Vulnerability Name: | CVE-2021-26311 (CCN-202067) |
Assigned: | 2021-05-11 |
Published: | 2021-05-11 |
Updated: | 2021-05-25 |
Summary: | In the AMD SEV/SEV-ES feature, memory can be rearranged in the guest address space that is not detected by the attestation mechanism which could be used by a malicious hypervisor to potentially lead to arbitrary code execution within the guest VM if a malicious administrator has access to compromise the server hypervisor.
|
CVSS v3 Severity: | 7.2 High (CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H) 6.3 Medium (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C)Exploitability Metrics: | Attack Vector (AV): Network Attack Complexity (AC): Low Privileges Required (PR): High User Interaction (UI): None | Scope: | Scope (S): Unchanged
| Impact Metrics: | Confidentiality (C): High Integrity (I): High Availibility (A): High | 7.2 High (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H) 6.3 Medium (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C)Exploitability Metrics: | Attack Vector (AV): Network Attack Complexity (AC): Low Privileges Required (PR): High User Interaction (UI): None | Scope: | Scope (S): Unchanged
| Impact Metrics: | Confidentiality (C): High Integrity (I): High Availibility (A): High |
|
CVSS v2 Severity: | 9.0 High (CVSS v2 Vector: AV:N/AC:L/Au:S/C:C/I:C/A:C)Exploitability Metrics: | Access Vector (AV): Network Access Complexity (AC): Low Authentication (Au): Single_Instance | Impact Metrics: | Confidentiality (C): Complete Integrity (I): Complete Availibility (A): Complete | 9.0 High (CCN CVSS v2 Vector: AV:N/AC:L/Au:S/C:C/I:C/A:C)Exploitability Metrics: | Access Vector (AV): Network Access Complexity (AC): Low Athentication (Au): Single_Instance
| Impact Metrics: | Confidentiality (C): Complete Integrity (I): Complete Availibility (A): Complete |
|
Vulnerability Type: | CWE-77
|
Vulnerability Consequences: | Gain Access |
References: | Source: MITRE Type: CNA CVE-2021-26311
Source: XF Type: UNKNOWN amd-cve202126311-code-exec(202067)
Source: CCN Type: AMD web site AMD Secure Encrypted Virtualization
Source: MISC Type: Vendor Advisory https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1004
|
Vulnerable Configuration: | Configuration 1: cpe:/h:amd:epyc_7232p:-:*:*:*:*:*:*:*OR cpe:/h:amd:epyc_7251:-:*:*:*:*:*:*:*OR cpe:/h:amd:epyc_7252:-:*:*:*:*:*:*:*OR cpe:/h:amd:epyc_7261:-:*:*:*:*:*:*:*OR cpe:/h:amd:epyc_7262:-:*:*:*:*:*:*:*OR cpe:/h:amd:epyc_7272:-:*:*:*:*:*:*:*OR cpe:/h:amd:epyc_7281:-:*:*:*:*:*:*:*OR cpe:/h:amd:epyc_7282:-:*:*:*:*:*:*:*OR cpe:/h:amd:epyc_72f3:-:*:*:*:*:*:*:*OR cpe:/h:amd:epyc_7301:-:*:*:*:*:*:*:*OR cpe:/h:amd:epyc_7302:-:*:*:*:*:*:*:*OR cpe:/h:amd:epyc_7302p:-:*:*:*:*:*:*:*OR cpe:/h:amd:epyc_7313:-:*:*:*:*:*:*:*OR cpe:/h:amd:epyc_7313p:-:*:*:*:*:*:*:*OR cpe:/h:amd:epyc_7343:-:*:*:*:*:*:*:*OR cpe:/h:amd:epyc_7351:-:*:*:*:*:*:*:*OR cpe:/h:amd:epyc_7351p:-:*:*:*:*:*:*:*OR cpe:/h:amd:epyc_7352:-:*:*:*:*:*:*:*OR cpe:/h:amd:epyc_7371:-:*:*:*:*:*:*:*OR cpe:/h:amd:epyc_73f3:-:*:*:*:*:*:*:*OR cpe:/h:amd:epyc_7401:-:*:*:*:*:*:*:*OR cpe:/h:amd:epyc_7401p:-:*:*:*:*:*:*:*OR cpe:/h:amd:epyc_7402:-:*:*:*:*:*:*:*OR cpe:/h:amd:epyc_7402p:-:*:*:*:*:*:*:*OR cpe:/h:amd:epyc_7413:-:*:*:*:*:*:*:*OR cpe:/h:amd:epyc_7443:-:*:*:*:*:*:*:*OR cpe:/h:amd:epyc_7443p:-:*:*:*:*:*:*:*OR cpe:/h:amd:epyc_7451:-:*:*:*:*:*:*:*OR cpe:/h:amd:epyc_7452:-:*:*:*:*:*:*:*OR cpe:/h:amd:epyc_7453:-:*:*:*:*:*:*:*OR cpe:/h:amd:epyc_74f3:-:*:*:*:*:*:*:*OR cpe:/h:amd:epyc_7501:-:*:*:*:*:*:*:*OR cpe:/h:amd:epyc_7502:-:*:*:*:*:*:*:*OR cpe:/h:amd:epyc_7502p:-:*:*:*:*:*:*:*OR cpe:/h:amd:epyc_7513:-:*:*:*:*:*:*:*OR cpe:/h:amd:epyc_7532:-:*:*:*:*:*:*:*OR cpe:/h:amd:epyc_7542:-:*:*:*:*:*:*:*OR cpe:/h:amd:epyc_7543:-:*:*:*:*:*:*:*OR cpe:/h:amd:epyc_7543p:-:*:*:*:*:*:*:*OR cpe:/h:amd:epyc_7551:-:*:*:*:*:*:*:*OR cpe:/h:amd:epyc_7551p:-:*:*:*:*:*:*:*OR cpe:/h:amd:epyc_7552:-:*:*:*:*:*:*:*OR cpe:/h:amd:epyc_75f3:-:*:*:*:*:*:*:*OR cpe:/h:amd:epyc_7601:-:*:*:*:*:*:*:*OR cpe:/h:amd:epyc_7642:-:*:*:*:*:*:*:*OR cpe:/h:amd:epyc_7643:-:*:*:*:*:*:*:*OR cpe:/h:amd:epyc_7662:-:*:*:*:*:*:*:*OR cpe:/h:amd:epyc_7663:-:*:*:*:*:*:*:*OR cpe:/h:amd:epyc_7702:-:*:*:*:*:*:*:*OR cpe:/h:amd:epyc_7702p:-:*:*:*:*:*:*:*OR cpe:/h:amd:epyc_7713:-:*:*:*:*:*:*:*OR cpe:/h:amd:epyc_7713p:-:*:*:*:*:*:*:*OR cpe:/h:amd:epyc_7742:-:*:*:*:*:*:*:*OR cpe:/h:amd:epyc_7763:-:*:*:*:*:*:*:*OR cpe:/h:amd:epyc_7f32:-:*:*:*:*:*:*:*OR cpe:/h:amd:epyc_7f52:-:*:*:*:*:*:*:*OR cpe:/h:amd:epyc_7f72:-:*:*:*:*:*:*:*OR cpe:/h:amd:epyc_7h12:-:*:*:*:*:*:*:*OR cpe:/h:amd:epyc_embedded_3101:-:*:*:*:*:*:*:*OR cpe:/h:amd:epyc_embedded_3151:-:*:*:*:*:*:*:*OR cpe:/h:amd:epyc_embedded_3201:-:*:*:*:*:*:*:*OR cpe:/h:amd:epyc_embedded_3251:-:*:*:*:*:*:*:*OR cpe:/h:amd:epyc_embedded_3255:-:*:*:*:*:*:*:*OR cpe:/h:amd:epyc_embedded_3351:-:*:*:*:*:*:*:*OR cpe:/h:amd:epyc_embedded_3451:-:*:*:*:*:*:*:*
Denotes that component is vulnerable |
BACK |