New StackWarp Hardware Flaw Breaks AMD SEV-SNP Protections on Zen 1–5 CPUs
好的,我现在需要帮用户总结这篇文章的内容,控制在100字以内。首先,我得通读全文,抓住主要信息。 文章讲的是德国CISPA团队发现了一个新的硬件漏洞,影响AMD处理器。漏洞名为StackWarp,允许恶意攻击者在受保护的虚拟机中运行恶意代码,绕过AMD的SEV-SNP安全机制。受影响的处理器包括Zen 1到Zen 5系列。 接下来,漏洞的细节:攻击者可以操控虚拟机的栈指针,导致远程代码执行和权限提升。AMD将此漏洞标记为CVE-2025-29943,严重程度为中等。修复方面,AMD已经发布了微代码更新,并计划在2026年发布AGESA补丁。 总结时要简洁明了,涵盖漏洞名称、影响范围、攻击后果以及修复措施。确保不超过100字,并且直接描述内容,不需要开头语。 </think> 德国CISPA团队披露AMD处理器新漏洞StackWarp,允许攻击者操控虚拟机栈指针,绕过SEV-SNP安全机制,在受保护VM中执行恶意代码。该漏洞影响AMD Zen 1至Zen 5处理器及多款EPYC系列芯片。AMD已发布微代码更新修复,并计划于2026年提供AGESA补丁。 2026-1-19 11:31:0 Author: thehackernews.com(查看原文) 阅读量:0 收藏

Hardware Security / Vulnerability

A team of academics from the CISPA Helmholtz Center for Information Security in Germany has disclosed the details of a new hardware vulnerability affecting AMD processors.

The security flaw, codenamed StackWarp, can allow bad actors with privileged control over a host server to run malicious code within confidential virtual machines (CVMs), undermining the integrity guarantees provided by AMD Secure Encrypted Virtualization with Secure Nested Paging (SEV-SNP). It impacts AMD Zen 1 through Zen 5 processors.

"In the context of SEV-SNP, this flaw allows malicious VM [virtual machine] hosts to manipulate the guest VM's stack pointer," researchers Ruiyi Zhang, Tristan Hornetz, Daniel Weber, Fabian Thomas, and Michael Schwarz said. "This enables hijacking of both control and data flow, allowing an attacker to achieve remote code execution and privilege escalation inside a confidential VM."

Cybersecurity

AMD, which is tracking the vulnerability as CVE-2025-29943 (CVSS v4 score: 4.6), characterized it as a medium-severity, improper access control bug that could allow an admin-privileged attacker to alter the configuration of the CPU pipeline, causing the stack pointer to be corrupted inside an SEV-SNP guest.

The issue affects the following product lines -

  • AMD EPYC 7003 Series Processors
  • AMD EPYC 8004 Series Processors
  • AMD EPYC 9004 Series Processors
  • AMD EPYC 9005 Series Processors
  • AMD EPYC Embedded 7003 Series Processors
  • AMD EPYC Embedded 8004 Series Processors
  • AMD EPYC Embedded 9004 Series Processors
  • AMD EPYC Embedded 9005 Series Processors

While SEV is designed to encrypt the memory of protected VMs and is intended to isolate them from the underlying hypervisor, the new findings from CISPA show that the safeguard can be bypassed without reading the VM's plaintext memory by instead targeting a microarchitectural optimization called stack engine, responsible for accelerated stack operations.

"The vulnerability can be exploited via a previously undocumented control bit on the hypervisor side," Zhang said in a statement shared with The Hacker News. "An attacker running a hyperthread in parallel with the target VM can use this to manipulate the position of the stack pointer inside the protected VM."

This, in turn, enables redirection of program flow or manipulation of sensitive data. The StackWarp attack can be used to expose secrets from SEV-secured environments and compromise VMs hosted on AMD-powered cloud environments. Specifically, it can be exploited to recover an RSA-2048 private key from a single faulty signature, effectively getting around OpenSSH password authentication and sudo's password prompt, and attain kernel-mode code execution in a VM.

Cybersecurity

The chipmaker released microcode updates for the vulnerability in July and October 2025, with AGESA patches for EPYC Embedded 8004 and 9004 Series Processors scheduled for release in April 2026.

The development builds upon a prior study from CISPA that detailed CacheWarp (CVE-2023-20592, CVSS v3 score:m 6.5), a software fault attack on AMD SEV-SNP, which permits attackers to hijack control flow, break into encrypted VMs, and perform privilege escalation inside the VM. It's worth noting that both are hardware architectural attacks.

"For operators of SEV-SNP hosts, there are concrete steps to take: First, check whether hyperthreading is enabled on the affected systems. If it is, plan a temporary disablement for CVMs that have particularly high integrity requirements," Zhang said. "At the same time, any available microcode and firmware updates from the hardware vendors should be installed. StackWarp is another example of how subtle microarchitectural effects can undermine system-level security guarantees."

Found this article interesting? Follow us on Google News, Twitter and LinkedIn to read more exclusive content we post.


文章来源: https://thehackernews.com/2026/01/new-stackwarp-hardware-flaw-breaks-amd.html
如有侵权请联系:admin#unsafe.sh