Home

Description

Insufficient Granularity of Access Control in SEV firmware can allow a privileged attacker to create a SEV-ES Guest to attack SNP guest, potentially resulting in a loss of confidentiality.

PUBLISHED Reserved 2025-05-22 | Published 2026-02-10 | Updated 2026-02-11 | Assigner AMD




MEDIUM: 4.0CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:N/SC:H/SI:N/SA:N

Problem types

CWE-1220 Insufficient Granularity of Access Control

Product status

Default status
affected

Genoa++_1.0.0.H
unaffected

Default status
affected

MilanPI 1.0.0.H
unaffected

Default status
affected

TurinPI 1.0.0.6
unaffected

Default status
affected

Genoa++_1.0.0.H
unaffected

Default status
affected

EmbMilanPI-SP3 v9 1.0.0.C
unaffected

Default status
affected

EmbGenoaPI-SP5 1.0.0.C
unaffected

Default status
affected

EmbTurinPI-SP5_1.0.0.1
unaffected

Default status
affected

EmbGenoaPI-SP5 1.0.0.C
unaffected

Default status
affected

EmbGenoaPI-SP5 1.0.0.C
unaffected

References

www.amd.com/...es/product-security/bulletin/AMD-SB-3023.html

cve.org (CVE-2025-48514)

nvd.nist.gov (CVE-2025-48514)

Download JSON