_pro_7540uryzen_5_3450u_firmwareryzen_3_4300uryzen_3_5400uryzen_7_6800u_firmwareryzen_embedded_v3c16_firmwareryzen_3_3250u_firmwareryzen_5_pro_7540u_firmwareryzen_embedded_v3c44_firmwareryzen_embedded_v3c18ryzen_9_5900hs_firmwareryzen_7_7745hxryzen_5_7535uryzen_9_pro_7940hs_firmwareryzen_embedded_v2718ryzen_7_6800hsryzen_threadripper_pro_7995wxryzen_7_7435hsryzen_9_7900x_firmwareryzen_7_6800hs_firmwareryzen_3_4300g_firmwareryzen_5_3500c_firmwareryzen_7_4700uryzen_5_pro_7545u_firmwareryzen_3_5300geryzen_3_3250cryzen_5_5500gtryzen_7_3780u_firmwareryzen_7_5800h_firmwareryzen_5_7535hs_firmwareryzen_5_5625c_firmwareryzen_3_7440u_firmwareryzen_5_4600hryzen_9_6900hsryzen_7_7735h_firmwareryzen_5_7640h_firmwareryzen_3_3250uryzen_7_7745hx_firmwareryzen_7_7435hryzen_5_4600ge_firmwareryzen_embedded_v3c48ryzen_9_7845hxryzen_7_3700c_firmwareryzen_9_5900hsryzen_3_3350u_firmwareryzen_3_5425u_firmwareryzen_9_6900hx_firmwareryzen_5_pro_7545uryzen_7_5800hryzen_3_5425uryzen_5_7235hryzen_5_7235hs_firmwareryzen_7_5825u_firmwareryzen_5_7535h_firmwareryzen_7_3700cryzen_embedded_v3c16ryzen_5_5625u_firmwareryzen_5_3550hryzen_3_3350uryzen_7_3750hryzen_threadripper_7960xryzen_3_4300geryzen_7_6800uryzen_5_7645hxryzen_3_4300gryzen_5_5600gtryzen_embedded_v2516ryzen_5_7535hsryzen_5_7600x3dryzen_7_3750h_firmwareryzen_9_7945hx3dryzen_9_7940hx_firmwareryzen_5_6600uryzen_7_7840hryzen_5_5600g_firmwareryzen_7_5700gryzen_5_5625uryzen_threadripper_pro_7975wx_firmwareryzen_7_7735hryzen_5_7500fryzen_9_7945hx_firmwareryzen_9_7950xryzen_7_pro_7840hsryzen_7_pro_7840hs_firmwareryzen_5_7520uryzen_5_4600g_firmwareryzen_9_5900hx_firmwareryzen_embedded_v2718_firmwareryzen_7_5700ge_firmwareryzen_7_7735u_firmwareryzen_5_3580uryzen_9_6980hsryzen_threadripper_pro_7965wx_firmwareryzen_embedded_v2516_firmwareryzen_7_7736uryzen_7_4700gryzen_7_5825uryzen_3_5425cryzen_threadripper_pro_7995wx_firmwareryzen_3_3250c_firmwareryzen_threadripper_pro_7955wxryzen_5_5600u_firmwareryzen_5_6600hryzen_embedded_v2748_firmwareryzen_7_3700u_firmwareryzen_5_5600gryzen_embedded_v2546_firmwareryzen_threadripper_pro_7955wx_firmwareryzen_3_7320u_firmwareryzen_9_6980hxryzen_9_7845hx_firmwareryzen_7_4700u_firmwareryzen_9_7950x3dryzen_7_4800uryzen_7_7735hsryzen_9_7900ryzen_5_6600u_firmwareryzen_9_5900hxryzen_7_pro_7745_firmwareryzen_5_7500f_firmwareryzen_9_7900_firmwareryzen_5_3550h_firmwareryzen_5_5600hsryzen_9_5980hsryzen_5_3500cryzen_threadripper_7980xryzen_3_4300u_firmwareryzen_7_5700g_firmwareryzen_7_pro_7840u_firmwareryzen_3_3300uryzen_5_7535hryzen_9_4900h_firmwareryzen_3_7320uryzen_5_4600u_firmwareryzen_threadripper_7970xryzen_5_6600hs_firmwareryzen_5_7600_firmwareryzen_5_4600h_firmwareryzen_7_7735uryzen_9_7940h_firmwareryzen_7_5825c_firmwareryzen_5_5600gt_firmwareryzen_3_5300gryzen_9_7950x3d_firmwareryzen_3_4300ge_firmwareryzen_9_pro_7945ryzen_threadripper_7970x_firmwareryzen_5_pro_7640uryzen_3_7335uryzen_5_5560uryzen_embedded_v2748ryzen_5_4500u_firmwareryzen_5_4600uryzen_5_7600xryzen_5_3500uryzen_threadripper_pro_7945wxryzen_5_5600hryzen_9_7900xryzen_5_pro_7640u_firmwareryzen_7_7700xryzen_5_5600h_firmwareryzen_7_6800hryzen_5_pro_7640hsryzen_9_pro_7940hsryzen_7_7435hs_firmwareryzen_3_3200uryzen_7_4800hryzen_5_7600x3d_firmwareryzen_9_7945hx3d_firmwareryzen_9_6900hxryzen_threadripper_pro_7965wxryzen_5_7600x_firmwareryzen_3_5425c_firmwareryzen_9_pro_7945_firmwareryzen_embedded_v3c18_firmwareryzen_5_5600ge_firmwareryzen_7_4700ge_firmwareryzen_9_5980hxryzen_7_7800x3dryzen_embedded_v3c14ryzen_5_6600hsryzen_5_7235h_firmwareryzen_3_5300ge_firmwareryzen_9_5980hx_firmwareryzen_7_4800u_firmwareryzen_7_7700_firmwareryzen_9_7900x3d_firmwareryzen_7_5800uryzen_5_3500u_firmwareryzen_3_7440uryzen_7_7435h_firmwareAMD Ryzen™ 7045 Series Mobile Processors AMD Ryzen™ 7000 Series Desktop Processor AMD Ryzen™ 5000 Series Mobile Processors with Radeon™ Graphics AMD Ryzen™ 5000 Series Processors with Radeon™ Graphics AMD Ryzen™ 7020 Series Processors with Radeon™ Graphics AMD Ryzen™ 5000 Series Desktop Processor with Radeon™ Graphics AMD Ryzen™ Embedded V3000AMD Ryzen™ 4000 Series Desktop Processors with Radeon™ Graphics AMD Ryzen™ 3000 Series Processors with Radeon™ GraphicsAMD Ryzen™ 7040 Series Mobile Processors with Radeon™ Graphics AMD Ryzen™ Embedded V2000AMD Ryzen™ 4000 Series Mobile Processors with Radeon™ Graphics AMD Ryzen™ 6000 Series Processors with Radeon™ GraphicsAMD Ryzen™ 7035 Series Mobile Processors with Radeon™ Graphics
CWE ID-CWE-284
Improper Access Control
CVE-2025-0033
Matching Score-6
Assigner-Advanced Micro Devices Inc.
ShareView Details
Matching Score-6
Assigner-Advanced Micro Devices Inc.
CVSS Score-6||MEDIUM
EPSS-0.02% / 2.87%
||
7 Day CHG~0.00%
Published-14 Oct, 2025 | 14:49
Updated-14 Oct, 2025 | 19:36
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Improper access control within AMD SEV-SNP could allow an admin privileged attacker to write to the RMP during SNP initialization, potentially resulting in a loss of SEV-SNP guest memory integrity.

Action-Not Available
Vendor-Advanced Micro Devices, Inc.
Product-AMD EPYC™ 7003 Series Processors (formerly codenamed "Milan")AMD EPYC™ 9005 Series Processors (formerly codenamed "Turin")
CWE ID-CWE-284
Improper Access Control
Details not found