Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-48517: CWE-1220 Insufficient Granularity of Access Control in AMD AMD EPYC™ 9005 Series Processors

0
Medium
VulnerabilityCVE-2025-48517cvecve-2025-48517cwe-1220
Published: Tue Feb 10 2026 (02/10/2026, 19:08:21 UTC)
Source: CVE Database V5
Vendor/Project: AMD
Product: AMD EPYC™ 9005 Series Processors

Description

Insufficient Granularity of Access Control in SEV firmware could allow a privileged user with a malicious hypervisor to create a SEV-ES guest with an ASID in the range meant for SEV-SNP guests potentially resulting in a partial loss of confidentiality.

AI-Powered Analysis

AILast updated: 02/10/2026, 20:04:00 UTC

Technical Analysis

CVE-2025-48517 is a vulnerability categorized under CWE-1220, indicating insufficient granularity of access control within the SEV firmware of AMD EPYC™ 9005 Series processors. SEV technology is designed to protect virtual machines by encrypting their memory, with SEV-ES and SEV-SNP providing increasing levels of security guarantees. This vulnerability arises because a privileged user controlling the hypervisor can create a SEV-ES guest with an Address Space Identifier (ASID) that falls within the range reserved for SEV-SNP guests. SEV-SNP guests have stronger protections, including integrity and replay protection, compared to SEV-ES. By misusing ASID assignments, the malicious hypervisor could bypass certain security boundaries, potentially leading to a partial confidentiality breach of guest data. The attack vector requires local privileged access to the hypervisor but does not require user interaction or network access. The vulnerability does not affect the integrity or availability of the system but compromises confidentiality to some extent. No patches or exploits are currently reported, but the flaw highlights the importance of strict access control and firmware validation in secure virtualization environments.

Potential Impact

For European organizations, this vulnerability poses a risk primarily to cloud service providers, data centers, and enterprises using AMD EPYC 9005 processors for confidential computing or virtualized workloads. A malicious hypervisor with privileged access could exploit this flaw to access sensitive data from SEV-SNP guests, undermining trust in hardware-based security guarantees. This could lead to data leakage of intellectual property, personal data protected under GDPR, or other confidential information. The impact is more pronounced in sectors relying heavily on virtualization and confidential computing, such as finance, healthcare, and government. While the vulnerability does not enable remote exploitation, insider threats or compromised hypervisor administrators could leverage it. The partial confidentiality loss could have regulatory and reputational consequences for affected organizations, especially under strict European data protection laws.

Mitigation Recommendations

1. Restrict hypervisor administrative privileges to trusted personnel and enforce strict access controls and auditing to prevent unauthorized hypervisor modifications. 2. Monitor and log hypervisor activities to detect anomalous guest creation or ASID assignments that deviate from expected SEV-SNP ranges. 3. Apply any firmware or microcode updates released by AMD promptly once available to address this vulnerability. 4. Employ hardware attestation and runtime integrity verification tools to ensure hypervisor and firmware integrity. 5. Consider deploying additional layers of encryption and isolation at the software level to mitigate potential confidentiality breaches. 6. Engage with AMD and cloud service providers to understand the timeline for patches and coordinate vulnerability management. 7. For critical workloads, evaluate the risk of continuing to use affected processors until mitigations or patches are in place.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
AMD
Date Reserved
2025-05-22T16:34:07.748Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 698b8b0c4b57a58fa12667c2

Added to database: 2/10/2026, 7:46:20 PM

Last enriched: 2/10/2026, 8:04:00 PM

Last updated: 2/21/2026, 12:19:00 AM

Views: 11

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats