{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2025-61971","assignerOrgId":"b58fc414-a1e4-4f92-9d70-1add41838648","state":"PUBLISHED","assignerShortName":"AMD","dateReserved":"2025-10-04T18:09:57.018Z","datePublished":"2026-05-13T03:02:55.705Z","dateUpdated":"2026-05-13T03:02:55.705Z"},"containers":{"cna":{"providerMetadata":{"orgId":"b58fc414-a1e4-4f92-9d70-1add41838648","shortName":"AMD","dateUpdated":"2026-05-13T03:02:55.705Z"},"affected":[{"defaultStatus":"affected","vendor":"AMD","product":"AMD EPYC™ 9004 Series Processors","versions":[{"version":"GenoaPI_1.0.0.H","status":"unaffected"}]},{"defaultStatus":"affected","vendor":"AMD","product":"AMD EPYC™ 7003 Series Processors","versions":[{"version":"MilanPI-SP3_1.0.0.J","status":"unaffected"}]},{"defaultStatus":"affected","vendor":"AMD","product":"AMD EPYC™ 9005 Series Processors","versions":[{"version":"TurinPI_1.0.0.8","status":"unaffected"}]},{"defaultStatus":"affected","vendor":"AMD","product":"AMD EPYC™ 8004 Series Processors","versions":[{"version":"GenoaPI_1.0.0.H","status":"unaffected"}]},{"defaultStatus":"affected","vendor":"AMD","product":"AMD EPYC™ Embedded 7003 Series Processors","versions":[{"version":"EmbMilanPI-SP3 1.0.0.D","status":"unaffected"}]},{"defaultStatus":"affected","vendor":"AMD","product":"AMD EPYC™ Embedded 9004  Series Processors (formerly codenamed \"Genoa\")","versions":[{"version":"EmbGenoaPI-SP5 1.0.0.D","status":"unaffected"}]},{"defaultStatus":"affected","vendor":"AMD","product":"AMD EPYC™ Embedded 9004 Series Processors (formerly codenamed \"Bergamo\")","versions":[{"version":"EmbGenoaPI-SP5 1.0.0.D","status":"unaffected"}]},{"defaultStatus":"affected","vendor":"AMD","product":"AMD EPYC™ Embedded 8004 Series Processors","versions":[{"version":"EmbGenoaPI-SP5 1.0.0.D","status":"unaffected"}]},{"defaultStatus":"affected","vendor":"AMD","product":"AMD EPYC™ Embedded 9005 Series Processors","versions":[{"version":"EmbeddedTurinPI_SP5_1004","status":"unaffected"}]}],"datePublic":"2026-05-13T03:00:33.777Z","descriptions":[{"lang":"en","value":"Missing lock bit protection for NBIO registers could allow a local admin-privileged attacker to modify MMIO routing configurations, potentially resulting in loss of SEV-SNP guest integrity.","supportingMedia":[{"base64":false,"type":"text/html","value":"Missing lock bit protection for NBIO registers could allow a local admin-privileged attacker to modify MMIO routing configurations, potentially resulting in loss of SEV-SNP guest integrity.<br>"}]}],"problemTypes":[{"descriptions":[{"cweId":"CWE-1233","description":"CWE-1233  Security-Sensitive Hardware Controls with Missing Lock Bit Protection","lang":"en","type":"CWE"}]}],"references":[{"url":"https://www.amd.com/en/resources/product-security/bulletin/AMD-SB-3030.html"}],"source":{"discovery":"UNKNOWN"},"x_generator":{"engine":"AMD PSIRT Automation 1.0"},"metrics":[{"cvssV4_0":{"version":"4.0","vectorString":"CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:N/SC:N/SI:H/SA:N","attackVector":"LOCAL","attackComplexity":"LOW","privilegesRequired":"HIGH","userInteraction":"NONE","baseScore":5.9,"baseSeverity":"MEDIUM"},"format":"CVSS","scenarios":[{"lang":"en","value":"GENERAL"}]}]}}}