Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-0029: CWE-390 Detection of Error Condition Without Action in AMD AMD EPYC™ 9005 Series Processors

0
Low
VulnerabilityCVE-2025-0029cvecve-2025-0029cwe-390
Published: Tue Feb 10 2026 (02/10/2026, 19:15:24 UTC)
Source: CVE Database V5
Vendor/Project: AMD
Product: AMD EPYC™ 9005 Series Processors

Description

Improper handling of error condition during host-induced faults can allow a local high-privileged attack to selectively drop guest DMA writes, potentially resulting in a loss of SEV-SNP guest memory integrity

AI-Powered Analysis

AILast updated: 02/18/2026, 10:05:48 UTC

Technical Analysis

CVE-2025-0029 is a vulnerability identified in AMD EPYC™ 9005 Series processors related to the improper handling of error conditions during host-induced faults. Specifically, the issue arises when the processor fails to take appropriate action upon detecting certain error conditions, classified under CWE-390 (Detection of Error Condition Without Action). This flaw allows a local attacker with high privileges on the host system to selectively drop Direct Memory Access (DMA) writes originating from guest virtual machines. The consequence is a potential loss of memory integrity within SEV-SNP (Secure Encrypted Virtualization - Secure Nested Paging) guests, a security feature designed to protect virtual machine memory from unauthorized access or tampering. The vulnerability requires local high-privileged access, does not require user interaction, and does not affect confidentiality or availability significantly, resulting in a low CVSS score of 1.8. The attack vector is limited to local access with high complexity, and no known exploits have been reported in the wild. The lack of patches at the time of publication necessitates vigilance from affected users. This vulnerability highlights a subtle but critical gap in error handling within AMD's secure virtualization technology, potentially undermining the guarantees provided by SEV-SNP against memory tampering in virtualized environments.

Potential Impact

For European organizations, particularly those operating data centers, cloud services, or virtualized environments using AMD EPYC 9005 processors with SEV-SNP enabled, this vulnerability could undermine the integrity assurances of guest virtual machine memory. While the impact is limited due to the requirement of local high privileges and the low CVSS score, the selective dropping of DMA writes could lead to subtle data corruption or manipulation within protected guest environments. This may affect financial institutions, government agencies, and enterprises relying on secure virtualization for sensitive workloads. The risk is more pronounced in multi-tenant cloud infrastructures where guest isolation is critical. However, since exploitation requires local privileged access, the threat is mitigated by strong host security controls. The absence of known exploits reduces immediate risk, but the potential for future exploitation warrants proactive mitigation. Overall, the impact is moderate but could escalate if combined with other vulnerabilities or insider threats.

Mitigation Recommendations

1. Enforce strict access controls and privilege separation on host systems to prevent unauthorized local high-privileged access. 2. Monitor and audit host activities related to DMA operations and SEV-SNP guest interactions to detect anomalies indicative of selective DMA write drops. 3. Maintain up-to-date firmware and microcode from AMD, applying patches promptly once released to address this vulnerability. 4. Employ hardware-based attestation and integrity verification mechanisms for SEV-SNP guests to detect memory integrity violations. 5. Limit the exposure of critical workloads to hosts with unpatched AMD EPYC 9005 processors or consider temporary migration to unaffected hardware. 6. Collaborate with AMD and cloud service providers to receive timely vulnerability disclosures and remediation guidance. 7. Implement layered security controls including host-based intrusion detection and endpoint protection to reduce the risk of privilege escalation enabling exploitation.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
AMD
Date Reserved
2024-11-21T16:17:42.396Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 698b8b0b4b57a58fa1266769

Added to database: 2/10/2026, 7:46:19 PM

Last enriched: 2/18/2026, 10:05:48 AM

Last updated: 2/21/2026, 12:19:37 AM

Views: 26

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats