CVE-2021-26311

CVSS V2 High 9 CVSS V3 High 7.2
Description
In the AMD SEV/SEV-ES feature, memory can be rearranged in the guest address space that is not detected by the attestation mechanism which could be used by a malicious hypervisor to potentially lead to arbitrary code execution within the guest VM if a malicious administrator has access to compromise the server hypervisor.
Overview
  • CVE ID
  • CVE-2021-26311
  • Assigner
  • psirt@amd.com
  • Vulnerability Status
  • Analyzed
  • Published Version
  • 2021-05-13T12:15:07
  • Last Modified Date
  • 2021-05-25T14:49:38
CPE Configuration (Product)
CPE Vulnerable Operator Version Start Version End
cpe:2.3:h:amd:epyc_7232p:-:*:*:*:*:*:*:* 1 OR
cpe:2.3:h:amd:epyc_7251:-:*:*:*:*:*:*:* 1 OR
cpe:2.3:h:amd:epyc_7252:-:*:*:*:*:*:*:* 1 OR
cpe:2.3:h:amd:epyc_7261:-:*:*:*:*:*:*:* 1 OR
cpe:2.3:h:amd:epyc_7262:-:*:*:*:*:*:*:* 1 OR
cpe:2.3:h:amd:epyc_7272:-:*:*:*:*:*:*:* 1 OR
cpe:2.3:h:amd:epyc_7281:-:*:*:*:*:*:*:* 1 OR
cpe:2.3:h:amd:epyc_7282:-:*:*:*:*:*:*:* 1 OR
cpe:2.3:h:amd:epyc_72f3:-:*:*:*:*:*:*:* 1 OR
cpe:2.3:h:amd:epyc_7301:-:*:*:*:*:*:*:* 1 OR
cpe:2.3:h:amd:epyc_7302:-:*:*:*:*:*:*:* 1 OR
cpe:2.3:h:amd:epyc_7302p:-:*:*:*:*:*:*:* 1 OR
cpe:2.3:h:amd:epyc_7313:-:*:*:*:*:*:*:* 1 OR
cpe:2.3:h:amd:epyc_7313p:-:*:*:*:*:*:*:* 1 OR
cpe:2.3:h:amd:epyc_7343:-:*:*:*:*:*:*:* 1 OR
cpe:2.3:h:amd:epyc_7351:-:*:*:*:*:*:*:* 1 OR
cpe:2.3:h:amd:epyc_7351p:-:*:*:*:*:*:*:* 1 OR
cpe:2.3:h:amd:epyc_7352:-:*:*:*:*:*:*:* 1 OR
cpe:2.3:h:amd:epyc_7371:-:*:*:*:*:*:*:* 1 OR
cpe:2.3:h:amd:epyc_73f3:-:*:*:*:*:*:*:* 1 OR
cpe:2.3:h:amd:epyc_7401:-:*:*:*:*:*:*:* 1 OR
cpe:2.3:h:amd:epyc_7401p:-:*:*:*:*:*:*:* 1 OR
cpe:2.3:h:amd:epyc_7402:-:*:*:*:*:*:*:* 1 OR
cpe:2.3:h:amd:epyc_7402p:-:*:*:*:*:*:*:* 1 OR
cpe:2.3:h:amd:epyc_7413:-:*:*:*:*:*:*:* 1 OR
cpe:2.3:h:amd:epyc_7443:-:*:*:*:*:*:*:* 1 OR
cpe:2.3:h:amd:epyc_7443p:-:*:*:*:*:*:*:* 1 OR
cpe:2.3:h:amd:epyc_7451:-:*:*:*:*:*:*:* 1 OR
cpe:2.3:h:amd:epyc_7452:-:*:*:*:*:*:*:* 1 OR
cpe:2.3:h:amd:epyc_7453:-:*:*:*:*:*:*:* 1 OR
cpe:2.3:h:amd:epyc_74f3:-:*:*:*:*:*:*:* 1 OR
cpe:2.3:h:amd:epyc_7501:-:*:*:*:*:*:*:* 1 OR
cpe:2.3:h:amd:epyc_7502:-:*:*:*:*:*:*:* 1 OR
cpe:2.3:h:amd:epyc_7502p:-:*:*:*:*:*:*:* 1 OR
cpe:2.3:h:amd:epyc_7513:-:*:*:*:*:*:*:* 1 OR
cpe:2.3:h:amd:epyc_7532:-:*:*:*:*:*:*:* 1 OR
cpe:2.3:h:amd:epyc_7542:-:*:*:*:*:*:*:* 1 OR
cpe:2.3:h:amd:epyc_7543:-:*:*:*:*:*:*:* 1 OR
cpe:2.3:h:amd:epyc_7543p:-:*:*:*:*:*:*:* 1 OR
cpe:2.3:h:amd:epyc_7551:-:*:*:*:*:*:*:* 1 OR
cpe:2.3:h:amd:epyc_7551p:-:*:*:*:*:*:*:* 1 OR
cpe:2.3:h:amd:epyc_7552:-:*:*:*:*:*:*:* 1 OR
cpe:2.3:h:amd:epyc_75f3:-:*:*:*:*:*:*:* 1 OR
cpe:2.3:h:amd:epyc_7601:-:*:*:*:*:*:*:* 1 OR
cpe:2.3:h:amd:epyc_7642:-:*:*:*:*:*:*:* 1 OR
cpe:2.3:h:amd:epyc_7643:-:*:*:*:*:*:*:* 1 OR
cpe:2.3:h:amd:epyc_7662:-:*:*:*:*:*:*:* 1 OR
cpe:2.3:h:amd:epyc_7663:-:*:*:*:*:*:*:* 1 OR
cpe:2.3:h:amd:epyc_7702:-:*:*:*:*:*:*:* 1 OR
cpe:2.3:h:amd:epyc_7702p:-:*:*:*:*:*:*:* 1 OR
cpe:2.3:h:amd:epyc_7713:-:*:*:*:*:*:*:* 1 OR
cpe:2.3:h:amd:epyc_7713p:-:*:*:*:*:*:*:* 1 OR
cpe:2.3:h:amd:epyc_7742:-:*:*:*:*:*:*:* 1 OR
cpe:2.3:h:amd:epyc_7763:-:*:*:*:*:*:*:* 1 OR
cpe:2.3:h:amd:epyc_7f32:-:*:*:*:*:*:*:* 1 OR
cpe:2.3:h:amd:epyc_7f52:-:*:*:*:*:*:*:* 1 OR
cpe:2.3:h:amd:epyc_7f72:-:*:*:*:*:*:*:* 1 OR
cpe:2.3:h:amd:epyc_7h12:-:*:*:*:*:*:*:* 1 OR
cpe:2.3:h:amd:epyc_embedded_3101:-:*:*:*:*:*:*:* 1 OR
cpe:2.3:h:amd:epyc_embedded_3151:-:*:*:*:*:*:*:* 1 OR
cpe:2.3:h:amd:epyc_embedded_3201:-:*:*:*:*:*:*:* 1 OR
cpe:2.3:h:amd:epyc_embedded_3251:-:*:*:*:*:*:*:* 1 OR
cpe:2.3:h:amd:epyc_embedded_3255:-:*:*:*:*:*:*:* 1 OR
cpe:2.3:h:amd:epyc_embedded_3351:-:*:*:*:*:*:*:* 1 OR
cpe:2.3:h:amd:epyc_embedded_3451:-:*:*:*:*:*:*:* 1 OR
CVSS Version 2
  • Version
  • 2.0
  • Vector String
  • AV:N/AC:L/Au:S/C:C/I:C/A:C
  • Access Vector
  • NETWORK
  • Access Compatibility
  • LOW
  • Authentication
  • SINGLE
  • Confidentiality Impact
  • COMPLETE
  • Integrity Impact
  • COMPLETE
  • Availability Impact
  • COMPLETE
  • Base Score
  • 9
  • Severity
  • HIGH
  • Exploitability Score
  • 8
  • Impact Score
  • 10
CVSS Version 3
  • Version
  • 3.1
  • Vector String
  • CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
  • Attack Vector
  • NETWORK
  • Attack Compatibility
  • LOW
  • Privileges Required
  • HIGH
  • User Interaction
  • NONE
  • Scope
  • UNCHANGED
  • Confidentiality Impact
  • HIGH
  • Availability Impact
  • HIGH
  • Base Score
  • 7.2
  • Base Severity
  • HIGH
  • Exploitability Score
  • 1.2
  • Impact Score
  • 5.9
References
Reference URL Reference Tags
https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1004 Vendor Advisory
History
Created Old Value New Value Data Type Notes
2022-05-10 16:14:57 Added to TrackCVE
2022-12-05 02:11:58 2021-05-13T12:15Z 2021-05-13T12:15:07 CVE Published Date updated
2022-12-05 02:11:58 2021-05-25T14:49:38 CVE Modified Date updated
2022-12-05 02:11:58 Analyzed Vulnerability Status updated