Heracles: The New Critical Vulnerability in AMD Processors That Threatens Secure Virtualization

AMD processors are once again at the center of cybersecurity discussions. A team of researchers from ETH Zurich has uncovered a critical vulnerability called Heracles, which impacts the secure virtualization technology SEV-SNP present in EPYC CPUs used in data centers and public clouds.

This discovery undermines trust in confidential virtual machines (CVM), a cornerstone of cloud security. In theory, these VMs ensure that even the hypervisor—who has full privileges over the infrastructure—cannot access guest memory contents. Heracles shows that this assumption isn’t always valid.

SEV-SNP: the promise of privacy in the cloud

SEV-SNP (Secure Encrypted Virtualization – Secure Nested Paging) was developed by AMD to protect VM memory through AES encryption in XEX mode, making data inaccessible even to system administrators or cloud providers.

The “SNP” extension adds integrity to page tables, preventing hypervisor manipulations to inject malicious code. This positioned AMD’s Confidential VMs as a competitive edge against rivals like Intel in confidential computing.

However, ETH Zurich researchers demonstrated that three factors collectively allow a malicious hypervisor to break these guarantees:

  1. The hypervisor’s ability to read encrypted guest memory.
  2. The ability to reallocate memory pages within RAM.
  3. The use of static “tweak” values during re-encryption.

This results in a practical attack called a chosen-plaintext oracle, which can infer sensitive data such as passwords or cryptographic keys by comparing encrypted data and their relocated counterparts.

Real risks for the cloud

Heracles poses a significant threat, especially in environments where virtual machines with AMD EPYC hardware are rented under promises of complete isolation. An attacker with hypervisor privileges could leak data without breaking the encryption algorithm itself, simply exploiting how AMD re-encrypts memory pages.

This means organizations trusting critical workloads to the cloud might expose strategic information, from private keys to authentication tokens.

AMD’s response

The vulnerability was reported to AMD in January 2025. After a six-month coordinated embargo, AMD issued an official statement acknowledging the risk as a known side channel. As mitigation, AMD has proposed measures beyond a full fix:

  • Ciphertext Hiding: Available in the fifth-generation EPYC (Turin), this limits the hypervisor’s visibility into encrypted VM data.
  • PAGE_SWAP_DISABLE policy: Introduced with SEV-SNP ABI 1.58 (May 2025), which prevents hypervisors from moving guest memory pages.

However, these mitigations reduce flexibility in dynamic memory management, leading to performance penalties in large-scale cloud environments. Essentially, AMD faces a classic trade-off: security versus performance.

AMD vs Intel: a history of critical vulnerabilities

Heracles is not an isolated incident. Both AMD and Intel have a history of serious security flaws over the past decade that have shaken confidence in hardware security:

VulnerabilityYearManufacturerMain ImpactSeverity in Servers
Spectre2018Intel & AMDSpeculative execution leaking data between processesVery high (industry-wide impact)
Meltdown2018Mainly IntelPrivileged memory access from user processesCritical (multi-user and cloud environments)
Foreshadow (L1TF)2018IntelReading protected memory inside SGX and VMCritical in virtualization
Take A Way2020AMDL1 Data cache side-channel attackModerate, more theoretical
Zenbleed2023AMDLeakage of vector registers in Zen 2High, with risks in servers
Downfall2023IntelReading data from AVX vector registersHigh, multiple generations affected
Heracles2025AMDData recovery in VMs encrypted with SEV-SNPCritical in public clouds

While Intel was at the center of Spectre and Meltdown in 2018, recent years show AMD suffering from architecture-specific vulnerabilities, especially related to secure virtualization. Heracles joins Zenbleed and Take A Way, confirming that no manufacturer is entirely immune.

What’s at stake?

Confidential computing has become a de facto standard in sensitive sectors like finance, healthcare, and defense. Vulnerabilities such as Heracles erode trust in this technology, especially as major cloud providers—Azure, Google Cloud, AWS—expand their catalog of encrypted VMs for regulated clients.

Although exploiting Heracles requires hypervisor privileges (reducing risk for end-users), the fact that a malicious or compromised cloud provider could access supposedly protected data raises significant concerns about the integrity of the digital supply chain.

Conclusion

Heracles is a stark reminder that no system is invulnerable. Cloud privacy guarantees depend on both cryptography and hardware implementation. AMD will need to balance performance and security in future generations, while businesses must implement available mitigations even if they come at a cost to efficiency.

In the ongoing battle for cloud data sovereignty, both AMD and Intel carry scars. Heracles hits particularly close to the core promise of absolute confidentiality that AMD has championed.

Scroll to Top