KVM SEV-SNP DMA Write Drop Local Privilege Escalation
CVE-2025-0029 Published on February 10, 2026
Improper handling of error condition during host-induced faults can allow a local high-privileged attack to selectively drop guest DMA writes, potentially resulting in a loss of SEV-SNP guest memory integrity
Weakness Type
Detection of Error Condition Without Action
The software detects a specific error, but takes no actions to handle the error.
Affected Versions
AMD EPYC™ 9005 Series Processors:- Version TurinPI 1.0.0.5 is unaffected.
- Version EmbTurinPI-SP5_1.0.0.0 is unaffected.
Exploit Probability
EPSS
0.02%
Percentile
4.88%
EPSS (Exploit Prediction Scoring System) scores estimate the probability that a vulnerability will be exploited in the wild within the next 30 days. The percentile shows you how this score compares to all other vulnerabilities.