AMD SEV Firmware UAF Allows Hypervisor Guest Activation Attack
CVE-2025-0031 Published on February 10, 2026
A use after free in the SEV firmware could allow a malicous hypervisor to activate a migrated guest with the SINGLE_SOCKET policy on a different socket than the migration agent potentially resulting in loss of integrity.
Weakness Type
What is a Dangling pointer Vulnerability?
Referencing memory after it has been freed can cause a program to crash, use unexpected values, or execute code.
CVE-2025-0031 has been classified to as a Dangling pointer vulnerability or weakness.
Affected Versions
AMD EPYC™ 9004 Series Processors:- Version GenoaPI 1.0.0.G is unaffected.
- Version MilanPI 1.0.0.H is unaffected.
- Version TurinPI 1.0.0.5 is unaffected.
- Version GenoaPI 1.0.0.G is unaffected.
- Version EmbMilanPI-SP3 v9 1.0.0.C is unaffected.
- Version EmbGenoaPI-SP5 1.0.0.B is unaffected.
- Version EmbTurinPI-SP5_1.0.0.1 is unaffected.
- Version EmbGenoaPI-SP5 1.0.0.B is unaffected.
- Version EmbGenoaPI-SP5 1.0.0.B is unaffected.
Exploit Probability
EPSS (Exploit Prediction Scoring System) scores estimate the probability that a vulnerability will be exploited in the wild within the next 30 days. The percentile shows you how this score compares to all other vulnerabilities.