CVE-2025-48517: CWE-1220 Insufficient Granularity of Access Control in AMD AMD EPYC™ 9005 Series Processors
Insufficient Granularity of Access Control in SEV firmware could allow a privileged user with a malicious hypervisor to create a SEV-ES guest with an ASID in the range meant for SEV-SNP guests potentially resulting in a partial loss of confidentiality.
AI Analysis
Technical Summary
CVE-2025-48517 is a vulnerability categorized under CWE-1220, indicating insufficient granularity of access control within the SEV firmware of AMD EPYC™ 9005 Series processors. SEV technology is designed to protect virtual machines by encrypting their memory, with SEV-ES and SEV-SNP providing increasing levels of security guarantees. This vulnerability arises because a privileged user controlling the hypervisor can create a SEV-ES guest with an Address Space Identifier (ASID) that falls within the range reserved for SEV-SNP guests. SEV-SNP guests have stronger protections, including integrity and replay protection, compared to SEV-ES. By misusing ASID assignments, the malicious hypervisor could bypass certain security boundaries, potentially leading to a partial confidentiality breach of guest data. The attack vector requires local privileged access to the hypervisor but does not require user interaction or network access. The vulnerability does not affect the integrity or availability of the system but compromises confidentiality to some extent. No patches or exploits are currently reported, but the flaw highlights the importance of strict access control and firmware validation in secure virtualization environments.
Potential Impact
For European organizations, this vulnerability poses a risk primarily to cloud service providers, data centers, and enterprises using AMD EPYC 9005 processors for confidential computing or virtualized workloads. A malicious hypervisor with privileged access could exploit this flaw to access sensitive data from SEV-SNP guests, undermining trust in hardware-based security guarantees. This could lead to data leakage of intellectual property, personal data protected under GDPR, or other confidential information. The impact is more pronounced in sectors relying heavily on virtualization and confidential computing, such as finance, healthcare, and government. While the vulnerability does not enable remote exploitation, insider threats or compromised hypervisor administrators could leverage it. The partial confidentiality loss could have regulatory and reputational consequences for affected organizations, especially under strict European data protection laws.
Mitigation Recommendations
1. Restrict hypervisor administrative privileges to trusted personnel and enforce strict access controls and auditing to prevent unauthorized hypervisor modifications. 2. Monitor and log hypervisor activities to detect anomalous guest creation or ASID assignments that deviate from expected SEV-SNP ranges. 3. Apply any firmware or microcode updates released by AMD promptly once available to address this vulnerability. 4. Employ hardware attestation and runtime integrity verification tools to ensure hypervisor and firmware integrity. 5. Consider deploying additional layers of encryption and isolation at the software level to mitigate potential confidentiality breaches. 6. Engage with AMD and cloud service providers to understand the timeline for patches and coordinate vulnerability management. 7. For critical workloads, evaluate the risk of continuing to use affected processors until mitigations or patches are in place.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland, Ireland, Italy
CVE-2025-48517: CWE-1220 Insufficient Granularity of Access Control in AMD AMD EPYC™ 9005 Series Processors
Description
Insufficient Granularity of Access Control in SEV firmware could allow a privileged user with a malicious hypervisor to create a SEV-ES guest with an ASID in the range meant for SEV-SNP guests potentially resulting in a partial loss of confidentiality.
AI-Powered Analysis
Technical Analysis
CVE-2025-48517 is a vulnerability categorized under CWE-1220, indicating insufficient granularity of access control within the SEV firmware of AMD EPYC™ 9005 Series processors. SEV technology is designed to protect virtual machines by encrypting their memory, with SEV-ES and SEV-SNP providing increasing levels of security guarantees. This vulnerability arises because a privileged user controlling the hypervisor can create a SEV-ES guest with an Address Space Identifier (ASID) that falls within the range reserved for SEV-SNP guests. SEV-SNP guests have stronger protections, including integrity and replay protection, compared to SEV-ES. By misusing ASID assignments, the malicious hypervisor could bypass certain security boundaries, potentially leading to a partial confidentiality breach of guest data. The attack vector requires local privileged access to the hypervisor but does not require user interaction or network access. The vulnerability does not affect the integrity or availability of the system but compromises confidentiality to some extent. No patches or exploits are currently reported, but the flaw highlights the importance of strict access control and firmware validation in secure virtualization environments.
Potential Impact
For European organizations, this vulnerability poses a risk primarily to cloud service providers, data centers, and enterprises using AMD EPYC 9005 processors for confidential computing or virtualized workloads. A malicious hypervisor with privileged access could exploit this flaw to access sensitive data from SEV-SNP guests, undermining trust in hardware-based security guarantees. This could lead to data leakage of intellectual property, personal data protected under GDPR, or other confidential information. The impact is more pronounced in sectors relying heavily on virtualization and confidential computing, such as finance, healthcare, and government. While the vulnerability does not enable remote exploitation, insider threats or compromised hypervisor administrators could leverage it. The partial confidentiality loss could have regulatory and reputational consequences for affected organizations, especially under strict European data protection laws.
Mitigation Recommendations
1. Restrict hypervisor administrative privileges to trusted personnel and enforce strict access controls and auditing to prevent unauthorized hypervisor modifications. 2. Monitor and log hypervisor activities to detect anomalous guest creation or ASID assignments that deviate from expected SEV-SNP ranges. 3. Apply any firmware or microcode updates released by AMD promptly once available to address this vulnerability. 4. Employ hardware attestation and runtime integrity verification tools to ensure hypervisor and firmware integrity. 5. Consider deploying additional layers of encryption and isolation at the software level to mitigate potential confidentiality breaches. 6. Engage with AMD and cloud service providers to understand the timeline for patches and coordinate vulnerability management. 7. For critical workloads, evaluate the risk of continuing to use affected processors until mitigations or patches are in place.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- AMD
- Date Reserved
- 2025-05-22T16:34:07.748Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 698b8b0c4b57a58fa12667c2
Added to database: 2/10/2026, 7:46:20 PM
Last enriched: 2/10/2026, 8:04:00 PM
Last updated: 2/21/2026, 12:19:00 AM
Views: 11
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-27203: CWE-15: External Control of System or Configuration Setting in YosefHayim ebay-mcp
HighCVE-2026-27168: CWE-122: Heap-based Buffer Overflow in HappySeaFox sail
HighCVE-2026-27134: CWE-287: Improper Authentication in strimzi strimzi-kafka-operator
HighCVE-2026-27190: CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in denoland deno
HighCVE-2026-27026: CWE-770: Allocation of Resources Without Limits or Throttling in py-pdf pypdf
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.