Home

Description

Write what were condition within AMD CPUs may allow an admin-privileged attacker to modify the configuration of the CPU pipeline potentially resulting in the corruption of the stack pointer inside an SEV-SNP guest.

PUBLISHED Reserved 2025-03-12 | Published 2026-01-16 | Updated 2026-01-16 | Assigner AMD




MEDIUM: 4.6CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:N/SC:N/SI:L/SA:N

Problem types

CWE-123 Write-what-where Condition

Product status

Default status
affected

Genoa++_1.0.0.H
unaffected

Default status
affected

TurinPI_1.0.0.6
unaffected

Default status
affected

Genoa++_1.0.0.H
unaffected

Default status
affected

EmbMilanPI-SP3 v9 1.0.0.C
unaffected

Default status
affected

EmbTurinPI-SP5_1.0.0.1
unaffected

References

www.amd.com/...es/product-security/bulletin/AMD-SB-3027.html

cve.org (CVE-2025-29943)

nvd.nist.gov (CVE-2025-29943)

Download JSON