Red Hot Cyber
Cybersecurity, Cybercrime News and Vulnerability Analysis
Un'immagine concettuale e drammatica in primo piano mostra un processore AMD posizionato al centro, che sembra esplodere o frantumarsi sotto una pressione immensa. Il chip, di forma quadrata con i bordi metallici tipici dei processori moderni, presenta il celebre logo "AMD" in bianco su uno sfondo nero opaco. La superficie del processore è attraversata da profonde crepe realistiche che suggeriscono una rottura strutturale imminente. Attorno al componente elettronico, centinaia di frammenti di ghiaccio cristallino o vetro si irradiano verso l'esterno, creando un effetto di esplosione radiale. Le schegge sono traslucide, con bordi taglienti che riflettono una luce fredda e soffusa, contrastando nettamente con la superficie scura e ruvida della base sottostante, che ricorda il cemento o la pietra scura. L'illuminazione è d'atmosfera, con toni freddi che spaziano dal blu notte al grigio antracite, conferendo all'immagine un tono tecnologico ma catastrofico. I dettagli sono estremamente nitidi, dalle venature dei frammenti di ghiaccio ai piccoli contatti dorati visibili lungo il bordo inferiore del chip. L'insieme comunica visivamente concetti come il superamento dei limiti di potenza, il surriscaldamento estremo (paradossalmente rappresentato dal ghiaccio che si spezza) o il fallimento critico di un sistema hardware ad alte prestazioni.

FABRICKED: AMD Cloud Security Flaw Exposed, Is Your Data Safe?

18 April 2026 12:21

Cloud servers that promise complete data protection are not as impenetrable as they seem. Researchers have found a way to bypass one of the main security technologies of AMD processors, without needing physical access to the hardware.

The attack has been named FABRICKED, and it targets AMD’s SEV-SNP (Secure Virtual Machine) technology, used by cloud service providers to isolate customer data. The core of the problem lies in how data is transferred between components within the processor.

Modern AMD chips use an internal bus called Infinity Fabric. It connects cores, memory, and I/O devices. When the system starts, the firmware configures the routing rules: which data should be sent and where. It was assumed that, even with untrusted firmware, SEV-SNP protection would remain unaffected.

Advertising

However, FABRICKED proves otherwise.

An attacker with access to the hypervisor or firmware can modify routing rules and redirect critical operations. Consequently, the security coprocessor receives an incorrect image of the system and initializes it improperly. The attack allows for reading and writing arbitrary data in the memory of the protected virtual machine. Furthermore, the attacker can falsify authentication reports that confirm the system is running in a secure mode.

The main problem concerns the RMP table, which controls memory access. When the system starts, the coprocessor must populate this table with the correct data. However, if the entries are redirected, the table remains in an insecure state. The hypervisor then gains access to the virtual machine’s memory when it should not.

Researchers have discovered an even more unsettling scenario.

An attacker can activate the so-called debug mode after the system has passed the check. This mode is normally prohibited because it allows reading and modifying the virtual machine’s memory. However, by manipulating the security table, this restriction can be bypassed.

Advertising

Furthermore, the attack allows for falsifying audit results. A virtual machine can receive a “correct” report even if a modified or malicious environment is running. In fact, the user believes they are working in a secure environment, although the attacker has control over it. The problem stems from two factors. Firstly, the system does not verify that routing settings are completely locked. Secondly, some memory requests are processed incorrectly and might follow “erroneous” rules.

The vulnerability has already been reported to the developer. AMD has confirmed the problem and plans to fix it with a patch identified as CVE-2025-54510.

An attack requires a significant level of access, for example, control of the hypervisor or firmware. However, for cloud services, such a scenario is entirely realistic. This means that even modern confidential computing mechanisms cannot yet be considered completely secure.


Follow us on Google News to receive daily updates on cybersecurity. Contact us if you would like to report news, insights or content for publication.

1744358477148 300x300
Bajram Zeqiri is an expert in cybersecurity, cyber threat intelligence, and digital forensics with over twenty years of experience, combining technical expertise and strategic vision to build cyber resilience for SMEs. Founder of ParagonSec and a technical contributor for Red Hot Cyber, he works in the delivery and design of various cyber services, including SOC, MDR, Incident Response, Security Architecture, Engineering, and Operations. He helps SMEs transform cybersecurity from a cost center into a strategic business enabler.
Areas of Expertise: Cyber threat intelligence, Incident response, Digital forensics, Malware analysis, Security architecture, SOC/MDR operations, OSINT research