Vulnerability Name: | CVE-2021-26313 (CCN-203194) |
Assigned: | 2021-06-08 |
Published: | 2021-06-08 |
Updated: | 2022-08-01 |
Summary: | Potential speculative code store bypass in all supported CPU products, in conjunction with software vulnerabilities relating to speculative execution of overwritten instructions, may cause an incorrect speculation and could result in data leakage.
|
CVSS v3 Severity: | 5.5 Medium (CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N) 4.8 Medium (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C)Exploitability Metrics: | Attack Vector (AV): Local Attack Complexity (AC): Low Privileges Required (PR): Low User Interaction (UI): None | Scope: | Scope (S): Unchanged
| Impact Metrics: | Confidentiality (C): High Integrity (I): None Availibility (A): None | 6.5 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N) 5.7 Medium (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N/E:U/RL:O/RC:C)Exploitability Metrics: | Attack Vector (AV): Local Attack Complexity (AC): Low Privileges Required (PR): Low User Interaction (UI): None | Scope: | Scope (S): Changed
| Impact Metrics: | Confidentiality (C): High Integrity (I): None Availibility (A): None |
|
CVSS v2 Severity: | 2.1 Low (CVSS v2 Vector: AV:L/AC:L/Au:N/C:P/I:N/A:N)Exploitability Metrics: | Access Vector (AV): Local Access Complexity (AC): Low Authentication (Au): None | Impact Metrics: | Confidentiality (C): Partial Integrity (I): None Availibility (A): None | 4.6 Medium (CCN CVSS v2 Vector: AV:L/AC:L/Au:S/C:C/I:N/A:N)Exploitability Metrics: | Access Vector (AV): Local Access Complexity (AC): Low Athentication (Au): Single_Instance
| Impact Metrics: | Confidentiality (C): Complete Integrity (I): None Availibility (A): None |
|
Vulnerability Type: | CWE-203
|
Vulnerability Consequences: | Obtain Information |
References: | Source: MITRE Type: CNA CVE-2021-26313
Source: CCN Type: Xen Security Advisory XSA-375 Speculative Code Store Bypass
Source: XF Type: UNKNOWN xen-cve202126313-info-disc(203194)
Source: MISC Type: Vendor Advisory https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1003
|
Vulnerable Configuration: | Configuration 1: cpe:/o:xen:xen:*:*:*:*:*:*:*:*AND cpe:/h:amd:ryzen_7_2700x:-:*:*:*:*:*:*:*OR cpe:/h:amd:ryzen_threadripper_2990wx:-:*:*:*:*:*:*:*OR cpe:/h:amd:ryzen_5_5600x:-:*:*:*:*:*:*:* Configuration 2: cpe:/h:arm:cortex-a72:-:*:*:*:*:*:*:*OR cpe:/h:broadcom:bcm2711:-:*:*:*:*:*:*:* Configuration 3: cpe:/h:intel:core_i7-7700k:-:*:*:*:*:*:*:*OR cpe:/h:intel:xeon_silver_4214:-:*:*:*:*:*:*:*OR cpe:/h:intel:core_i9-9900k:-:*:*:*:*:*:*:*OR cpe:/h:intel:core_i7-10700k:-:*:*:*:*:*:*:* Configuration 4: cpe:/o:debian:debian_linux:10.0:*:*:*:*:*:*:* Configuration CCN 1: cpe:/a:xensource:xen:*:*:*:*:*:*:*:*
Denotes that component is vulnerable |
BACK |