Lucene search

K

CVE-2021-26321

🗓️ 16 Nov 2021 19:07:15Reported by AMDType 
cve
 cve
🔗 web.nvd.nist.gov👁 26 Views

Insufficient ID command validation in SEV Firmware allows for local denial of servic

Show more
Related
Detection
Affected
Refs
ReporterTitlePublishedViews
Family
CNVD
HP ProLiant Command Injection Vulnerability
10 Dec 202100:00
cnvd
NVD
CVE-2021-26321
16 Nov 202119:15
nvd
Cvelist
CVE-2021-26321
16 Nov 202118:07
cvelist
Prion
Command injection
16 Nov 202119:15
prion
Amd
AMD Server Vulnerabilities – November 2021
8 Nov 202100:00
amd
Nvd
Node
amdepyc_7601_firmwareRange<naplespi-sp3_1.0.0.g
AND
Node
amdepyc_7551p_firmwareRange<naplespi-sp3_1.0.0.g
AND
Node
amdepyc_7551_firmwareRange<naplespi-sp3_1.0.0.g
AND
Node
amdepyc_7501_firmwareRange<naplespi-sp3_1.0.0.g
AND
Node
amdepyc_7451_firmwareRange<naplespi-sp3_1.0.0.g
AND
Node
amdepyc_7401_firmwareRange<naplespi-sp3_1.0.0.g
AND
Node
amdepyc_7371_firmwareRange<naplespi-sp3_1.0.0.g
AND
Node
amdepyc_7351p_firmwareRange<naplespi-sp3_1.0.0.g
AND
Node
amdepyc_7351_firmwareRange<naplespi-sp3_1.0.0.g
AND
Node
amdepyc_7301_firmwareRange<naplespi-sp3_1.0.0.g
AND
Node
amdepyc_7281_firmwareRange<naplespi-sp3_1.0.0.g
AND
Node
amdepyc_7261_firmwareRange<naplespi-sp3_1.0.0.g
AND
Node
amdepyc_7251_firmwareRange<naplespi-sp3_1.0.0.g
AND
Node
amdepyc_7f72_firmwareRange<romepi-sp3_1.0.0.c
AND
Node
amdepyc_7f52_firmwareRange<romepi-sp3_1.0.0.c
AND
Node
amdepyc_7f32_firmwareRange<romepi-sp3_1.0.0.c
AND
Node
amdepyc_7h12_firmwareRange<romepi-sp3_1.0.0.c
AND
Node
amdepyc_7742_firmwareRange<romepi-sp3_1.0.0.c
AND
Node
amdepyc_7702_firmwareRange<romepi-sp3_1.0.0.c
AND
Node
amdepyc_7702p_firmwareRange<romepi-sp3_1.0.0.c
AND
Node
amdepyc_7662_firmwareRange<romepi-sp3_1.0.0.c
AND
Node
amdepyc_7642_firmwareRange<romepi-sp3_1.0.0.c
AND
Node
amdepyc_7552_firmwareRange<romepi-sp3_1.0.0.c
AND
Node
amdepyc_7542_firmwareRange<romepi-sp3_1.0.0.c
AND
Node
amdepyc_7532_firmwareRange<romepi-sp3_1.0.0.c
AND
Node
amdepyc_7502_firmwareRange<romepi-sp3_1.0.0.c
AND
Node
amdepyc_7502p_firmwareRange<romepi-sp3_1.0.0.c
AND
Node
amdepyc_7452_firmwareRange<romepi-sp3_1.0.0.c
AND
Node
amdepyc_7402_firmwareRange<romepi-sp3_1.0.0.c
AND
Node
amdepyc_7402p_firmwareRange<romepi-sp3_1.0.0.c
AND
Node
amdepyc_7352_firmwareRange<romepi-sp3_1.0.0.c
AND
Node
amdepyc_7302_firmwareRange<romepi-sp3_1.0.0.c
AND
Node
amdepyc_7302p_firmwareRange<romepi-sp3_1.0.0.c
AND
Node
amdepyc_7282_firmwareRange<romepi-sp3_1.0.0.c
AND
Node
amdepyc_7272_firmwareRange<romepi-sp3_1.0.0.c
AND
Node
amdepyc_7262_firmwareRange<romepi-sp3_1.0.0.c
AND
Node
amdepyc_7252_firmwareRange<romepi-sp3_1.0.0.c
AND
Node
amdepyc_7232p_firmwareRange<romepi-sp3_1.0.0.c
AND
Node
amdepyc_7763_firmwareRange<milanpi-sp3_1.0.0.4
AND
Node
amdepyc_7713p_firmwareRange<milanpi-sp3_1.0.0.4
AND
Node
amdepyc_7713_firmwareRange<milanpi-sp3_1.0.0.4
AND
Node
amdepyc_7663_firmwareRange<milanpi-sp3_1.0.0.4
AND
Node
amdepyc_7643_firmwareRange<milanpi-sp3_1.0.0.4
AND
Node
amdepyc_75f3_firmwareRange<milanpi-sp3_1.0.0.4
AND
Node
amdepyc_7543p_firmwareRange<milanpi-sp3_1.0.0.4
AND
Node
amdepyc_7543_firmwareRange<milanpi-sp3_1.0.0.4
AND
Node
amdepyc_7513_firmwareRange<milanpi-sp3_1.0.0.4
AND
Node
amdepyc_7453_firmwareRange<milanpi-sp3_1.0.0.4
AND
Node
amdepyc_74f3_firmwareRange<milanpi-sp3_1.0.0.4
AND
Node
amdepyc_7443p_firmwareRange<milanpi-sp3_1.0.0.4
AND
Node
amdepyc_7443_firmwareRange<milanpi-sp3_1.0.0.4
AND
Node
amdepyc_7413_firmwareRange<milanpi-sp3_1.0.0.4
AND
Node
amdepyc_73f3_firmwareRange<milanpi-sp3_1.0.0.4
AND
Node
amdepyc_7343_firmwareRange<milanpi-sp3_1.0.0.4
AND
Node
amdepyc_7313p_firmwareRange<milanpi-sp3_1.0.0.4
AND
Node
amdepyc_7313_firmwareRange<milanpi-sp3_1.0.0.4
AND
Node
amdepyc_72f3_firmwareRange<milanpi-sp3_1.0.0.4
AND
[
  {
    "product": "1st Gen AMD EPYC™",
    "vendor": "AMD",
    "versions": [
      {
        "lessThan": "NaplesPI-SP3_1.0.0.G",
        "status": "affected",
        "version": "unspecified",
        "versionType": "custom"
      }
    ]
  },
  {
    "product": "2nd Gen AMD EPYC™",
    "vendor": "AMD",
    "versions": [
      {
        "lessThan": "RomePI-SP3_1.0.0.C",
        "status": "affected",
        "version": "unspecified",
        "versionType": "custom"
      }
    ]
  },
  {
    "product": "3rd Gen AMD EPYC™",
    "vendor": "AMD",
    "versions": [
      {
        "lessThan": "MilanPI-SP3_1.0.0.4",
        "status": "affected",
        "version": "unspecified",
        "versionType": "custom"
      }
    ]
  }
]

Transform Your Security Services

Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.

Book a live demo
16 Nov 2021 19:15Current
5.5Medium risk
Vulners AI Score5.5
CVSS24.9
CVSS35.5
EPSS0.000
26
.json
Report