Lucene search

K
cve[email protected]CVE-2021-26311
HistoryMay 13, 2021 - 12:15 p.m.

CVE-2021-26311

2021-05-1312:15:07
CWE-77
web.nvd.nist.gov
26
2
cve-2021-26311
amd
sev
sev-es
attestation mechanism
memory rearrangement
arbitrary code execution
hypervisor security
nvd

9 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

SINGLE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:S/C:C/I:C/A:C

7.2 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

HIGH

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H

7.2 High

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

40.1%

In the AMD SEV/SEV-ES feature, memory can be rearranged in the guest address space that is not detected by the attestation mechanism which could be used by a malicious hypervisor to potentially lead to arbitrary code execution within the guest VM if a malicious administrator has access to compromise the server hypervisor.

Affected configurations

NVD
Node
amdepyc_7232pMatch-
OR
amdepyc_7251Match-
OR
amdepyc_7252Match-
OR
amdepyc_7261Match-
OR
amdepyc_7262Match-
OR
amdepyc_7272Match-
OR
amdepyc_7281Match-
OR
amdepyc_7282Match-
OR
amdepyc_72f3Match-
OR
amdepyc_7301Match-
OR
amdepyc_7302Match-
OR
amdepyc_7302pMatch-
OR
amdepyc_7313Match-
OR
amdepyc_7313pMatch-
OR
amdepyc_7343Match-
OR
amdepyc_7351Match-
OR
amdepyc_7351pMatch-
OR
amdepyc_7352Match-
OR
amdepyc_7371Match-
OR
amdepyc_73f3Match-
OR
amdepyc_7401Match-
OR
amdepyc_7401pMatch-
OR
amdepyc_7402Match-
OR
amdepyc_7402pMatch-
OR
amdepyc_7413Match-
OR
amdepyc_7443Match-
OR
amdepyc_7443pMatch-
OR
amdepyc_7451Match-
OR
amdepyc_7452Match-
OR
amdepyc_7453Match-
OR
amdepyc_74f3Match-
OR
amdepyc_7501Match-
OR
amdepyc_7502Match-
OR
amdepyc_7502pMatch-
OR
amdepyc_7513Match-
OR
amdepyc_7532Match-
OR
amdepyc_7542Match-
OR
amdepyc_7543Match-
OR
amdepyc_7543pMatch-
OR
amdepyc_7551Match-
OR
amdepyc_7551pMatch-
OR
amdepyc_7552Match-
OR
amdepyc_75f3Match-
OR
amdepyc_7601Match-
OR
amdepyc_7642Match-
OR
amdepyc_7643Match-
OR
amdepyc_7662Match-
OR
amdepyc_7663Match-
OR
amdepyc_7702Match-
OR
amdepyc_7702pMatch-
OR
amdepyc_7713Match-
OR
amdepyc_7713pMatch-
OR
amdepyc_7742Match-
OR
amdepyc_7763Match-
OR
amdepyc_7f32Match-
OR
amdepyc_7f52Match-
OR
amdepyc_7f72Match-
OR
amdepyc_7h12Match-
OR
amdepyc_embedded_3101Match-
OR
amdepyc_embedded_3151Match-
OR
amdepyc_embedded_3201Match-
OR
amdepyc_embedded_3251Match-
OR
amdepyc_embedded_3255Match-
OR
amdepyc_embedded_3351Match-
OR
amdepyc_embedded_3451Match-

CNA Affected

[
  {
    "product": "SEV/SEV-ES",
    "vendor": "AMD",
    "versions": [
      {
        "lessThan": "SEV-SNP",
        "status": "affected",
        "version": "unspecified",
        "versionType": "custom"
      }
    ]
  }
]

Social References

More

9 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

SINGLE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:S/C:C/I:C/A:C

7.2 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

HIGH

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H

7.2 High

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

40.1%

Related for CVE-2021-26311