Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
RMPocalypse: New Attack Breaks AMD Confidential Computing

RMPocalypse: New Attack Breaks AMD Confidential Computing

Posted on October 14, 2025October 14, 2025 By CWS

Tutorial researchers from ETH Zurich have found a vulnerability within the reminiscence administration of AMD processors that allowed them to interrupt confidential computing integrity ensures.

Tracked as CVE-2025-0033 (CVSS rating of 6.0), the problem is described as a race situation that happens when AMD Safe Processor (ASP) initializes the Reverse Map Desk (RMP).

In AMD processors that use Safe Encrypted Virtualization – Safe Nested Paging (SEV-SNP), RMP prevents the hypervisor from tampering with visitor web page mappings.

Nevertheless, as a result of RMP entries are used to guard the remainder of the RMP, a Catch-22 happens throughout setup, and the ASP is used to carry out RMP initialization. Solely ASP can modify RMP reminiscence.

The safety defect, named RMPocalypse (PDF), permits a malicious hypervisor to deprave the RMP throughout initialization and manipulate its content material, thus affecting the visitor reminiscence integrity.

RMP, the researchers notice, was added to SEV-SNP to forestall integrity assaults, and its right initialization permits hypervisors to launch confidential VMs by assigning bodily reminiscence to them. RMP retains monitor of web page mappings and of the possession of every bodily web page.

As a result of fashionable servers have massive DRAM capacities, the RMP can also be sizable (16 gigabytes), and is saved on the DRAM, the place it protects itself, with the SEV-SNP stopping the hypervisor from mapping RMP-owned bodily pages.

AMD processors with SEV-SNP have a number of x86 cores for workload computations and a safe co-processor (ASP) for implementing safety on the x86 cores and the reminiscence subsystem. It additionally checks hypervisor-provisioned configuration when RMP initialization is requested.Commercial. Scroll to proceed studying.

The lecturers found that ASP doesn’t correctly shield the reminiscence containing RMP throughout initialization, which permits the hypervisor to write down to the RMP reminiscence and corrupt the entry, resulting in SEV-SNP assure compromise.

The researchers examined the RMPocalypse assault on Zen 3, Zen 4, and newest Zen 5 processors, demonstrating how it may be used to overwrite varied pages.

“To indicate the affect of our discovering, we exploit this hole to interrupt confidentiality and integrity ensures of SEV-SNP. We show RMPocalypse by enabling debug on production-mode CVMs, faking attestation, VMSA state replay, and code injection,” the teachers notice of their analysis paper.

On Monday, AMD introduced that its EPYC and EPYC Embedded collection processors are affected and that patches have been despatched to OEMs, which ought to roll out BIOS updates to handle them.

Microsoft on Monday mentioned it has been engaged on updates to handle the safety defect in Azure Confidential Computing’s (ACC) AMD-based clusters. As soon as the fixes shall be deployed, clients shall be notified if ACC useful resource reboots are required.

The corporate additionally famous that the problem is much less prone to be exploited within the wild, attributable to protections that cut back the chance of reminiscence manipulation or host compromise.

“Throughout Azure Confidential Computing merchandise, a number of safety guardrails are in place to forestall host compromise, combining isolation, integrity verification, and steady monitoring. All host operations comply with audited and authorised administration pathways, with administrative entry strictly managed, restricted, and logged,” Microsoft says.

Associated: The Y2K38 Bug Is a Vulnerability, Not Only a Date Drawback, Researchers Warn

Associated: The Significance of Allyship for Girls in Cyber

Associated: Google Provides As much as $20,000 in New AI Bug Bounty Program

Associated: When Distributors Overstep – Figuring out the AI You Don’t Want

Security Week News Tags:AMD, Attack, Breaks, Computing, Confidential, RMPocalypse

Post navigation

Previous Post: SimonMed Data Breach Exposes 1.2 Million Patients Sensitive Information
Next Post: CISO Conversations: Are Microsoft’s Deputy CISOs a Signpost to the Future?

Related Posts

In Other News: Iranian Ships Hacked, Verified Android Developers, AI Used in Attacks In Other News: Iranian Ships Hacked, Verified Android Developers, AI Used in Attacks Security Week News
Google Offers Up to ,000 in New AI Bug Bounty Program Google Offers Up to $20,000 in New AI Bug Bounty Program Security Week News
Ivanti Releases Crucial Patches for Endpoint Manager Ivanti Releases Crucial Patches for Endpoint Manager Security Week News
Going Into the Deep End: Social Engineering and the AI Flood Going Into the Deep End: Social Engineering and the AI Flood Security Week News
Ransomware Attack Targets Advantest’s Network Ransomware Attack Targets Advantest’s Network Security Week News
263,000 Impacted by Esse Health Data Breach 263,000 Impacted by Esse Health Data Breach Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • VMware Fusion Vulnerability Receives Critical Update
  • Critical Vulnerability in MongoDB Risks Data Exposure
  • Windows Zero-Day Exploits: YellowKey and GreenPlasma Revealed
  • Fragnesia Linux Kernel Vulnerability Allows Root Access
  • NGINX Vulnerability Allows Remote Code Execution

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • May 2026
  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • VMware Fusion Vulnerability Receives Critical Update
  • Critical Vulnerability in MongoDB Risks Data Exposure
  • Windows Zero-Day Exploits: YellowKey and GreenPlasma Revealed
  • Fragnesia Linux Kernel Vulnerability Allows Root Access
  • NGINX Vulnerability Allows Remote Code Execution

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark