A vulnerability in RMP initialization allows the AMD processor’s x86 cores to maliciously control parts of the initial RMP state.
October 14, 2025 By Ionut Arghire

Academic researchers from ETH Zurich have discovered a vulnerability in the memory management of AMD processors that allowed them to break confidential computing integrity guarantees.
Tracked as CVE-2025-0033 (CVSS score of 6.0), the issue is described as a race condition that occurs when AMD Secure Processor (ASP) initializes the Reverse Map Table (RMP).
In AMD processors that use Secure Encrypted Virtualization – Secure Nested Paging (SEV-SNP), RMP prevents the hypervisor from tampering with guest page mappings.
However, because RMP entries are used to protect the rest of the RMP, a Catch-22 occurs during setup, and the ASP is used to perform RMP initialization. Only ASP can modify RMP memory.