AMD CPU pipeline config flaw lets admin corrupt SEVSNP stack ptr
CVE-2025-29943 Published on January 16, 2026

Write what were condition within AMD CPUs may allow an admin-privileged attacker to modify the configuration of the CPU pipeline potentially resulting in the corruption of the stack pointer inside an SEV-SNP guest.

NVD

Weakness Type

Write-what-where Condition

Any condition where the attacker has the ability to write an arbitrary value to an arbitrary location, often as the result of a buffer overflow.


Affected Versions

AMD EPYC™ 9004 Series Processors: AMD EPYC™ 9005 Series Processors: AMD EPYC™ 8004 Series Processors: AMD EPYC™ Embedded 7003 Series Processors: AMD EPYC™ Embedded 9005 Series Processors:

Exploit Probability

EPSS
0.01%
Percentile
0.44%

EPSS (Exploit Prediction Scoring System) scores estimate the probability that a vulnerability will be exploited in the wild within the next 30 days. The percentile shows you how this score compares to all other vulnerabilities.