Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-29934: CWE-459 Incomplete Cleanup in AMD AMD EPYC™ 9004 Series Processors

0
Medium
VulnerabilityCVE-2025-29934cvecve-2025-29934cwe-459
Published: Fri Nov 21 2025 (11/21/2025, 18:45:16 UTC)
Source: CVE Database V5
Vendor/Project: AMD
Product: AMD EPYC™ 9004 Series Processors

Description

A bug within some AMD CPUs could allow a local admin-privileged attacker to run a SEV-SNP guest using stale TLB entries, potentially resulting in loss of data integrity.

AI-Powered Analysis

AILast updated: 11/28/2025, 22:52:02 UTC

Technical Analysis

CVE-2025-29934 is a vulnerability classified under CWE-459 (Incomplete Cleanup) found in AMD EPYC™ 9004 Series processors. The issue arises due to improper cleanup of Translation Lookaside Buffer (TLB) entries when running Secure Encrypted Virtualization with Secure Nested Paging (SEV-SNP) guests. Specifically, stale TLB entries can persist and be reused by a local attacker who has administrative privileges on the host system. This reuse of stale TLB entries can lead to a breach of data integrity within the SEV-SNP guest environment, potentially allowing an attacker to manipulate or corrupt data that should be protected by the secure virtualization layer. The vulnerability requires the attacker to have local administrative privileges, making remote exploitation infeasible. No user interaction is necessary, and the scope of impact is confined to systems running vulnerable AMD EPYC 9004 processors with SEV-SNP enabled. The CVSS v3.1 score is 5.3 (medium severity), reflecting the high complexity of attack (AC:H), requirement for high privileges (PR:H), and the impact limited to integrity (I:H) without affecting confidentiality or availability. Currently, no patches or exploits are publicly available, but the vulnerability highlights a critical area in secure virtualization technology that could undermine trust in hardware-based security guarantees.

Potential Impact

For European organizations, the primary impact of CVE-2025-29934 lies in the potential compromise of data integrity within virtualized environments that utilize AMD SEV-SNP technology. This is particularly relevant for cloud service providers, data centers, and enterprises relying on AMD EPYC 9004 processors for secure multi-tenant workloads. A successful exploitation could allow a local attacker with admin privileges to manipulate or corrupt data inside secure virtual machines, potentially leading to incorrect processing, data tampering, or undermining compliance with data protection regulations such as GDPR. While confidentiality and availability are not directly impacted, the integrity loss could have cascading effects on business operations, trustworthiness of data, and auditability. The requirement for local admin privileges reduces the attack surface but does not eliminate risk, especially in environments with multiple administrators or where insider threats exist. The absence of known exploits in the wild reduces immediate urgency but does not preclude future exploitation attempts. Organizations with critical infrastructure or sensitive workloads running on affected AMD processors should prioritize risk assessment and mitigation.

Mitigation Recommendations

1. Monitor AMD’s official channels for patches or microcode updates addressing CVE-2025-29934 and apply them promptly once available. 2. Restrict local administrative privileges rigorously to minimize the risk of insider threats or unauthorized local access. 3. Implement strict access controls and auditing on systems running AMD EPYC 9004 processors, especially those hosting SEV-SNP guests. 4. Use hardware and software-based security monitoring to detect anomalous behavior indicative of TLB manipulation or virtualization integrity breaches. 5. Consider isolating critical workloads or sensitive SEV-SNP guests on separate hardware or using alternative secure virtualization technologies until patches are applied. 6. Regularly review and update virtualization platform configurations to ensure they follow best security practices recommended by AMD and virtualization vendors. 7. Educate system administrators about the risks associated with local privilege misuse and enforce policies to reduce the likelihood of privilege escalation or misuse. 8. Conduct penetration testing and vulnerability assessments focusing on local privilege abuse scenarios in environments using AMD EPYC 9004 processors.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
AMD
Date Reserved
2025-03-12T15:14:59.391Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6920b65f6ec873750a9f2a46

Added to database: 11/21/2025, 6:58:39 PM

Last enriched: 11/28/2025, 10:52:02 PM

Last updated: 1/8/2026, 11:36:55 AM

Views: 71

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats