{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2025-61972","assignerOrgId":"b58fc414-a1e4-4f92-9d70-1add41838648","state":"PUBLISHED","assignerShortName":"AMD","dateReserved":"2025-10-04T18:09:57.018Z","datePublished":"2026-05-13T03:03:31.455Z","dateUpdated":"2026-05-13T03:03:31.455Z"},"containers":{"cna":{"providerMetadata":{"orgId":"b58fc414-a1e4-4f92-9d70-1add41838648","shortName":"AMD","dateUpdated":"2026-05-13T03:03:31.455Z"},"affected":[{"defaultStatus":"affected","vendor":"AMD","product":"AMD EPYC™ 9004 Series Processors","versions":[{"version":"GenoaPI_1.0.0.H","status":"unaffected"}]},{"defaultStatus":"affected","vendor":"AMD","product":"AMD EPYC™ 9005 Series Processors","versions":[{"version":"TurinPI_1.0.0.8","status":"unaffected"}]},{"defaultStatus":"affected","vendor":"AMD","product":"AMD EPYC™ 8004 Series Processors","versions":[{"version":"GenoaPI_1.0.0.H","status":"unaffected"}]},{"defaultStatus":"affected","vendor":"AMD","product":"AMD EPYC™ Embedded 9004  Series Processors (formerly codenamed \"Genoa\")","versions":[{"version":"EmbGenoaPI-SP5 1.0.0.D","status":"unaffected"}]},{"defaultStatus":"affected","vendor":"AMD","product":"AMD EPYC™ Embedded 9004 Series Processors (formerly codenamed \"Bergamo\")","versions":[{"version":"EmbGenoaPI-SP5 1.0.0.D","status":"unaffected"}]},{"defaultStatus":"affected","vendor":"AMD","product":"AMD EPYC™ Embedded 8004 Series Processors","versions":[{"version":"EmbGenoaPI-SP5 1.0.0.D","status":"unaffected"}]},{"defaultStatus":"affected","vendor":"AMD","product":"AMD EPYC™ Embedded 9005 Series Processors","versions":[{"version":"EmbeddedTurinPI_SP5_1004","status":"unaffected"}]}],"datePublic":"2026-05-13T03:00:40.598Z","descriptions":[{"lang":"en","value":"Missing lock bit protection for NBIO registers could allow a local admin-privileged attacker to gain arbitrary System Management Network (SMN) access, potentially resulting in arbitrary code execution in AMD Secure Processor (ASP) and loss of the SEV-SNP guest's confidentiality and integrity.","supportingMedia":[{"base64":false,"type":"text/html","value":"Missing lock bit protection for NBIO registers could allow a local admin-privileged attacker to gain arbitrary System Management Network (SMN) access, potentially resulting in arbitrary code execution in AMD Secure Processor (ASP) and loss of the SEV-SNP guest's confidentiality and integrity. <br>"}]}],"problemTypes":[{"descriptions":[{"cweId":"CWE-1233","description":"CWE-1233  Security-Sensitive Hardware Controls with Missing Lock Bit Protection","lang":"en","type":"CWE"}]}],"references":[{"url":"https://www.amd.com/en/resources/product-security/bulletin/AMD-SB-3030.html"}],"source":{"discovery":"UNKNOWN"},"x_generator":{"engine":"AMD PSIRT Automation 1.0"},"metrics":[{"cvssV4_0":{"version":"4.0","vectorString":"CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:H/VI:H/VA:N/SC:H/SI:H/SA:N","attackVector":"LOCAL","attackComplexity":"HIGH","privilegesRequired":"HIGH","userInteraction":"NONE","baseScore":8.5,"baseSeverity":"HIGH"},"format":"CVSS","scenarios":[{"lang":"en","value":"GENERAL"}]}]}}}