Safety instructions for AMD-SB-3020

From Thomas-Krenn-Wiki
Jump to navigation Jump to search

On October 13th, 2025, AMD published the AMD-SB-3020 Security Bulletin [1]. Insufficient access control within AMD SEV-SNP (AMD Secure Encrypted Virtualization – Secure Nested Paging) could allow an attacker with administrator privileges to write to the RMP during SNP initialization, which could lead to a loss of integrity in the SEV-SNP guest memory.

Affected systems

AMD EPYC Systeme:

Solution for the problem

Here is a table listing the corresponding CVEs and AGESA/firmware updates for remediation for each EPYC generation, if available.

AMD EPYC 7003 Milan & Milan-X:

security vulnerability risk potential: AGESA version SEV FW + µcode
CVE-2025-0033 6.0 (Mittel) AGESA MilanPI 1.0.0.H SEV FW Milan: hex 1.37.23

SPL=0x1B


µcode

Milan: 0x0A0011DE

Milan-X: 0xA001245


AMD EPYC 8004 Siena & AMD EPYC 9004 Genoa/Genoa-X:

security vulnerability risk potential: AGESA version SEV FW + µcode
CVE-2025-0033 6.0 (Mittel) AGESA GenoaPI 1.0.0.H SEV FW Genoa 1.37.31

SPL=0x1B


µcode

Genoa: 0x0A0011DE

Genoa-X: 0xA001245

Bergamo/Siena: 0x0AA0021B

AMD EPYC 9005 Turin:

security vulnerability risk potential: AGESA version SEV FW + µcode
CVE-2025-0033 6.0 (Mittel) AGESA Turin PI 1.0.0.6 SEV FW Turin 1.37.41

SPL=0x04


µcode

Turin Classic: 0x0B002150

Turin Dense: 0x0B10104D

Supermicro published a Security Bulletin for the security vulnerabilities. A list with BIOS-versions of the corresponding mainboards with an AGESA-version, to close the gaps, is also available. Below is an excerpt from this table, which includes all motherboards that are offered by Thomas-Krenn: [2]

AMD motherboard BIOS version
H12SSW-iN/NT 3.5
H12SSL-i/C/CT/NT 3.5
H12DSi-N6/NT6 3.5
H13SSW 3.7
H13SSL-N/NT 3.7

Updates for products of Thomas-Krenn

Updates for the corresponding system can be found in the download area of Thomas-Krenn. Updates in the download area have been tested by us to guarantee the stability and compatibility of our systems.

If you require the latest version for your system and it is not yet available in our download area, you can get it at Asus or Supermicro

References

  1. SEV-SNP RMP Initialization Vulnerability (www.amd.com/en/resources/product-security)
  2. AMD Security Bulletin AMD-SB-3020, October 2025 (www.supermicro.com)


Author: Thomas-Krenn.AG

At Thomas-Krenn.AG we pay attention to the best possible service. To do justice to this, we have created our Thomas-Krenn Wiki. Here we share our knowledge with you and inform you about basics and news from the IT world. You like our knowledge culture and want to become part of the team? Visit our job offers.

 

Translator: Alina Ranzinger

Alina has been working at Thomas-Krenn.AG since 2024. After her training as multilingual business assistant, she got her job as assistant of the Product Management and is responsible for the translation of texts and for the organisation of the department.


Related articles

Safety instructions for AMD-SB-4004 client vulnerabilities
Safety instructions for AMD-SB-7009
Safety instructions for AMD-SB-7055