Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
| Vendor | Product | Affected Versions | CPE | Subscribe |
|---|---|---|---|---|
| AMD | AMD EPYC™ 9004 Series Processors | Genoa++_1.0.0.H | - | |
| AMD | AMD EPYC™ 9005 Series Processors | TurinPI_1.0.0.6 | - | |
| AMD | AMD EPYC™ 8004 Series Processors | Genoa++_1.0.0.H | - | |
| AMD | AMD EPYC™ Embedded 7003 Series Processors | EmbMilanPI-SP3 v9 1.0.0.C | - | |
| AMD | AMD EPYC™ Embedded 9005 Series Processors | EmbTurinPI-SP5_1.0.0.1 | - |
| # | POC Description | Source Link | Shenlong Link |
|---|---|---|---|
| 1 | StackWarp POC (CVE-2025-29943): Explotación de hardware en CPUs AMD Zen que manipula un bit no documentado del motor de pila para corruptir el puntero de stack en VMs SEV-SNP protegidas, demostrando una falla en el aislamiento de memoria garantizado por SEV. Incluye módulo de kernel, scripts de automatización y entorno de pruebas. | https://github.com/fevar54/POC_CVE-2025-29943_Write-what-where-Condition | POC Details |
No public POC found.
Login to generate AI POCNo comments yet