AMD CPU pipeline config flaw lets admin corrupt SEVSNP stack ptr
CVE-2025-29943 Published on January 16, 2026
Write what were condition within AMD CPUs may allow an admin-privileged attacker to modify the configuration of the CPU pipeline potentially resulting in the corruption of the stack pointer inside an SEV-SNP guest.
Weakness Type
Write-what-where Condition
Any condition where the attacker has the ability to write an arbitrary value to an arbitrary location, often as the result of a buffer overflow.
Affected Versions
AMD EPYC™ 9004 Series Processors:- Version Genoa++_1.0.0.H is unaffected.
- Version TurinPI_1.0.0.6 is unaffected.
- Version Genoa++_1.0.0.H is unaffected.
- Version EmbMilanPI-SP3 v9 1.0.0.C is unaffected.
- Version EmbTurinPI-SP5_1.0.0.1 is unaffected.
Exploit Probability
EPSS
0.01%
Percentile
0.44%
EPSS (Exploit Prediction Scoring System) scores estimate the probability that a vulnerability will be exploited in the wild within the next 30 days. The percentile shows you how this score compares to all other vulnerabilities.