Skip to content

Fabricked-Attack/PoC

Repository files navigation

Fabricked: Breaking AMD SEV-SNP via Infinity Fabric

CVE-2025-54510 Target-AMD_Zen_5 Status-Research_PoC

Fabricked is a novel, software-only attack that compromises the security guarantees of AMD SEV-SNP (Secure Encrypted Virtualization-Secure Nested Paging). By exploiting the untrusted nature of the UEFI in the confidential computing threat model, the attack manipulates the Infinity Fabric, AMD's internal interconnect, to misroute memory transactions and bypass critical security checks.

Project Architecture

The attack targets the SNP_INIT phase of the SEV-SNP lifecycle. By misconfiguring the Infinity Fabric's address routing, the hypervisor forces the PSP's initialization writes to the Reverse Map Table (RMP) to be silently dropped or diverted.

📁 Repository Structure

Component Description
asrock_fabricked_uefi.bin Malicious UEFI Image that skips Infinity Fabric "locking" during boot. Only for Asrock BERGAMOD8-2L2T motherboards
linux-fabricked/ Modified Linux Kernel with patches (amd_disclosure.patch) to coordinate the memory re-routing.
fabrick-attestation-attack/ Attestation Exploit: A KVM-based module to extract or manipulate SEV-SNP attestation reports.
fabrick-static-attack/ Debug-Enable Exploit: A KVM-based module to demonstrate arbitrary memory access to a target CVM.

Getting Started

1. BIOS Flash

Flash the provided asrock_fabricked_uefi.bin to a compatible AMD EPYC (Zen 5) motherboard (Asrock BERGAMOD8-2L2T). Warning: This will weaken the platform's security for research purposes.

2. Hypervisor Setup

Build and boot the modified kernel in linux-fabricked/:

cd linux-fabricked
make -j$(nproc)
sudo make install && sudo reboot

3. Launching the Attack

Load the attack modules once a victim SEV-SNP CVM is launched:

cd fabrick-attestation-attack
make VICTIM=<target_gpa>
sudo insmod attack.ko 

⚠️ Security Advisory

This repository contains Proof-of-Concept (PoC) code for a critical vulnerability.

  • CVE-2025-54510 has been assigned to this flaw.
  • AMD has released official security bulletins and patches (AMD-SB-3034).
  • Use for educational and research purposes only. Unauthorized access to computer systems is illegal.

References & Resources


Built for the advancement of Hardware Security & Confidential Computing.

About

No description, website, or topics provided.

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

 
 
 

Contributors