← Feed Deep Dive Matrix

Researchers bypass AMD SEV-SNP protections with “Fabricked” Infinity Fabric attack

tomshardware.com 2026-05-19 Etiido Uko
Entities
Companies:AMDETH Zurich
Tags
AMDSEV-SNPConfidential ComputingInfinity FabricVulnerability ExploitationCloud SecurityVirtual Machine SecurityCPU ArchitectureMemory RoutingUEFI FirmwareSecurity ProtectionAttack Technique
News Summary
Researchers at ETH Zurich disclosed a software-only vulnerability in April 2025 that undermines AMD's SEV-SNP confidential computing protections on EPYC platforms, dubbed 'Fabricked.' This exploit tar... Read original →
Industry Analysis
The Fabricked exploit exposes a structural flaw in AMD’s confidential computing architecture: over-reliance on firmware-microcode coordination without hardware-enforced write protection for critical interconnects like Infinity Fabric. This undermines SEV-SNP’s credibility as a trust anchor, compelling cloud providers—especially in regulated sectors—to reassess EPYC-based CVM deployments. Near-term operational costs will spike due to firmware validation, supply chain audits, and potential platform migration. Intel and AWS Nitro are poised to leverage TDX and dedicated security silicon to capture market share. Critically, Zen 5’s inclusion among affected architectures reveals that AMD’s security roadmap lags behind its process-node advances. Over the next 18 months, the industry will pivot toward architectures combining hardware isolation with physically separate roots of trust—rendering software-only confidential computing approaches increasingly untenable.
Read Original Article →
Related
This page displays AI-generated summaries and metadata for research purposes. Original content belongs to the respective publishers.