CVE-2025-29952
Improper Initialization in AMD SEV Firmware Risks Memory Integrity
Publication date: 2026-02-10
Last updated on: 2026-02-10
Assigner: Advanced Micro Devices Inc.
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| amd | secure_encrypted_virtualization | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-457 | The code uses a variable that has not been initialized, leading to unpredictable or unintended results. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability involves improper initialization within the AMD Secure Encrypted Virtualization (SEV) firmware. It allows an attacker with administrative privileges to corrupt RMP (Reverse Map Table) covered memory. This corruption can potentially lead to a loss of guest memory integrity.
How can this vulnerability impact me? :
The impact of this vulnerability is that an attacker with admin privileges could corrupt memory that is supposed to be protected by the SEV firmware. This corruption can result in the loss of integrity of the guest memory, potentially leading to unauthorized data modification or system instability.
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:
I don't know
How can this vulnerability be detected on my network or system? Can you suggest some commands?
I don't know
What immediate steps should I take to mitigate this vulnerability?
I don't know