Improper access control within AMD SEV-SNP could allow an admin privileged attacker to write to the RMP during SNP initialization, potentially resulting in a loss of SEV-SNP guest memory integrity.
History

Tue, 14 Oct 2025 19:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Tue, 14 Oct 2025 15:00:00 +0000

Type Values Removed Values Added
Description Improper access control within AMD SEV-SNP could allow an admin privileged attacker to write to the RMP during SNP initialization, potentially resulting in a loss of SEV-SNP guest memory integrity.
Weaknesses CWE-284
References
Metrics cvssV3_1

{'score': 6, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:H/A:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: AMD

Published:

Updated: 2025-10-14T19:10:33.818Z

Reserved: 2024-11-21T16:17:59.196Z

Link: CVE-2025-0033

cve-icon Vulnrichment

Updated: 2025-10-14T19:10:29.185Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2025-10-14T15:16:00.787

Modified: 2025-10-14T19:36:29.240

Link: CVE-2025-0033

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.