CVE-2025-29943Write-what-where Condition in Amd64-microcode

Severity
4.6MEDIUMNVD
EPSS
0.0%
top 99.58%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedJan 16

Description

Write what were condition within AMD CPUs may allow an admin-privileged attacker to modify the configuration of the CPU pipeline potentially resulting in the corruption of the stack pointer inside an SEV-SNP guest.

CVSS vector

CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:N/SC:N/SI:L/SA:N

Affected Packages2 packages

debiandebian/amd64-microcode< amd64-microcode 3.20251202.1 (forky)

🔴Vulnerability Details

2
GHSA
GHSA-4vw8-pffj-q9x7: Write what were condition within AMD CPUs may allow an admin-privileged attacker to modify the configuration of the CPU pipeline potentially resulting2026-01-16
OSV
CVE-2025-29943: Write what were condition within AMD CPUs may allow an admin-privileged attacker to modify the configuration of the CPU pipeline potentially resulting2026-01-16

📋Vendor Advisories

3
Red Hat
AMD EPYC™ 9004 Series Processors: From CVEorg collector2026-01-16
Debian
CVE-2025-29943: amd64-microcode - Write what were condition within AMD CPUs may allow an admin-privileged attacker...2025
Microsoft
An attacker was able to perform an out-of-bounds read or write on a JavaScript object by fooling range-based bounds check elimination. This vulnerability affects Firefox < 124.0.1.2024-03-12

🕵️Threat Intelligence

1
Wiz
CVE-2025-29943 Impact, Exploitability, and Mitigation Steps | Wiz