Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

RMPocalypse: New Attack Breaks AMD Confidential Computing

Posted on October 14, 2025October 14, 2025 By CWS

Tutorial researchers from ETH Zurich have found a vulnerability within the reminiscence administration of AMD processors that allowed them to interrupt confidential computing integrity ensures.

Tracked as CVE-2025-0033 (CVSS rating of 6.0), the problem is described as a race situation that happens when AMD Safe Processor (ASP) initializes the Reverse Map Desk (RMP).

In AMD processors that use Safe Encrypted Virtualization – Safe Nested Paging (SEV-SNP), RMP prevents the hypervisor from tampering with visitor web page mappings.

Nevertheless, as a result of RMP entries are used to guard the remainder of the RMP, a Catch-22 happens throughout setup, and the ASP is used to carry out RMP initialization. Solely ASP can modify RMP reminiscence.

The safety defect, named RMPocalypse (PDF), permits a malicious hypervisor to deprave the RMP throughout initialization and manipulate its content material, thus affecting the visitor reminiscence integrity.

RMP, the researchers notice, was added to SEV-SNP to forestall integrity assaults, and its right initialization permits hypervisors to launch confidential VMs by assigning bodily reminiscence to them. RMP retains monitor of web page mappings and of the possession of every bodily web page.

As a result of fashionable servers have massive DRAM capacities, the RMP can also be sizable (16 gigabytes), and is saved on the DRAM, the place it protects itself, with the SEV-SNP stopping the hypervisor from mapping RMP-owned bodily pages.

AMD processors with SEV-SNP have a number of x86 cores for workload computations and a safe co-processor (ASP) for implementing safety on the x86 cores and the reminiscence subsystem. It additionally checks hypervisor-provisioned configuration when RMP initialization is requested.Commercial. Scroll to proceed studying.

The lecturers found that ASP doesn’t correctly shield the reminiscence containing RMP throughout initialization, which permits the hypervisor to write down to the RMP reminiscence and corrupt the entry, resulting in SEV-SNP assure compromise.

The researchers examined the RMPocalypse assault on Zen 3, Zen 4, and newest Zen 5 processors, demonstrating how it may be used to overwrite varied pages.

“To indicate the affect of our discovering, we exploit this hole to interrupt confidentiality and integrity ensures of SEV-SNP. We show RMPocalypse by enabling debug on production-mode CVMs, faking attestation, VMSA state replay, and code injection,” the teachers notice of their analysis paper.

On Monday, AMD introduced that its EPYC and EPYC Embedded collection processors are affected and that patches have been despatched to OEMs, which ought to roll out BIOS updates to handle them.

Microsoft on Monday mentioned it has been engaged on updates to handle the safety defect in Azure Confidential Computing’s (ACC) AMD-based clusters. As soon as the fixes shall be deployed, clients shall be notified if ACC useful resource reboots are required.

The corporate additionally famous that the problem is much less prone to be exploited within the wild, attributable to protections that cut back the chance of reminiscence manipulation or host compromise.

“Throughout Azure Confidential Computing merchandise, a number of safety guardrails are in place to forestall host compromise, combining isolation, integrity verification, and steady monitoring. All host operations comply with audited and authorised administration pathways, with administrative entry strictly managed, restricted, and logged,” Microsoft says.

Associated: The Y2K38 Bug Is a Vulnerability, Not Only a Date Drawback, Researchers Warn

Associated: The Significance of Allyship for Girls in Cyber

Associated: Google Provides As much as $20,000 in New AI Bug Bounty Program

Associated: When Distributors Overstep – Figuring out the AI You Don’t Want

Security Week News Tags:AMD, Attack, Breaks, Computing, Confidential, RMPocalypse

Post navigation

Previous Post: SimonMed Data Breach Exposes 1.2 Million Patients Sensitive Information
Next Post: CISO Conversations: Are Microsoft’s Deputy CISOs a Signpost to the Future?

Related Posts

Thirteen Romanians Arrested for Phishing the UK’s Tax Service Security Week News
FBI Warns of Spoofed IC3 Website Security Week News
Managing the Trust-Risk Equation in AI: Predicting Hallucinations Before They Strike Security Week News
Researchers Earn $150,000 for L1TF Exploit Leaking Data From Public Cloud Security Week News
US Cybersecurity Agency Flags Wi-Fi Range Extender Vulnerability Under Active Attack Security Week News
CloudSEK Raises $19 Million for Threat Intelligence Platform Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • New SAP NetWeaver Bug Lets Attackers Take Over Servers Without Login
  • Adobe Patches Critical Vulnerability in Connect Collaboration Suite
  • Microsoft Patches 173 Vulnerabilities, Including Exploited Windows Flaws
  • Windows Remote Access Connection Manager 0-Day Vulnerability Exploited in Attacks
  • PolarEdge With Custom TLS Server Uses Custom Binary Protocol for C2 Communication

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • New SAP NetWeaver Bug Lets Attackers Take Over Servers Without Login
  • Adobe Patches Critical Vulnerability in Connect Collaboration Suite
  • Microsoft Patches 173 Vulnerabilities, Including Exploited Windows Flaws
  • Windows Remote Access Connection Manager 0-Day Vulnerability Exploited in Attacks
  • PolarEdge With Custom TLS Server Uses Custom Binary Protocol for C2 Communication

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News