Skip to main content
Version: 1.27

Hardware integrity status

info

Privatemode is not affected by any known vulnerabilities that affect hardware integrity.

Hardware vulnerabilities can potentially affect the security properties of confidential-computing technologies. This document lists recently published vulnerabilities and their effect on Privatemode.

In the current version, Privatemode builds on AMD SEV-SNP and the confidential-computing features of the Nvidia H100.

Edgeless Systems, the company behind Privatemode, works closely with hardware vendors to ensure the mitigation of any potential hardware vulnerabilities ahead of time.

Mitigation status

VulnerabilityCVEAffected hardwarePotential impact (unmitigated)Privatemode mitigation statusPrivatemode mitigation description
Heracles-AMD SEV-SNPReads from CVM memory for advanced attacker with root-level access to hostMitigated ✅Combination of: (1) firmware patch from AMD, (2) kernel patch from Edgeless Systems, (3) corresponding client-side verification of remote attestation
BadRAMCVE-2024-21944AMD SEV-SNPAccess to CVM memory for advanced attacker with hardware access and root-level access to hostMitigated ✅Firmware patch from AMD
Battering RAM-AMD SEV-SNPAccess to CVM memory for advanced attacker with hardware access and root-level access to hostMitigated ✅Attack only works for DDR4 RAM. Privatemode only uses 4th Gen AMD EPYC CPUs, which require DDR5. This is verified on the client via remote attestation.
RMPocalypseCVE-2025-0033AMD SEV-SNPAccess to CVM memory for advanced attacker with root-level access to hostMitigated ✅Firmware patch from AMD
note

The presence of firmware patches on the server side is verified on the client via remote attestation.