Lucene search

K
cveAMDCVE-2021-26323
HistoryNov 16, 2021 - 7:15 p.m.

CVE-2021-26323

2021-11-1619:15:07
CWE-20
AMD
web.nvd.nist.gov
29
cve-2021-26323
sev commands
snp
memory integrity
nvd

CVSS2

4.6

Attack Vector

LOCAL

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:L/AC:L/Au:N/C:P/I:P/A:P

CVSS3

7.8

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

AI Score

7.5

Confidence

High

EPSS

0

Percentile

12.6%

Failure to validate SEV Commands while SNP is active may result in a potential impact to memory integrity.

Affected configurations

Nvd
Node
amdepyc_7232p_firmwareRange<romepi-sp3_1.0.0.c
AND
amdepyc_7232pMatch-
Node
amdepyc_7763_firmwareRange<milanpi-sp3_1.0.0.4
AND
amdepyc_7763Match-
Node
amdepyc_7713p_firmwareRange<milanpi-sp3_1.0.0.4
AND
amdepyc_7713pMatch-
Node
amdepyc_7713_firmwareRange<milanpi-sp3_1.0.0.4
AND
amdepyc_7713Match-
Node
amdepyc_7663_firmwareRange<milanpi-sp3_1.0.0.4
AND
amdepyc_7663Match-
Node
amdepyc_7643_firmwareRange<milanpi-sp3_1.0.0.4
AND
amdepyc_7643Match-
Node
amdepyc_75f3_firmwareRange<milanpi-sp3_1.0.0.4
AND
amdepyc_75f3Match-
Node
amdepyc_7543p_firmwareRange<milanpi-sp3_1.0.0.4
AND
amdepyc_7543pMatch-
Node
amdepyc_7543_firmwareRange<milanpi-sp3_1.0.0.4
AND
amdepyc_7543Match-
Node
amdepyc_7513_firmwareRange<milanpi-sp3_1.0.0.4
AND
amdepyc_7513Match-
Node
amdepyc_7453_firmwareRange<milanpi-sp3_1.0.0.4
AND
amdepyc_7453Match-
Node
amdepyc_74f3_firmwareRange<milanpi-sp3_1.0.0.4
AND
amdepyc_74f3Match-
Node
amdepyc_7443pMatch-
AND
amdepyc_7443p_firmwareRange<milanpi-sp3_1.0.0.4
Node
amdepyc_7443Match-
AND
amdepyc_7443_firmwareRange<milanpi-sp3_1.0.0.4
Node
amdepyc_7413Match-
AND
amdepyc_7413_firmwareRange<milanpi-sp3_1.0.0.4
Node
amdepyc_73f3Match-
AND
amdepyc_73f3_firmwareRange<milanpi-sp3_1.0.0.4
Node
amdepyc_7343_firmwareRange<milanpi-sp3_1.0.0.4
AND
amdepyc_7343Match-
Node
amdepyc_7313p_firmwareRange<milanpi-sp3_1.0.0.4
AND
amdepyc_7313pMatch-
Node
amdepyc_7313_firmwareRange<milanpi-sp3_1.0.0.4
AND
amdepyc_7313Match-
Node
amdepyc_72f3_firmwareRange<milanpi-sp3_1.0.0.4
AND
amdepyc_72f3Match-
VendorProductVersionCPE
amdepyc_7232p_firmware*cpe:2.3:o:amd:epyc_7232p_firmware:*:*:*:*:*:*:*:*
amdepyc_7232p-cpe:2.3:h:amd:epyc_7232p:-:*:*:*:*:*:*:*
amdepyc_7763_firmware*cpe:2.3:o:amd:epyc_7763_firmware:*:*:*:*:*:*:*:*
amdepyc_7763-cpe:2.3:h:amd:epyc_7763:-:*:*:*:*:*:*:*
amdepyc_7713p_firmware*cpe:2.3:o:amd:epyc_7713p_firmware:*:*:*:*:*:*:*:*
amdepyc_7713p-cpe:2.3:h:amd:epyc_7713p:-:*:*:*:*:*:*:*
amdepyc_7713_firmware*cpe:2.3:o:amd:epyc_7713_firmware:*:*:*:*:*:*:*:*
amdepyc_7713-cpe:2.3:h:amd:epyc_7713:-:*:*:*:*:*:*:*
amdepyc_7663_firmware*cpe:2.3:o:amd:epyc_7663_firmware:*:*:*:*:*:*:*:*
amdepyc_7663-cpe:2.3:h:amd:epyc_7663:-:*:*:*:*:*:*:*
Rows per page:
1-10 of 401

CNA Affected

[
  {
    "product": "3rd Gen AMD EPYC™",
    "vendor": "AMD",
    "versions": [
      {
        "lessThan": "MilanPI-SP3_1.0.0.4",
        "status": "affected",
        "version": "unspecified",
        "versionType": "custom"
      }
    ]
  }
]

CVSS2

4.6

Attack Vector

LOCAL

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:L/AC:L/Au:N/C:P/I:P/A:P

CVSS3

7.8

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

AI Score

7.5

Confidence

High

EPSS

0

Percentile

12.6%

Related for CVE-2021-26323