Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-48514: CWE-1220 Insufficient Granularity of Access Control in AMD AMD EPYC™ 9004 Series Processors

0
Medium
VulnerabilityCVE-2025-48514cvecve-2025-48514cwe-1220
Published: Tue Feb 10 2026 (02/10/2026, 19:14:22 UTC)
Source: CVE Database V5
Vendor/Project: AMD
Product: AMD EPYC™ 9004 Series Processors

Description

Insufficient Granularity of Access Control in SEV firmware can allow a privileged attacker to create a SEV-ES Guest to attack SNP guest, potentially resulting in a loss of confidentiality.

AI-Powered Analysis

AILast updated: 02/18/2026, 10:09:23 UTC

Technical Analysis

CVE-2025-48514 identifies a vulnerability in the AMD EPYC™ 9004 Series processors related to the Secure Encrypted Virtualization (SEV) firmware, specifically the SEV-ES (Encrypted State) and SEV-SNP (Secure Nested Paging) features. The issue stems from insufficient granularity in access control mechanisms within the SEV firmware, categorized under CWE-1220. This weakness allows an attacker with privileged access on the host system to instantiate a SEV-ES guest virtual machine that can then attack an SNP guest VM. Since SEV-SNP is designed to provide strong isolation and confidentiality guarantees for guest VMs by encrypting memory and protecting against hypervisor attacks, this vulnerability undermines those protections. The attack vector requires local access with high privileges, no user interaction, and does not affect integrity or availability but compromises confidentiality. The CVSS 4.0 score reflects the limited attack vector (local) and the requirement for privileges but acknowledges the high scope of confidentiality impact. No public exploits have been reported yet, and no patches are currently linked, indicating that this is a recently disclosed vulnerability. The vulnerability is significant in cloud and multi-tenant environments where AMD EPYC 9004 processors are deployed to provide hardware-based VM isolation and encryption. An attacker exploiting this flaw could potentially extract sensitive data from protected guest VMs, violating confidentiality guarantees critical in regulated industries and sensitive workloads.

Potential Impact

For European organizations, especially those operating cloud services, data centers, or virtualized environments using AMD EPYC 9004 processors, this vulnerability poses a risk to the confidentiality of sensitive data. The ability for a privileged attacker to breach SEV-SNP protections could lead to unauthorized data disclosure across virtual machines, undermining trust in hardware-based security features. This is particularly impactful for sectors handling personal data under GDPR, financial institutions, and government entities requiring strong isolation. The vulnerability could also affect cloud service providers offering confidential computing services, potentially leading to reputational damage and regulatory consequences if exploited. However, the requirement for local privileged access limits the attack surface primarily to insiders or attackers who have already compromised host systems. The lack of known exploits reduces immediate risk but does not eliminate the threat, especially as attackers may develop exploits post-disclosure. Organizations relying on AMD SEV-SNP for secure virtualization should consider this vulnerability a significant confidentiality risk that requires prompt attention.

Mitigation Recommendations

1. Apply firmware and microcode updates from AMD as soon as they become available to address this vulnerability. 2. Enforce strict access controls and privilege separation on host systems to prevent unauthorized users from gaining the high-level privileges required to exploit this flaw. 3. Limit the creation and management of SEV-ES guests to trusted administrators and monitor for anomalous VM creation activities. 4. Employ runtime monitoring and integrity verification tools to detect suspicious behavior indicative of attempts to exploit SEV firmware vulnerabilities. 5. Isolate sensitive workloads on hardware or environments not affected by this vulnerability until patches are applied. 6. Engage with cloud service providers to understand their mitigation strategies if using third-party infrastructure. 7. Conduct regular security audits and penetration testing focusing on virtualization security to identify potential privilege escalations. 8. Maintain up-to-date incident response plans that include scenarios involving hardware-based virtualization attacks.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
AMD
Date Reserved
2025-05-22T16:34:07.747Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 698b8b0c4b57a58fa12667bf

Added to database: 2/10/2026, 7:46:20 PM

Last enriched: 2/18/2026, 10:09:23 AM

Last updated: 2/21/2026, 12:20:16 AM

Views: 20

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats