Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

RMPocalypse: New Attack Breaks AMD Confidential Computing

Posted on October 14, 2025October 14, 2025 By CWS

Tutorial researchers from ETH Zurich have found a vulnerability within the reminiscence administration of AMD processors that allowed them to interrupt confidential computing integrity ensures.

Tracked as CVE-2025-0033 (CVSS rating of 6.0), the problem is described as a race situation that happens when AMD Safe Processor (ASP) initializes the Reverse Map Desk (RMP).

In AMD processors that use Safe Encrypted Virtualization – Safe Nested Paging (SEV-SNP), RMP prevents the hypervisor from tampering with visitor web page mappings.

Nevertheless, as a result of RMP entries are used to guard the remainder of the RMP, a Catch-22 happens throughout setup, and the ASP is used to carry out RMP initialization. Solely ASP can modify RMP reminiscence.

The safety defect, named RMPocalypse (PDF), permits a malicious hypervisor to deprave the RMP throughout initialization and manipulate its content material, thus affecting the visitor reminiscence integrity.

RMP, the researchers notice, was added to SEV-SNP to forestall integrity assaults, and its right initialization permits hypervisors to launch confidential VMs by assigning bodily reminiscence to them. RMP retains monitor of web page mappings and of the possession of every bodily web page.

As a result of fashionable servers have massive DRAM capacities, the RMP can also be sizable (16 gigabytes), and is saved on the DRAM, the place it protects itself, with the SEV-SNP stopping the hypervisor from mapping RMP-owned bodily pages.

AMD processors with SEV-SNP have a number of x86 cores for workload computations and a safe co-processor (ASP) for implementing safety on the x86 cores and the reminiscence subsystem. It additionally checks hypervisor-provisioned configuration when RMP initialization is requested.Commercial. Scroll to proceed studying.

The lecturers found that ASP doesn’t correctly shield the reminiscence containing RMP throughout initialization, which permits the hypervisor to write down to the RMP reminiscence and corrupt the entry, resulting in SEV-SNP assure compromise.

The researchers examined the RMPocalypse assault on Zen 3, Zen 4, and newest Zen 5 processors, demonstrating how it may be used to overwrite varied pages.

“To indicate the affect of our discovering, we exploit this hole to interrupt confidentiality and integrity ensures of SEV-SNP. We show RMPocalypse by enabling debug on production-mode CVMs, faking attestation, VMSA state replay, and code injection,” the teachers notice of their analysis paper.

On Monday, AMD introduced that its EPYC and EPYC Embedded collection processors are affected and that patches have been despatched to OEMs, which ought to roll out BIOS updates to handle them.

Microsoft on Monday mentioned it has been engaged on updates to handle the safety defect in Azure Confidential Computing’s (ACC) AMD-based clusters. As soon as the fixes shall be deployed, clients shall be notified if ACC useful resource reboots are required.

The corporate additionally famous that the problem is much less prone to be exploited within the wild, attributable to protections that cut back the chance of reminiscence manipulation or host compromise.

“Throughout Azure Confidential Computing merchandise, a number of safety guardrails are in place to forestall host compromise, combining isolation, integrity verification, and steady monitoring. All host operations comply with audited and authorised administration pathways, with administrative entry strictly managed, restricted, and logged,” Microsoft says.

Associated: The Y2K38 Bug Is a Vulnerability, Not Only a Date Drawback, Researchers Warn

Associated: The Significance of Allyship for Girls in Cyber

Associated: Google Provides As much as $20,000 in New AI Bug Bounty Program

Associated: When Distributors Overstep – Figuring out the AI You Don’t Want

Security Week News Tags:AMD, Attack, Breaks, Computing, Confidential, RMPocalypse

Post navigation

Previous Post: SimonMed Data Breach Exposes 1.2 Million Patients Sensitive Information
Next Post: CISO Conversations: Are Microsoft’s Deputy CISOs a Signpost to the Future?

Related Posts

Vietnamese Hackers Distribute Malware via Fake AI-Themed Websites Security Week News
Scattered Spider Hacker Sentenced to Prison Security Week News
Backdoored Open Source Malware Repositories Target Novice Cybercriminals Security Week News
Google’s $32 Billion Wiz Deal Draws DOJ Antitrust Scrutiny: Report Security Week News
TrustCloud Raises $15 Million for Security Assurance Platform Security Week News
Honeywell Experion PKS Flaws Allow Manipulation of Industrial Processes Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • PolarEdge With Custom TLS Server Uses Custom Binary Protocol for C2 Communication
  • New Cyberattack Leverages NPM Ecosystem to Infect Developers While Installing Packages
  • Hackers Leverage Judicial Notifications to Deploy Info-Stealer Malware
  • FortiPAM and FortiSwitch Manager Vulnerability Let Attackers Bypass Authentication Process
  • FortiOS CLI Command Bypass Vulnerability Let Attacker Execute System Commands

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • PolarEdge With Custom TLS Server Uses Custom Binary Protocol for C2 Communication
  • New Cyberattack Leverages NPM Ecosystem to Infect Developers While Installing Packages
  • Hackers Leverage Judicial Notifications to Deploy Info-Stealer Malware
  • FortiPAM and FortiSwitch Manager Vulnerability Let Attackers Bypass Authentication Process
  • FortiOS CLI Command Bypass Vulnerability Let Attacker Execute System Commands

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News