CVE-2025-48514: CWE-1220 Insufficient Granularity of Access Control in AMD AMD EPYC™ 9004 Series Processors
Insufficient Granularity of Access Control in SEV firmware can allow a privileged attacker to create a SEV-ES Guest to attack SNP guest, potentially resulting in a loss of confidentiality.
AI Analysis
Technical Summary
CVE-2025-48514 identifies a vulnerability in the AMD EPYC™ 9004 Series processors related to the Secure Encrypted Virtualization (SEV) firmware, specifically the SEV-ES (Encrypted State) and SEV-SNP (Secure Nested Paging) features. The issue stems from insufficient granularity in access control mechanisms within the SEV firmware, categorized under CWE-1220. This weakness allows an attacker with privileged access on the host system to instantiate a SEV-ES guest virtual machine that can then attack an SNP guest VM. Since SEV-SNP is designed to provide strong isolation and confidentiality guarantees for guest VMs by encrypting memory and protecting against hypervisor attacks, this vulnerability undermines those protections. The attack vector requires local access with high privileges, no user interaction, and does not affect integrity or availability but compromises confidentiality. The CVSS 4.0 score reflects the limited attack vector (local) and the requirement for privileges but acknowledges the high scope of confidentiality impact. No public exploits have been reported yet, and no patches are currently linked, indicating that this is a recently disclosed vulnerability. The vulnerability is significant in cloud and multi-tenant environments where AMD EPYC 9004 processors are deployed to provide hardware-based VM isolation and encryption. An attacker exploiting this flaw could potentially extract sensitive data from protected guest VMs, violating confidentiality guarantees critical in regulated industries and sensitive workloads.
Potential Impact
For European organizations, especially those operating cloud services, data centers, or virtualized environments using AMD EPYC 9004 processors, this vulnerability poses a risk to the confidentiality of sensitive data. The ability for a privileged attacker to breach SEV-SNP protections could lead to unauthorized data disclosure across virtual machines, undermining trust in hardware-based security features. This is particularly impactful for sectors handling personal data under GDPR, financial institutions, and government entities requiring strong isolation. The vulnerability could also affect cloud service providers offering confidential computing services, potentially leading to reputational damage and regulatory consequences if exploited. However, the requirement for local privileged access limits the attack surface primarily to insiders or attackers who have already compromised host systems. The lack of known exploits reduces immediate risk but does not eliminate the threat, especially as attackers may develop exploits post-disclosure. Organizations relying on AMD SEV-SNP for secure virtualization should consider this vulnerability a significant confidentiality risk that requires prompt attention.
Mitigation Recommendations
1. Apply firmware and microcode updates from AMD as soon as they become available to address this vulnerability. 2. Enforce strict access controls and privilege separation on host systems to prevent unauthorized users from gaining the high-level privileges required to exploit this flaw. 3. Limit the creation and management of SEV-ES guests to trusted administrators and monitor for anomalous VM creation activities. 4. Employ runtime monitoring and integrity verification tools to detect suspicious behavior indicative of attempts to exploit SEV firmware vulnerabilities. 5. Isolate sensitive workloads on hardware or environments not affected by this vulnerability until patches are applied. 6. Engage with cloud service providers to understand their mitigation strategies if using third-party infrastructure. 7. Conduct regular security audits and penetration testing focusing on virtualization security to identify potential privilege escalations. 8. Maintain up-to-date incident response plans that include scenarios involving hardware-based virtualization attacks.
Affected Countries
Germany, France, Netherlands, United Kingdom, Italy, Spain
CVE-2025-48514: CWE-1220 Insufficient Granularity of Access Control in AMD AMD EPYC™ 9004 Series Processors
Description
Insufficient Granularity of Access Control in SEV firmware can allow a privileged attacker to create a SEV-ES Guest to attack SNP guest, potentially resulting in a loss of confidentiality.
AI-Powered Analysis
Technical Analysis
CVE-2025-48514 identifies a vulnerability in the AMD EPYC™ 9004 Series processors related to the Secure Encrypted Virtualization (SEV) firmware, specifically the SEV-ES (Encrypted State) and SEV-SNP (Secure Nested Paging) features. The issue stems from insufficient granularity in access control mechanisms within the SEV firmware, categorized under CWE-1220. This weakness allows an attacker with privileged access on the host system to instantiate a SEV-ES guest virtual machine that can then attack an SNP guest VM. Since SEV-SNP is designed to provide strong isolation and confidentiality guarantees for guest VMs by encrypting memory and protecting against hypervisor attacks, this vulnerability undermines those protections. The attack vector requires local access with high privileges, no user interaction, and does not affect integrity or availability but compromises confidentiality. The CVSS 4.0 score reflects the limited attack vector (local) and the requirement for privileges but acknowledges the high scope of confidentiality impact. No public exploits have been reported yet, and no patches are currently linked, indicating that this is a recently disclosed vulnerability. The vulnerability is significant in cloud and multi-tenant environments where AMD EPYC 9004 processors are deployed to provide hardware-based VM isolation and encryption. An attacker exploiting this flaw could potentially extract sensitive data from protected guest VMs, violating confidentiality guarantees critical in regulated industries and sensitive workloads.
Potential Impact
For European organizations, especially those operating cloud services, data centers, or virtualized environments using AMD EPYC 9004 processors, this vulnerability poses a risk to the confidentiality of sensitive data. The ability for a privileged attacker to breach SEV-SNP protections could lead to unauthorized data disclosure across virtual machines, undermining trust in hardware-based security features. This is particularly impactful for sectors handling personal data under GDPR, financial institutions, and government entities requiring strong isolation. The vulnerability could also affect cloud service providers offering confidential computing services, potentially leading to reputational damage and regulatory consequences if exploited. However, the requirement for local privileged access limits the attack surface primarily to insiders or attackers who have already compromised host systems. The lack of known exploits reduces immediate risk but does not eliminate the threat, especially as attackers may develop exploits post-disclosure. Organizations relying on AMD SEV-SNP for secure virtualization should consider this vulnerability a significant confidentiality risk that requires prompt attention.
Mitigation Recommendations
1. Apply firmware and microcode updates from AMD as soon as they become available to address this vulnerability. 2. Enforce strict access controls and privilege separation on host systems to prevent unauthorized users from gaining the high-level privileges required to exploit this flaw. 3. Limit the creation and management of SEV-ES guests to trusted administrators and monitor for anomalous VM creation activities. 4. Employ runtime monitoring and integrity verification tools to detect suspicious behavior indicative of attempts to exploit SEV firmware vulnerabilities. 5. Isolate sensitive workloads on hardware or environments not affected by this vulnerability until patches are applied. 6. Engage with cloud service providers to understand their mitigation strategies if using third-party infrastructure. 7. Conduct regular security audits and penetration testing focusing on virtualization security to identify potential privilege escalations. 8. Maintain up-to-date incident response plans that include scenarios involving hardware-based virtualization attacks.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- AMD
- Date Reserved
- 2025-05-22T16:34:07.747Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 698b8b0c4b57a58fa12667bf
Added to database: 2/10/2026, 7:46:20 PM
Last enriched: 2/18/2026, 10:09:23 AM
Last updated: 2/21/2026, 12:20:16 AM
Views: 20
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-27203: CWE-15: External Control of System or Configuration Setting in YosefHayim ebay-mcp
HighCVE-2026-27168: CWE-122: Heap-based Buffer Overflow in HappySeaFox sail
HighCVE-2026-27134: CWE-287: Improper Authentication in strimzi strimzi-kafka-operator
HighCVE-2026-27190: CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in denoland deno
HighCVE-2026-27026: CWE-770: Allocation of Resources Without Limits or Throttling in py-pdf pypdf
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.