Improper access control within AMD SEV-SNP could allow an admin privileged attacker to write to the RMP during SNP initialization, potentially resulting in a loss of SEV-SNP guest memory integrity.
https://www.infosecurity-magazine.com/news/last-windows-10-patch-tuesday-six/
https://www.securityweek.com/rmpocalypse-new-attack-breaks-amd-confidential-computing/
https://www.databreachtoday.com/confidential-virtual-machine-flaw-amd-patch-push-underway-a-29721
https://thehackernews.com/2025/10/rmpocalypse-single-8-byte-write.html
https://rmpocalypse.github.io/#abstract
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-0033