Executive Summary
In early 2024, security researchers unveiled a significant vulnerability impacting AMD and Intel CPUs implementing memory encryption for confidential computing. By constructing an inexpensive hardware module, the team demonstrated how attackers could physically intercept and decrypt protected memory traffic between the main processor and RAM, effectively bypassing hardware-implemented encryption intended to secure sensitive workloads. This attack, which operates independently of software measures, exposes plaintext data and private keys, revealing a critical flaw in the foundation of memory encryption technologies relied upon for cloud, data center, and edge security. As a result, organizations using these processors for confidential computing may be at risk until hardware changes are introduced.
This research underscores increasing scrutiny of hardware-level threats as confidential computing gains adoption. With the emergence of accessible hardware-based attacks, enterprises and regulators face renewed urgency to evaluate physical and low-level protections beyond traditional network and endpoint security controls.
Why This Matters Now
Physical hardware vulnerabilities like this challenge the security of confidential computing and encrypted memory, especially as cloud adoption accelerates. The demonstrated attack highlights the urgent need for defense-in-depth strategies and increased transparency in hardware security assumptions, as sophisticated attackers may exploit these weaknesses in high-value or regulated environments.
Attack Path Analysis
Attackers used a low-cost hardware device to bypass AMD and Intel memory encryption, gaining physical or low-level access to memory contents. This allowed attackers to escalate privileges by extracting secrets or credentials from unencrypted memory. Subsequently, they moved laterally within the environment by leveraging sensitive data to access additional resources. The attackers established covert command and control by maintaining persistence over compromised systems. Data was then exfiltrated via unencrypted or policy-unrestricted channels. Ultimately, this attack could lead to unauthorized disclosure, system tampering, or business disruption.
Kill Chain Progression
Initial Compromise
Description
Adversaries physically attached a hardware module to intercept memory contents, bypassing CPU-integrated memory encryption to access sensitive data.
Related CVEs
CVE-2024-21944
CVSS 5.3Improper input validation for DIMM SPD metadata in AMD processors allows attackers to bypass SEV protections, leading to potential data integrity loss.
Affected Products:
AMD EPYC – 7003 series, 8004 series, 9004 series, 9005 series
Exploit Status:
proof of conceptCVE-2025-0033
CVSS 5.9Race condition during RMP initialization in AMD SEV-SNP allows a malicious hypervisor to modify the RMP, leading to loss of guest memory integrity.
Affected Products:
AMD EPYC – 7003 series, 8004 series, 9004 series, 9005 series
Exploit Status:
proof of conceptCVE-2024-56161
CVSS 7.2Improper signature verification in AMD CPU ROM microcode patch loader allows attackers to load malicious microcode, compromising SEV-SNP protections.
Affected Products:
AMD EPYC – 7003 series, 8004 series, 9004 series, 9005 series
Exploit Status:
proof of conceptCVE-2025-11901
CVSS 7UEFI firmware reports DMA protection as enabled without proper IOMMU initialization, allowing unauthorized system memory access.
Affected Products:
ASUS Motherboards – Z490, W480, B460, H410, Z590, B560, H510, Z690, B660, W680, Z790, B760, W790
Exploit Status:
proof of conceptReferences:
https://www.pcgamer.com/hardware/motherboards/asus-tells-owners-of-its-intel-motherboards-to-update-the-bios-because-they-may-allow-unintended-access-to-system-memory/https://www.techradar.com/pro/security/motherboards-from-gigabyte-msi-asus-asrock-at-risk-from-new-uefi-flaw-attack-heres-what-we-know
MITRE ATT&CK® Techniques
User Execution: Malicious Hardware
Native API
Deobfuscate/Decode Files or Information
Direct Volume Access
Process Injection: External Device Manipulation
Unsecured Credentials
Data from Local System
Exfiltration Over Alternative Protocol
Potential Compliance Exposure
Mapping incident impact across multiple compliance frameworks.
PCI DSS v4.0 – Rendering PAN Unreadable
Control ID: 3.4.1
NYDFS 23 NYCRR 500 – Cybersecurity Policy
Control ID: 500.03
DORA (Regulation (EU) 2022/2554) – ICT Risk Management Framework
Control ID: Article 9
CISA Zero Trust Maturity Model (ZTMM) 2.0 – Device Security and Integrity
Control ID: Pillar: Device, Capability: Asset Security
NIS2 Directive (Directive (EU) 2022/2555) – Security of Network and Information Systems
Control ID: Article 21
Sector Implications
Industry-specific impact of the vulnerabilities, including operational, regulatory, and cloud security risks.
Financial Services
Hardware vulnerability bypassing AMD/Intel memory encryption exposes encrypted financial transactions, payment processing systems, and confidential customer data to unauthorized access attacks.
Health Care / Life Sciences
Cheap hardware modules can circumvent confidential computing protections, compromising encrypted patient records, medical device communications, and HIPAA-compliant data storage systems.
Computer Hardware
Direct impact on AMD/Intel processor manufacturers as inexpensive bypass devices undermine scalable memory encryption features, affecting product security credibility and customer trust.
Cloud Computing
Confidential computing vulnerabilities threaten cloud infrastructure security, potentially exposing tenant data isolation, encrypted workloads, and multi-tenant environment protection mechanisms to compromise.
Sources
- Cheap Hardware Module Bypasses AMD, Intel Memory Encryptionhttps://www.darkreading.com/vulnerabilities-threats/cheap-hardware-module-amd-intel-memory-encryptionVerified
- BadRAM: $10 hack unlocks AMD encrypted memoryhttps://www.helpnetsecurity.com/2024/12/11/badram-amd-hack-cve-2024-21944/Verified
- RMPocalypse Vulnerability Compromises AMD SEV-SNP Securityhttps://hackmag.com/news/rmpocalypseVerified
- AMD, Google disclose Zen processor microcode vulnerabilityhttps://www.techtarget.com/searchsecurity/news/366618758/AMD-Google-disclose-Zen-processor-microcode-vulnerabilityVerified
- Asus tells owners of its Intel motherboards to update the BIOS because they 'may allow unintended access to system memory'https://www.pcgamer.com/hardware/motherboards/asus-tells-owners-of-its-intel-motherboards-to-update-the-bios-because-they-may-allow-unintended-access-to-system-memory/Verified
- Motherboards from Gigabyte, MSI, ASUS, ASRock at risk from new UEFI flaw attack - here's what we knowhttps://www.techradar.com/pro/security/motherboards-from-gigabyte-msi-asus-asrock-at-risk-from-new-uefi-flaw-attack-heres-what-we-knowVerified
Frequently Asked Questions
Cloud Native Security Fabric Mitigations and ControlsCNSF
Implementing Zero Trust segmentation, inline encryption, egress filtering, and anomaly detection would contain the blast radius of hardware-based attacks, restrict lateral access with least-privilege, and help block or detect memory-derived exfiltration through network enforcement and policy controls.
Control: Cloud Native Security Fabric (CNSF)
Mitigation: Provides continuous real-time policy enforcement and anomaly detection for unexpected access attempts.
Control: Zero Trust Segmentation
Mitigation: Limits the attacker’s ability to use stolen credentials to gain elevated or lateralized access.
Control: East-West Traffic Security
Mitigation: Restricts lateral workload-to-workload communication and logs unusual internal movement.
Control: Threat Detection & Anomaly Response
Mitigation: Anomaly detection and behavioral controls surface and contain suspicious outbound activity.
Control: Egress Security & Policy Enforcement
Mitigation: Prevents exfiltration of sensitive data through strict egress filtering and policy controls.
Rapid detection and response tools minimize business disruption.
Impact at a Glance
Affected Business Functions
- Data Center Operations
- Cloud Services
- Confidential Computing
Estimated downtime: 7 days
Estimated loss: $5,000,000
Potential exposure of sensitive data, including encryption keys and confidential virtual machine contents, due to bypassed memory encryption protections.
Recommended Actions
Key Takeaways & Next Steps
- • Implement microsegmentation and strict east-west traffic policies to curtail lateral movement even if secrets are compromised.
- • Enforce robust egress controls to block unauthorized data exfiltration from workloads and sensitive memory sources.
- • Mandate strong, least-privileged identity assignments and dynamic policy enforcement at workload and network levels.
- • Ensure comprehensive visibility and real-time anomaly detection to quickly identify suspicious access or behavior patterns indicative of hardware-based attacks.
- • Regularly audit encryption implementations and monitor for physical attack indicators to address potential gaps in confidential computing across cloud and hybrid environments.



