CyberHappenings logo

Track cybersecurity events as they unfold. Sourced timelines. Filter, sort, and browse. Fast, privacy‑respecting. No invasive ads, no tracking.

StackWarp Hardware Flaw Bypasses AMD SEV-SNP Protections on Zen 1–5 CPUs

First reported
Last updated
1 unique sources, 1 articles

Summary

Hide ▲

A new hardware vulnerability, codenamed StackWarp, affects AMD Zen 1 through Zen 5 processors, allowing attackers with privileged control over a host server to manipulate the stack pointer of confidential virtual machines (CVMs). This flaw undermines the integrity guarantees provided by AMD Secure Encrypted Virtualization with Secure Nested Paging (SEV-SNP), enabling remote code execution and privilege escalation within CVMs. The vulnerability impacts various AMD EPYC and EPYC Embedded processor series. AMD has characterized the flaw as a medium-severity improper access control bug (CVE-2025-29943, CVSS v4 score: 4.6). The issue can be exploited to expose secrets from SEV-secured environments and compromise VMs in AMD-powered cloud environments. AMD has released microcode updates and plans further patches.

Timeline

  1. 19.01.2026 13:31 1 articles · 23h ago

    StackWarp Hardware Flaw Disclosed Affecting AMD SEV-SNP Protections

    A team of academics from the CISPA Helmholtz Center for Information Security disclosed the StackWarp vulnerability, which affects AMD Zen 1 through Zen 5 processors. The flaw allows attackers to manipulate the stack pointer of CVMs, undermining SEV-SNP protections. AMD has released microcode updates and plans further patches.

    Show sources

Information Snippets