Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
RMPocalypse: New Attack Breaks AMD Confidential Computing

RMPocalypse: New Attack Breaks AMD Confidential Computing

Posted on October 14, 2025October 14, 2025 By CWS

Tutorial researchers from ETH Zurich have found a vulnerability within the reminiscence administration of AMD processors that allowed them to interrupt confidential computing integrity ensures.

Tracked as CVE-2025-0033 (CVSS rating of 6.0), the problem is described as a race situation that happens when AMD Safe Processor (ASP) initializes the Reverse Map Desk (RMP).

In AMD processors that use Safe Encrypted Virtualization – Safe Nested Paging (SEV-SNP), RMP prevents the hypervisor from tampering with visitor web page mappings.

Nevertheless, as a result of RMP entries are used to guard the remainder of the RMP, a Catch-22 happens throughout setup, and the ASP is used to carry out RMP initialization. Solely ASP can modify RMP reminiscence.

The safety defect, named RMPocalypse (PDF), permits a malicious hypervisor to deprave the RMP throughout initialization and manipulate its content material, thus affecting the visitor reminiscence integrity.

RMP, the researchers notice, was added to SEV-SNP to forestall integrity assaults, and its right initialization permits hypervisors to launch confidential VMs by assigning bodily reminiscence to them. RMP retains monitor of web page mappings and of the possession of every bodily web page.

As a result of fashionable servers have massive DRAM capacities, the RMP can also be sizable (16 gigabytes), and is saved on the DRAM, the place it protects itself, with the SEV-SNP stopping the hypervisor from mapping RMP-owned bodily pages.

AMD processors with SEV-SNP have a number of x86 cores for workload computations and a safe co-processor (ASP) for implementing safety on the x86 cores and the reminiscence subsystem. It additionally checks hypervisor-provisioned configuration when RMP initialization is requested.Commercial. Scroll to proceed studying.

The lecturers found that ASP doesn’t correctly shield the reminiscence containing RMP throughout initialization, which permits the hypervisor to write down to the RMP reminiscence and corrupt the entry, resulting in SEV-SNP assure compromise.

The researchers examined the RMPocalypse assault on Zen 3, Zen 4, and newest Zen 5 processors, demonstrating how it may be used to overwrite varied pages.

“To indicate the affect of our discovering, we exploit this hole to interrupt confidentiality and integrity ensures of SEV-SNP. We show RMPocalypse by enabling debug on production-mode CVMs, faking attestation, VMSA state replay, and code injection,” the teachers notice of their analysis paper.

On Monday, AMD introduced that its EPYC and EPYC Embedded collection processors are affected and that patches have been despatched to OEMs, which ought to roll out BIOS updates to handle them.

Microsoft on Monday mentioned it has been engaged on updates to handle the safety defect in Azure Confidential Computing’s (ACC) AMD-based clusters. As soon as the fixes shall be deployed, clients shall be notified if ACC useful resource reboots are required.

The corporate additionally famous that the problem is much less prone to be exploited within the wild, attributable to protections that cut back the chance of reminiscence manipulation or host compromise.

“Throughout Azure Confidential Computing merchandise, a number of safety guardrails are in place to forestall host compromise, combining isolation, integrity verification, and steady monitoring. All host operations comply with audited and authorised administration pathways, with administrative entry strictly managed, restricted, and logged,” Microsoft says.

Associated: The Y2K38 Bug Is a Vulnerability, Not Only a Date Drawback, Researchers Warn

Associated: The Significance of Allyship for Girls in Cyber

Associated: Google Provides As much as $20,000 in New AI Bug Bounty Program

Associated: When Distributors Overstep – Figuring out the AI You Don’t Want

Security Week News Tags:AMD, Attack, Breaks, Computing, Confidential, RMPocalypse

Post navigation

Previous Post: SimonMed Data Breach Exposes 1.2 Million Patients Sensitive Information
Next Post: CISO Conversations: Are Microsoft’s Deputy CISOs a Signpost to the Future?

Related Posts

Choosing a Clear Direction in the Face of Growing Cybersecurity Demands Choosing a Clear Direction in the Face of Growing Cybersecurity Demands Security Week News
Pharmaceutical Company Inotiv Confirms Ransomware Attack Pharmaceutical Company Inotiv Confirms Ransomware Attack Security Week News
Synnovis Confirms Patient Information Stolen in Disruptive Ransomware Attack Synnovis Confirms Patient Information Stolen in Disruptive Ransomware Attack Security Week News
Tight Cybersecurity Budgets Accelerate the Shift to AI-Driven Defense Tight Cybersecurity Budgets Accelerate the Shift to AI-Driven Defense Security Week News
High-Value NPM Developers Compromised in New Phishing Campaign High-Value NPM Developers Compromised in New Phishing Campaign Security Week News
Crunchbase Confirms Data Breach After Hacking Claims Crunchbase Confirms Data Breach After Hacking Claims Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Muddled Libra Exploits VMware vSphere in Cyber Attack
  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Muddled Libra Exploits VMware vSphere in Cyber Attack
  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News