Security Advisories for AMD-SB-3029

From Thomas-Krenn-Wiki
Jump to navigation Jump to search

On November 11th, 2025, AMD published the Security Bulletin AMD-SB-3029 [1].An internally reported microcode bug in some EPYC™ AMD CPUs could allow a local attacker with administrator privileges to

execute SEV-SNP (Secure Encrypted Virtualization – Secure Nested Paging) guests using outdated TLB entries.

These mistakes may enable SNP-active vCPUs to reuse TLB-entries of other virtual machines (VMs), where the data integrity may be potentially endangered. AMD has published remedial measures for these security vulnerabilities.

Affected systems

Here is a tabular list of the affected systems:

Program Former Code Name Mitigation

Option 1: µcode

(Released as part of PI)

Mitigation

Option 2: AGESA

SEV Mitigation Vector Bit CVE
AMD EPYC™ 7002 Series processors "Rome" Not Affected CVE-2025-29934
AMD EPYC™ 7003 Series processors “Milan” 0x0A0011DB MilanPI_1.0.0.F

(2024-12-13)

not affected
AMD EPYC™ 7003 Series processors "Milan-X" 0x0A001244
AMD EPYC™ 9004 Series processors "Genoa"/ 0x0A101154 GenoaPI_1.0.0.G

(2025-06-26)

"Genoa-X" 0x0A10124F
"Bergamo" 0x0AA00219
AMD EPYC™ 9005 Series processors "Turin Classic" 0x0B00211E TurinPI_1.0.0.3

(2024-12-13)

“Turin Dense” 0x0B101028

In the following, you will find an excerpt from this table, in which all Supermicro mainboards are included that are offered by Thomas-Krenn: [2]

AMD motherboard BIOS version
H12SSW-iN/NT 3.5
H12SSL-i/C/CT/NT 3.5
H12DSi-N6/NT6 3.5
H13SSW 3.7
H13SSL-N/NT 3.7

Updates for products of Thomas-Krenn

Updates for the corresponding system can be found in the download area of Thomas-Krenn. The updates in the download area have been tested by us to guarantee the stability and compatibility of our systems.

If you require the latest version for your system and it is not yet available in our download area, you can get it at Asus, Supermicro or Gigabyte.

References

More information


Author: Thomas-Krenn.AG

At Thomas-Krenn.AG we pay attention to the best possible service. To do justice to this, we have created our Thomas-Krenn Wiki. Here we share our knowledge with you and inform you about basics and news from the IT world. You like our knowledge culture and want to become part of the team? Visit our job offers.

 

Translator: Alina Ranzinger

Alina has been working at Thomas-Krenn.AG since 2024. After her training as multilingual business assistant, she got her job as assistant of the Product Management and is responsible for the translation of texts and for the organisation of the department.


Related articles

Safety Instructions for AMD-SB-7027 AMD SMM vulnerabilities
Safety instructions for AMD-SB-7028 AMD SMM Callout Vulnerability
Security instructions for AMD-SB-7039 Unauthorized access to the AMD Secure Processor crypto co-processor