Lucene search

K
cve[email protected]CVE-2021-26349
HistoryMay 11, 2022 - 5:15 p.m.

CVE-2021-26349

2022-05-1117:15:08
web.nvd.nist.gov
59
4
cve-2021-26349
vulnerability
security
report id
sev-snp
guest vm
migration agent
nvd

2.1 Low

CVSS2

Attack Vector

LOCAL

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:L/AC:L/Au:N/C:N/I:P/A:N

5.5 Medium

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N

5.8 Medium

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

12.7%

Failure to assign a new report ID to an imported guest may potentially result in an SEV-SNP guest VM being tricked into trusting a dishonest Migration Agent (MA).

Affected configurations

NVD
Node
amdepyc_7763_firmwareRange<milanpi-sp3_1.0.0.7
AND
amdepyc_7763Match-
Node
amdepyc_7713p_firmwareRange<milanpi-sp3_1.0.0.7
AND
amdepyc_7713pMatch-
Node
amdepyc_7713_firmwareRange<milanpi-sp3_1.0.0.7
AND
amdepyc_7713Match-
Node
amdepyc_7663_firmwareRange<milanpi-sp3_1.0.0.7
AND
amdepyc_7663Match-
Node
amdepyc_7643_firmwareRange<milanpi-sp3_1.0.0.7
AND
amdepyc_7643Match-
Node
amdepyc_75f3_firmwareRange<milanpi-sp3_1.0.0.7
AND
amdepyc_75f3Match-
Node
amdepyc_7543p_firmwareRange<milanpi-sp3_1.0.0.7
AND
amdepyc_7543pMatch-
Node
amdepyc_7543_firmwareRange<milanpi-sp3_1.0.0.7
AND
amdepyc_7543Match-
Node
amdepyc_7513_firmwareRange<milanpi-sp3_1.0.0.7
AND
amdepyc_7513Match-
Node
amdepyc_7453_firmwareRange<milanpi-sp3_1.0.0.7
AND
amdepyc_7453Match-
Node
amdepyc_74f3_firmwareRange<milanpi-sp3_1.0.0.7
AND
amdepyc_74f3Match-
Node
amdepyc_7443p_firmwareRange<milanpi-sp3_1.0.0.7
AND
amdepyc_7443pMatch-
Node
amdepyc_7443_firmwareRange<milanpi-sp3_1.0.0.7
AND
amdepyc_7443Match-
Node
amdepyc_7413_firmwareRange<milanpi-sp3_1.0.0.7
AND
amdepyc_7413Match-
Node
amdepyc_73f3_firmwareRange<milanpi-sp3_1.0.0.7
AND
amdepyc_73f3Match-
Node
amdepyc_7343_firmwareRange<milanpi-sp3_1.0.0.7
AND
amdepyc_7343Match-
Node
amdepyc_7313p_firmwareRange<milanpi-sp3_1.0.0.7
AND
amdepyc_7313pMatch-
Node
amdepyc_7313_firmwareRange<milanpi-sp3_1.0.0.7
AND
amdepyc_7313Match-
Node
amdepyc_72f3_firmwareRange<milanpi-sp3_1.0.0.7
AND
amdepyc_72f3Match-
Node
amdepyc_7773x_firmwareRange<milanpi-sp3_1.0.0.7
AND
amdepyc_7773xMatch-
Node
amdepyc_7473x_firmwareRange<milanpi-sp3_1.0.0.7
AND
amdepyc_7473xMatch-
Node
amdepyc_7573x_firmwareRange<milanpi-sp3_1.0.0.7
AND
amdepyc_7573xMatch-
Node
amdepyc_7373x_firmwareRange<milanpi-sp3_1.0.0.7
AND
amdepyc_7373xMatch-

CNA Affected

[
  {
    "product": " EPYC™ Processors ",
    "vendor": "AMD",
    "versions": [
      {
        "status": "affected",
        "version": "various "
      }
    ]
  }
]

Social References

More

2.1 Low

CVSS2

Attack Vector

LOCAL

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:L/AC:L/Au:N/C:N/I:P/A:N

5.5 Medium

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N

5.8 Medium

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

12.7%