AMD VM security tools can be bypassed, allowing hackers to infiltrate your devices, experts warn


  • University researchers find a way to trick AMD’s secure VM technology into sharing sensitive information
  • AMD has released a security advisory with recommended solutions
  • The bug requires physical access, but in some scenarios can only be exploited via software

AMD Virtual Machine (VM) security tools can be bypassed, allowing cybercriminals to infiltrate devices and steal sensitive data, experts warn.

Security researchers from multiple universities in the EU and UK outlined how AMD chips come with Secure Encrypted Virtualization (SEV), a security feature designed to encrypt the memory of virtual machines (VM) to protect it from unauthorized access, including by the hypervisor or other VMs. SEV uses hardware-based encryption keys that are unique to each VM, keeping data confidential and tamper-resistant, even in shared environments.