By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
World of SoftwareWorld of SoftwareWorld of Software
  • News
  • Software
  • Mobile
  • Computing
  • Gaming
  • Videos
  • More
    • Gadget
    • Web Stories
    • Trending
    • Press Release
Search
  • Privacy
  • Terms
  • Advertise
  • Contact
Copyright © All Rights Reserved. World of Software.
Reading: New StackWarp Hardware Flaw Breaks AMD SEV-SNP Protections on Zen 1–5 CPUs
Share
Sign In
Notification Show More
Font ResizerAa
World of SoftwareWorld of Software
Font ResizerAa
  • Software
  • Mobile
  • Computing
  • Gadget
  • Gaming
  • Videos
Search
  • News
  • Software
  • Mobile
  • Computing
  • Gaming
  • Videos
  • More
    • Gadget
    • Web Stories
    • Trending
    • Press Release
Have an existing account? Sign In
Follow US
  • Privacy
  • Terms
  • Advertise
  • Contact
Copyright © All Rights Reserved. World of Software.
World of Software > Computing > New StackWarp Hardware Flaw Breaks AMD SEV-SNP Protections on Zen 1–5 CPUs
Computing

New StackWarp Hardware Flaw Breaks AMD SEV-SNP Protections on Zen 1–5 CPUs

News Room
Last updated: 2026/01/19 at 8:08 AM
News Room Published 19 January 2026
Share
New StackWarp Hardware Flaw Breaks AMD SEV-SNP Protections on Zen 1–5 CPUs
SHARE

Ravie LakshmananJan 19, 2026Hardware Security / Vulnerability

A team of academics from the CISPA Helmholtz Center for Information Security in Germany has disclosed the details of a new hardware vulnerability affecting AMD processors.

The security flaw, codenamed StackWarp, can allow bad actors with privileged control over a host server to run malicious code within confidential virtual machines (CVMs), undermining the integrity guarantees provided by AMD Secure Encrypted Virtualization with Secure Nested Paging (SEV-SNP). It impacts AMD Zen 1 through Zen 5 processors.

“In the context of SEV-SNP, this flaw allows malicious VM [virtual machine] hosts to manipulate the guest VM’s stack pointer,” researchers Ruiyi Zhang, Tristan Hornetz, Daniel Weber, Fabian Thomas, and Michael Schwarz said. “This enables hijacking of both control and data flow, allowing an attacker to achieve remote code execution and privilege escalation inside a confidential VM.”

Cybersecurity

AMD, which is tracking the vulnerability as CVE-2025-29943 (CVSS v4 score: 4.6), characterized it as a medium-severity, improper access control bug that could allow an admin-privileged attacker to alter the configuration of the CPU pipeline, causing the stack pointer to be corrupted inside an SEV-SNP guest.

The issue affects the following product lines –

  • AMD EPYC 7003 Series Processors
  • AMD EPYC 8004 Series Processors
  • AMD EPYC 9004 Series Processors
  • AMD EPYC 9005 Series Processors
  • AMD EPYC Embedded 7003 Series Processors
  • AMD EPYC Embedded 8004 Series Processors
  • AMD EPYC Embedded 9004 Series Processors
  • AMD EPYC Embedded 9005 Series Processors

While SEV is designed to encrypt the memory of protected VMs and is intended to isolate them from the underlying hypervisor, the new findings from CISPA show that the safeguard can be bypassed without reading the VM’s plaintext memory by instead targeting a microarchitectural optimization called stack engine, responsible for accelerated stack operations.

“The vulnerability can be exploited via a previously undocumented control bit on the hypervisor side,” Zhang said in a statement shared with The Hacker News. “An attacker running a hyperthread in parallel with the target VM can use this to manipulate the position of the stack pointer inside the protected VM.”

This, in turn, enables redirection of program flow or manipulation of sensitive data. The StackWarp attack can be used to expose secrets from SEV-secured environments and compromise VMs hosted on AMD-powered cloud environments. Specifically, it can be exploited to recover an RSA-2048 private key from a single faulty signature, effectively getting around OpenSSH password authentication and sudo’s password prompt, and attain kernel-mode code execution in a VM.

Cybersecurity

The chipmaker released microcode updates for the vulnerability in July and October 2025, with AGESA patches for EPYC Embedded 8004 and 9004 Series Processors scheduled for release in April 2026.

The development builds upon a prior study from CISPA that detailed CacheWarp (CVE-2023-20592, CVSS v3 score:m 6.5), a software fault attack on AMD SEV-SNP, which permits attackers to hijack control flow, break into encrypted VMs, and perform privilege escalation inside the VM. It’s worth noting that both are hardware architectural attacks.

“For operators of SEV-SNP hosts, there are concrete steps to take: First, check whether hyperthreading is enabled on the affected systems. If it is, plan a temporary disablement for CVMs that have particularly high integrity requirements,” Zhang said. “At the same time, any available microcode and firmware updates from the hardware vendors should be installed. StackWarp is another example of how subtle microarchitectural effects can undermine system-level security guarantees.”

Sign Up For Daily Newsletter

Be keep up! Get the latest breaking news delivered straight to your inbox.
By signing up, you agree to our Terms of Use and acknowledge the data practices in our Privacy Policy. You may unsubscribe at any time.
Share This Article
Facebook Twitter Email Print
Share
What do you think?
Love0
Sad0
Happy0
Sleepy0
Angry0
Dead0
Wink0
Previous Article Star Trek Legends Whose Ashes Were Sent Into Space After Their Deaths – BGR Star Trek Legends Whose Ashes Were Sent Into Space After Their Deaths – BGR
Next Article Best Soundcore deal: Save  on the Soundcore Q30 by Anker headphones Best Soundcore deal: Save $26 on the Soundcore Q30 by Anker headphones
Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Stay Connected

248.1k Like
69.1k Follow
134k Pin
54.3k Follow

Latest News

Intel delivers first Panther Lake CPU sample to Lenovo · TechNode
Intel delivers first Panther Lake CPU sample to Lenovo · TechNode
Computing
UK copyright unfit for protecting creative workers from AI | Computer Weekly
UK copyright unfit for protecting creative workers from AI | Computer Weekly
News
5 Essential TV Apps Every Cable Cutter Needs To Install – BGR
5 Essential TV Apps Every Cable Cutter Needs To Install – BGR
News
BCH and ETH Are Losing Momentum, Analysts Say ZKP Proof Pods Offer the Best Long-Term Crypto Hedge Today
BCH and ETH Are Losing Momentum, Analysts Say ZKP Proof Pods Offer the Best Long-Term Crypto Hedge Today
Gadget

You Might also Like

Intel delivers first Panther Lake CPU sample to Lenovo · TechNode
Computing

Intel delivers first Panther Lake CPU sample to Lenovo · TechNode

3 Min Read
Under Nigeria’s new tax law, you have 30 days to object or pay
Computing

Under Nigeria’s new tax law, you have 30 days to object or pay

7 Min Read
⚡ Weekly Recap: Fortinet Exploits, RedLine Clipjack, NTLM Crack, Copilot Attack & More
Computing

⚡ Weekly Recap: Fortinet Exploits, RedLine Clipjack, NTLM Crack, Copilot Attack & More

28 Min Read
Myrlyn 1.0 Released For Package Manager GUI Spawned By SUSE’s Hack Week
Computing

Myrlyn 1.0 Released For Package Manager GUI Spawned By SUSE’s Hack Week

1 Min Read
//

World of Software is your one-stop website for the latest tech news and updates, follow us now to get the news that matters to you.

Quick Link

  • Privacy Policy
  • Terms of use
  • Advertise
  • Contact

Topics

  • Computing
  • Software
  • Press Release
  • Trending

Sign Up for Our Newsletter

Subscribe to our newsletter to get our newest articles instantly!

World of SoftwareWorld of Software
Follow US
Copyright © All Rights Reserved. World of Software.
Welcome Back!

Sign in to your account

Lost your password?