As we know, if you are an usual user, cloud services are in high demand today, offering the ability to store data on remote servers and access it from anywhere. They are used in a wide range of contexts: individuals store personal files such as holiday photos, while businesses rely on the cloud for sensitive data and operations.
These environments are therefore suitable both for storing sensitive data and for processing it securely. They play an important role, for example, in artificial intelligence (AI) applications that analyse personal content – such as messenger services that automatically generate summaries of messages by processing them in a cloud.
Experts refer to these specially secured cloud areas as confidential computing environments. These environments use technology to ensure that sensitive data remains encrypted and protected from access not only during storage or transmission, but also during processing in the cloud.
Hardware problem with far-reaching consequences #
This vulnerability is named RMPocalypse. “RMPocalypse is a clearly identifiable hardware issue that can be exploited using straightforward attack methods and can have a serious impact,” explained Shweta Shinde. On the Common Vulnerability Scoring System (CVSS) – a scale from 1 to 10 used to assess the severity of IT security vulnerabilities – RMPocalypse scores 6.0.
AMD security technology is affected #
The vulnerability is therefore relevant -Florian Meyer wrote- but does not affect all cloud services. Office applications such as Word or Excel for example remain unaffected. The vulnerability is critical because it affects those areas of the cloud that are specifically secured for handling confidential data – and where an attack can cause far-reaching damage.
Its technology is frequently used in the confidential computing environments of major cloud providers such as Microsoft Azure, Google Cloud and Amazon Web Services. Its widespread use increases the significance of RMPocalypse because the vulnerability could undermine trust in the security of cloud services.
Beware: every attack is a hit #
RMPocalypse exploits a vulnerability in the memory management of modern processors – specifically, in Reverse Map Table (RMP). This mechanism is intended to ensure that only authorised programmes can use confidential data. However, if it is flawed, the protection becomes incomplete – potentially allowing attackers to access sensitive information.
The technology used by AMD to protect highly confidential data in the cloud is called SEV-SNP – short for Secure Encrypted Virtualisation with Secure Nested Paging. It forms the technical foundation of confidential computing environments, ensuring that sensitive information remains protected even while it is being processed.
SEV-SNP automatically protects data – during storage, transmission and processing – and ensures that even cloud providers cannot access it. The technology provides robust protection for virtual machines (VM), which serve as digital workspaces in the cloud, shielding them from unauthorised access.
Vulnerability arises at start-up #
The ETH Zurich researchers discovered that part of the security mechanism – the so-called Reverse Map Table (RMP) – is not fully protected when a virtual machine is started. This gap could allow attackers with remote access to bypass certain protective functions and manipulate the virtual machine environment, which is intended to be securely isolated.
Ultimately, the ETH researchers were able to show that AMD’s security mechanisms can be almost completely circumvented – including access to the code and all protected data. By theoretically analysing and documenting the attack, they helped to identify and fix the vulnerability before third parties could actually exploit it.
Contribution to digital sovereignty #
Confidential computing also plays a key role in data sovereignty, as it enables data to be protected during processing. This is why the Swiss National Centre for Cybersecurity (NCSC) considers the technology important: it helps to technically implement enhanced security requirements for digital data in Switzerland.
Citation #
-
Schlüter B., Shinde, S. RMPocalypse: How a Catch-22 Breaks AMD SEV-SNP. In: Proceedings of the 2025 ACM SIGSAC Conference on Computer and Communications Security (CCS ‘25), 13–17 October 2025, Taipei, Taiwan. ACM, New York, NY, USA.
-
The research paper is also available at this link.
Contact [Notaspampeanas](mailto: notaspampeanas@gmail.com)