CVE-2025-48514 Overview
CVE-2025-48514 is an Insufficient Granularity of Access Control vulnerability in AMD Secure Encrypted Virtualization (SEV) firmware. This flaw allows a privileged attacker to create a SEV-ES (Encrypted State) Guest that can be leveraged to attack SEV-SNP (Secure Nested Paging) guests, potentially resulting in a loss of confidentiality for protected virtual machines.
Critical Impact
A privileged attacker with local access can exploit weaknesses in SEV firmware access controls to compromise the confidentiality of SEV-SNP protected guest environments, undermining hardware-based trusted execution guarantees.
Affected Products
- AMD SEV Firmware (specific versions detailed in AMD Security Bulletin SB-3023)
- Systems utilizing AMD SEV-ES and SEV-SNP technologies
- AMD EPYC processors with SEV capabilities
Discovery Timeline
- 2026-02-10 - CVE-2025-48514 published to NVD
- 2026-02-10 - Last updated in NVD database
Technical Details for CVE-2025-48514
Vulnerability Analysis
This vulnerability stems from insufficient access control granularity within the SEV firmware implementation. AMD's Secure Encrypted Virtualization technology provides memory encryption capabilities to protect virtual machine data from hypervisor-level attacks. SEV-ES extends this by encrypting CPU register state, while SEV-SNP adds integrity protection to prevent memory replay and corruption attacks.
The vulnerability exists because the firmware does not adequately distinguish between different guest types when enforcing access controls. This allows an attacker who has already obtained privileged access to the system to create a malicious SEV-ES guest that can interact with or gain information about SEV-SNP protected guests in unintended ways.
Exploitation requires local access and high privileges, limiting the attack surface significantly. However, in multi-tenant cloud environments where SEV-SNP is deployed specifically to protect sensitive workloads from the infrastructure provider, this vulnerability undermines the security guarantees that customers rely upon.
Root Cause
The root cause is classified as CWE-1220: Insufficient Granularity of Access Control. The SEV firmware fails to enforce sufficiently fine-grained access controls between different guest security levels. Specifically, the isolation boundary between SEV-ES guests and SEV-SNP guests is not properly maintained, allowing a specially crafted SEV-ES guest to potentially access confidential data belonging to SNP-protected guests.
This architectural weakness in the access control model means that even though SEV-SNP provides stronger security guarantees than SEV-ES, those guarantees can be circumvented by an attacker operating through the less restrictive SEV-ES interface.
Attack Vector
The attack requires local access to the target system with high privileges. An attacker must be able to create and configure virtual machines using SEV-ES capabilities. The attack flow involves:
- The attacker gains privileged access to a system running SEV-enabled workloads
- The attacker creates a malicious SEV-ES guest configured to exploit the access control weakness
- Through the SEV-ES guest, the attacker can potentially access confidential information from SEV-SNP protected guests
- The confidentiality of SNP-protected workloads is compromised
The vulnerability specifically targets the confidentiality of SEV-SNP guests while not directly affecting integrity or availability. The attack complexity involves certain preconditions that must be met, limiting opportunistic exploitation.
Detection Methods for CVE-2025-48514
Indicators of Compromise
- Unexpected creation of SEV-ES guests on systems primarily running SEV-SNP workloads
- Anomalous memory access patterns between guest security domains
- Unusual firmware API calls related to guest creation and management
- Signs of privilege escalation attempts targeting hypervisor or firmware interfaces
Detection Strategies
- Monitor hypervisor logs for unusual guest creation events, particularly SEV-ES guests on SNP-focused systems
- Implement firmware integrity monitoring to detect unauthorized modifications
- Deploy hardware security module (HSM) logging to track SEV-related operations
- Audit privileged user activities on systems hosting confidential computing workloads
Monitoring Recommendations
- Enable detailed logging of all SEV guest lifecycle events
- Implement alerting for any SEV-ES guest creation in environments where only SEV-SNP should be used
- Monitor for signs of lateral movement from SEV-ES to SEV-SNP guest boundaries
- Review access control configurations for SEV-enabled systems regularly
How to Mitigate CVE-2025-48514
Immediate Actions Required
- Review AMD Security Bulletin SB-3023 for vendor-specific guidance and patches
- Audit current SEV guest deployments to identify any unauthorized SEV-ES guests
- Restrict privileges for creating and managing SEV guests to only essential personnel
- Consider temporarily disabling SEV-ES guest creation if only SEV-SNP workloads are required
Patch Information
AMD has released security guidance addressing this vulnerability in AMD Security Bulletin SB-3023. Organizations should review this bulletin for specific firmware update instructions and verify that their systems are running the latest SEV firmware versions that address this access control weakness.
Contact your hardware vendor or cloud service provider for information on deploying the updated firmware in your specific environment. Firmware updates may require system downtime and should be scheduled according to change management procedures.
Workarounds
- Implement strict access controls limiting who can create SEV-ES guests on affected systems
- In environments requiring only SEV-SNP, consider disabling SEV-ES capabilities at the firmware level if supported
- Implement network segmentation to isolate systems running confidential computing workloads
- Deploy additional monitoring and auditing for privileged operations on affected systems
# Configuration example
# Verify current SEV firmware version (Linux)
dmesg | grep -i sev
cat /sys/module/ccp/parameters/sev
# Check SEV capabilities and status
cat /sys/kernel/debug/sev/sev_status 2>/dev/null || echo "Debug filesystem mount required"
# Audit SEV guest configurations
virsh list --all | while read line; do
virsh dumpxml "$vm" 2>/dev/null | grep -i "sev\|launch-security"
done
Disclaimer: This content was generated using AI. While we strive for accuracy, please verify critical information with official sources.

