A use after free in the SEV firmware could allow a malicous hypervisor to activate a migrated guest with the SINGLE_SOCKET policy on a different socket than the migration agent potentially resulting in loss of integrity.
History

Thu, 12 Feb 2026 11:30:00 +0000

Type Values Removed Values Added
First Time appeared Amd
Amd epyc 7003 Series Processors
Amd epyc 8004 Series Processors
Amd epyc 9004 Series Processors
Amd epyc 9005 Series Processors
Amd epyc Embedded 7003 Series Processors
Amd epyc Embedded 8004 Series Processors
Amd epyc Embedded 9003 Series Processors
Amd epyc Embedded 9004 Series Processors
Amd epyc Embedded 9005 Series Processors
Vendors & Products Amd
Amd epyc 7003 Series Processors
Amd epyc 8004 Series Processors
Amd epyc 9004 Series Processors
Amd epyc 9005 Series Processors
Amd epyc Embedded 7003 Series Processors
Amd epyc Embedded 8004 Series Processors
Amd epyc Embedded 9003 Series Processors
Amd epyc Embedded 9004 Series Processors
Amd epyc Embedded 9005 Series Processors

Wed, 11 Feb 2026 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Tue, 10 Feb 2026 19:45:00 +0000

Type Values Removed Values Added
Description A use after free in the SEV firmware could allow a malicous hypervisor to activate a migrated guest with the SINGLE_SOCKET policy on a different socket than the migration agent potentially resulting in loss of integrity.
Weaknesses CWE-416
References
Metrics cvssV4_0

{'score': 4.6, 'vector': 'CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:N/SC:N/SI:L/SA:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: AMD

Published: 2026-02-10T19:14:58.027Z

Updated: 2026-02-11T14:51:07.017Z

Reserved: 2024-11-21T16:17:56.201Z

Link: CVE-2025-0031

cve-icon Vulnrichment

Updated: 2026-02-11T14:51:02.633Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-02-10T20:16:43.477

Modified: 2026-02-10T21:51:48.077

Link: CVE-2025-0031

cve-icon Redhat

No data.