The SentinelOne Annual Threat Report - A Defenders Guide from the FrontlinesThe SentinelOne Annual Threat ReportGet the Report
Experiencing a Breach?Blog
Get StartedContact Us
SentinelOne
  • Platform
    Platform Overview
    • Singularity Platform
      Welcome to Integrated Enterprise Security
    • AI for Security
      Leading the Way in AI-Powered Security Solutions
    • Securing AI
      Accelerate AI Adoption with Secure AI Tools, Apps, and Agents.
    • How It Works
      The Singularity XDR Difference
    • Singularity Marketplace
      One-Click Integrations to Unlock the Power of XDR
    • Pricing & Packaging
      Comparisons and Guidance at a Glance
    Data & AI
    • Purple AI
      Accelerate SecOps with Generative AI
    • Singularity Hyperautomation
      Easily Automate Security Processes
    • AI-SIEM
      The AI SIEM for the Autonomous SOC
    • AI Data Pipelines
      Security Data Pipeline for AI SIEM and Data Optimization
    • Singularity Data Lake
      AI-Powered, Unified Data Lake
    • Singularity Data Lake for Log Analytics
      Seamlessly Ingest Data from On-Prem, Cloud or Hybrid Environments
    Endpoint Security
    • Singularity Endpoint
      Autonomous Prevention, Detection, and Response
    • Singularity XDR
      Native & Open Protection, Detection, and Response
    • Singularity RemoteOps Forensics
      Orchestrate Forensics at Scale
    • Singularity Threat Intelligence
      Comprehensive Adversary Intelligence
    • Singularity Vulnerability Management
      Application & OS Vulnerability Management
    • Singularity Identity
      Identity Threat Detection and Response
    Cloud Security
    • Singularity Cloud Security
      Block Attacks with an AI-Powered CNAPP
    • Singularity Cloud Native Security
      Secure Cloud and Development Resources
    • Singularity Cloud Workload Security
      Real-Time Cloud Workload Protection Platform
    • Singularity Cloud Data Security
      AI-Powered Threat Detection for Cloud Storage
    • Singularity Cloud Security Posture Management
      Detect and Remediate Cloud Misconfigurations
    Securing AI
    • Prompt Security
      Secure AI Tools Across Your Enterprise
  • Why SentinelOne?
    Why SentinelOne?
    • Why SentinelOne?
      Cybersecurity Built for What’s Next
    • Our Customers
      Trusted by the World’s Leading Enterprises
    • Industry Recognition
      Tested and Proven by the Experts
    • About Us
      The Industry Leader in Autonomous Cybersecurity
    Compare SentinelOne
    • Arctic Wolf
    • Broadcom
    • CrowdStrike
    • Cybereason
    • Microsoft
    • Palo Alto Networks
    • Sophos
    • Splunk
    • Trellix
    • Trend Micro
    • Wiz
    Verticals
    • Energy
    • Federal Government
    • Finance
    • Healthcare
    • Higher Education
    • K-12 Education
    • Manufacturing
    • Retail
    • State and Local Government
  • Services
    Managed Services
    • Managed Services Overview
      Wayfinder Threat Detection & Response
    • Threat Hunting
      World-Class Expertise and Threat Intelligence
    • Managed Detection & Response
      24/7/365 Expert MDR Across Your Entire Environment
    • Incident Readiness & Response
      DFIR, Breach Readiness, & Compromise Assessments
    Support, Deployment, & Health
    • Technical Account Management
      Customer Success with Personalized Service
    • SentinelOne GO
      Guided Onboarding & Deployment Advisory
    • SentinelOne University
      Live and On-Demand Training
    • Services Overview
      Comprehensive Solutions for Seamless Security Operations
    • SentinelOne Community
      Community Login
  • Partners
    Our Network
    • MSSP Partners
      Succeed Faster with SentinelOne
    • Singularity Marketplace
      Extend the Power of S1 Technology
    • Cyber Risk Partners
      Enlist Pro Response and Advisory Teams
    • Technology Alliances
      Integrated, Enterprise-Scale Solutions
    • SentinelOne for AWS
      Hosted in AWS Regions Around the World
    • Channel Partners
      Deliver the Right Solutions, Together
    • SentinelOne for Google Cloud
      Unified, Autonomous Security Giving Defenders the Advantage at Global Scale
    • Partner Locator
      Your Go-to Source for Our Top Partners in Your Region
    Partner Portal→
  • Resources
    Resource Center
    • Case Studies
    • Data Sheets
    • eBooks
    • Reports
    • Videos
    • Webinars
    • Whitepapers
    • Events
    View All Resources→
    Blog
    • Feature Spotlight
    • For CISO/CIO
    • From the Front Lines
    • Identity
    • Cloud
    • macOS
    • SentinelOne Blog
    Blog→
    Tech Resources
    • SentinelLABS
    • Ransomware Anthology
    • Cybersecurity 101
  • About
    About SentinelOne
    • About SentinelOne
      The Industry Leader in Cybersecurity
    • Investor Relations
      Financial Information & Events
    • SentinelLABS
      Threat Research for the Modern Threat Hunter
    • Careers
      The Latest Job Opportunities
    • Press & News
      Company Announcements
    • Cybersecurity Blog
      The Latest Cybersecurity Threats, News, & More
    • FAQ
      Get Answers to Our Most Frequently Asked Questions
    • DataSet
      The Live Data Platform
    • S Foundation
      Securing a Safer Future for All
    • S Ventures
      Investing in the Next Generation of Security, Data and AI
  • Pricing
Get StartedContact Us
CVE Vulnerability Database
Vulnerability Database/CVE-2025-29948

CVE-2025-29948: AMD SEV Privilege Escalation Vulnerability

CVE-2025-29948 is a privilege escalation vulnerability in AMD Secure Encrypted Virtualization (SEV) firmware allowing malicious hypervisors to bypass RMP protections and compromise guest memory integrity.

Published: February 13, 2026

CVE-2025-29948 Overview

CVE-2025-29948 is an improper access control vulnerability in AMD Secure Encrypted Virtualization (SEV) firmware that could allow a malicious hypervisor to bypass Reverse Map Table (RMP) protections. This vulnerability potentially results in a loss of SEV-SNP (Secure Nested Paging) guest memory integrity, undermining the security guarantees that SEV-SNP is designed to provide.

Critical Impact

A malicious hypervisor could bypass RMP protections designed to isolate and protect guest virtual machine memory, potentially compromising the integrity of confidential computing workloads running on affected AMD processors.

Affected Products

  • AMD Secure Encrypted Virtualization (SEV) firmware
  • Systems utilizing AMD SEV-SNP technology
  • AMD processors with SEV-SNP support

Discovery Timeline

  • 2026-02-10 - CVE CVE-2025-29948 published to NVD
  • 2026-02-10 - Last updated in NVD database

Technical Details for CVE-2025-29948

Vulnerability Analysis

This vulnerability affects AMD's Secure Encrypted Virtualization (SEV) technology, specifically the SEV-SNP (Secure Nested Paging) implementation. SEV-SNP is designed to provide strong isolation between virtual machines and the hypervisor by encrypting guest memory and using the Reverse Map Table (RMP) to enforce memory access controls.

The improper access control flaw (CWE-1260: Improper Handling of Overlap Between Protected Memory Ranges) allows a malicious hypervisor to circumvent RMP protections. Under normal circumstances, the RMP prevents the hypervisor from reading or modifying guest memory without proper authorization. This vulnerability breaks that security boundary, potentially allowing an attacker with hypervisor-level access to compromise the integrity of guest VM memory.

Root Cause

The root cause stems from improper handling of overlap between protected memory ranges (CWE-1260) within the SEV firmware. This classification indicates that the firmware fails to properly validate or enforce protections when memory range overlaps occur, creating a window where RMP protections can be bypassed. The vulnerability exists at the firmware level, meaning it affects the foundational security mechanisms of the SEV-SNP architecture.

Attack Vector

The attack requires local access with high privileges (hypervisor-level access). A malicious cloud provider, compromised hypervisor, or attacker who has gained hypervisor control could exploit this vulnerability to bypass the memory isolation guarantees provided by SEV-SNP. The exploitation does not require user interaction and can be performed without complex preconditions once hypervisor access is achieved.

The attack targets the integrity of guest memory rather than confidentiality or availability directly. By bypassing RMP protections, an attacker could potentially modify guest memory contents, inject malicious code, or tamper with data being processed within what the guest believes to be a protected environment.

Detection Methods for CVE-2025-29948

Indicators of Compromise

  • Unexpected modifications to SEV-SNP guest memory that cannot be attributed to legitimate guest operations
  • Anomalous RMP validation failures or inconsistencies in firmware logs
  • Unusual hypervisor behavior patterns when interacting with SEV-SNP protected guests

Detection Strategies

  • Monitor AMD firmware version deployments across infrastructure to identify unpatched systems
  • Implement attestation verification for SEV-SNP guests to detect integrity violations
  • Enable verbose logging on hypervisor platforms to capture potential exploitation attempts
  • Deploy integrity monitoring solutions that can detect unauthorized memory modifications

Monitoring Recommendations

  • Review AMD security bulletins regularly and subscribe to AMD product security notifications
  • Implement continuous firmware version inventory tracking for AMD processors
  • Establish baseline behavior patterns for SEV-SNP workloads to detect anomalies
  • Monitor for unauthorized or unexpected attestation report requests

How to Mitigate CVE-2025-29948

Immediate Actions Required

  • Review AMD Security Bulletin #3023 for specific affected products and firmware versions
  • Inventory all systems utilizing AMD SEV-SNP technology to identify potentially vulnerable deployments
  • Prioritize firmware updates for systems hosting sensitive or confidential computing workloads
  • Assess risk based on threat model and whether hypervisor compromise is a considered threat

Patch Information

AMD has released information regarding this vulnerability in AMD Security Bulletin #3023. Organizations should consult this bulletin for specific firmware update instructions, affected processor models, and detailed remediation guidance. Coordinate with your hardware vendor or cloud service provider to ensure appropriate firmware updates are applied.

Workarounds

  • Implement additional monitoring and access controls around hypervisor management interfaces
  • Restrict hypervisor access to only trusted administrators with strong authentication requirements
  • Consider workload placement policies that isolate highly sensitive workloads from potentially compromised hypervisor environments
  • Evaluate alternative isolation technologies as defense-in-depth measures while awaiting firmware updates
bash
# Verify AMD SEV-SNP status and firmware version (Linux)
# Check if SEV-SNP is enabled
dmesg | grep -i "SEV-SNP"

# Verify AMD microcode version
cat /proc/cpuinfo | grep -i "microcode"

# Check SEV firmware version (requires root)
cat /sys/kernel/debug/ccp/*/psp-firmware-version 2>/dev/null

Disclaimer: This content was generated using AI. While we strive for accuracy, please verify critical information with official sources.

  • Vulnerability Details
  • TypePrivilege Escalation

  • Vendor/TechAmd

  • SeverityMEDIUM

  • CVSS Score5.9

  • EPSS Probability0.01%

  • Known ExploitedNo
  • CVSS Vector
  • CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:N/SC:N/SI:H/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
  • Impact Assessment
  • ConfidentialityLow
  • IntegrityNone
  • AvailabilityNone
  • CWE References
  • CWE-1260
  • Technical References
  • AMD Security Bulletin #3023
  • Related CVEs
  • CVE-2024-36319: AMD VCN Firmware Privilege Escalation Flaw

  • CVE-2024-36320: atihdwt6.sys Integer Overflow Vulnerability

  • CVE-2025-61969: AMD µProf Privilege Escalation Flaw

  • CVE-2025-48503: AMD Software Installer DLL Hijacking Flaw
Default Legacy - Prefooter | Experience the World’s Most Advanced Cybersecurity Platform

Experience the World’s Most Advanced Cybersecurity Platform

See how our intelligent, autonomous cybersecurity platform can protect your organization now and into the future.

Try SentinelOne
  • Get Started
  • Get a Demo
  • Product Tour
  • Why SentinelOne
  • Pricing & Packaging
  • FAQ
  • Contact
  • Contact Us
  • Customer Support
  • SentinelOne Status
  • Language
  • Platform
  • Singularity Platform
  • Singularity Endpoint
  • Singularity Cloud
  • Singularity AI-SIEM
  • Singularity Identity
  • Singularity Marketplace
  • Purple AI
  • Services
  • Wayfinder TDR
  • SentinelOne GO
  • Technical Account Management
  • Support Services
  • Verticals
  • Energy
  • Federal Government
  • Finance
  • Healthcare
  • Higher Education
  • K-12 Education
  • Manufacturing
  • Retail
  • State and Local Government
  • Cybersecurity for SMB
  • Resources
  • Blog
  • Labs
  • Case Studies
  • Videos
  • Product Tours
  • Events
  • Cybersecurity 101
  • eBooks
  • Webinars
  • Whitepapers
  • Press
  • News
  • Ransomware Anthology
  • Company
  • About Us
  • Our Customers
  • Careers
  • Partners
  • Legal & Compliance
  • Security & Compliance
  • Investor Relations
  • S Foundation
  • S Ventures

©2026 SentinelOne, All Rights Reserved.

Privacy Notice Terms of Use

English