Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-29950: CWE-1274 Improper Access Control for Volatile Memory Containing Boot Code in AMD AMD EPYC™ 9004 Series Processors

0
High
VulnerabilityCVE-2025-29950cvecve-2025-29950cwe-1274
Published: Tue Feb 10 2026 (02/10/2026, 19:10:28 UTC)
Source: CVE Database V5
Vendor/Project: AMD
Product: AMD EPYC™ 9004 Series Processors

Description

Improper input validation in system management mode (SMM) could allow a privileged attacker to overwrite stack memory leading to arbitrary code execution.

AI-Powered Analysis

AILast updated: 02/10/2026, 20:01:56 UTC

Technical Analysis

CVE-2025-29950 is a vulnerability classified under CWE-1274, indicating improper access control related to volatile memory containing boot code in AMD EPYC™ 9004 Series processors. The root cause is improper input validation within the system management mode (SMM), a highly privileged execution environment used for low-level system management tasks. This flaw enables a privileged attacker—such as a local administrator or a malicious insider with elevated rights—to overwrite stack memory in the SMM context. Such memory corruption can lead to arbitrary code execution, allowing the attacker to execute malicious code with the highest system privileges. The vulnerability does not require user interaction but does require high-level privileges and local access, limiting remote exploitation. The CVSS 4.0 vector (AV:L/AC:H/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N) reflects that the attack vector is local, with high attack complexity and privileges required, but with severe impacts on confidentiality, integrity, and availability. No patches have been released at the time of this report, and no known exploits are currently active in the wild. This vulnerability is critical for environments relying on AMD EPYC 9004 processors, especially in data centers and cloud infrastructures where SMM integrity is vital for secure boot and system management.

Potential Impact

For European organizations, the impact of CVE-2025-29950 is significant, particularly for enterprises and cloud service providers using AMD EPYC 9004 processors in their server infrastructure. Successful exploitation could allow attackers to gain persistent, high-privilege control over affected systems, compromising sensitive data and disrupting critical services. This could lead to breaches of confidentiality through unauthorized data access, integrity violations via code injection or manipulation of system management functions, and availability issues if system stability is compromised. Given the reliance on EPYC processors in European data centers and critical infrastructure, the vulnerability poses a risk to sectors such as finance, telecommunications, government, and healthcare. The local and privileged nature of the attack vector means insider threats or compromised administrative accounts are primary concerns. Additionally, the lack of current patches increases exposure until mitigations are applied.

Mitigation Recommendations

1. Monitor AMD's official channels closely for the release of security patches addressing CVE-2025-29950 and prioritize their deployment in all affected systems. 2. Restrict and audit privileged access to systems running AMD EPYC 9004 processors to minimize the risk of local privilege abuse. 3. Implement strict access controls and multi-factor authentication for administrative accounts to reduce the likelihood of privilege escalation. 4. Employ runtime integrity monitoring tools capable of detecting anomalous behavior within the system management mode or unusual stack memory modifications. 5. Use hardware-based security features and firmware validation mechanisms to ensure the integrity of SMM code and prevent unauthorized modifications. 6. Conduct regular security audits and penetration testing focusing on local privilege escalation vectors. 7. Isolate critical systems and limit local access to trusted personnel only. 8. Maintain comprehensive logging and alerting for suspicious activities related to system management functions.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
AMD
Date Reserved
2025-03-12T15:15:04.911Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 698b8b0b4b57a58fa1266778

Added to database: 2/10/2026, 7:46:19 PM

Last enriched: 2/10/2026, 8:01:56 PM

Last updated: 2/21/2026, 12:18:23 AM

Views: 13

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats