Lucene search

K
nvd[email protected]NVD:CVE-2021-26406
HistoryMay 09, 2023 - 7:15 p.m.

CVE-2021-26406

2023-05-0919:15:10
web.nvd.nist.gov
1
insufficient validation
oca certificates
sev
sev-es
host crash
denial of service

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

7.7 High

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

36.3%

Insufficient validation in parsing Owner’s
Certificate Authority (OCA) certificates in SEV (AMD Secure Encrypted Virtualization)
and SEV-ES user application can lead to a host crash potentially resulting in
denial of service.

Affected configurations

NVD
Node
amdepyc_7232p_firmwareMatchromepi_1.0.0.a
AND
amdepyc_7232pMatch-
Node
amdepyc_7252_firmwareMatchromepi_1.0.0.a
AND
amdepyc_7252Match-
Node
amdepyc_7262_firmwareMatchromepi_1.0.0.a
AND
amdepyc_7262Match-
Node
amdepyc_7272_firmwareMatchromepi_1.0.0.a
AND
amdepyc_7272Match-
Node
amdepyc_7282_firmwareMatchromepi_1.0.0.a
AND
amdepyc_7282Match-
Node
amdepyc_7302_firmwareMatchromepi_1.0.0.a
AND
amdepyc_7302Match-
Node
amdepyc_7302p_firmwareMatchromepi_1.0.0.a
AND
amdepyc_7302pMatch-
Node
amdepyc_7352_firmwareMatchromepi_1.0.0.a
AND
amdepyc_7352Match-
Node
amdepyc_7402_firmwareMatchromepi_1.0.0.a
AND
amdepyc_7402Match-
Node
amdepyc_7402p_firmwareMatchromepi_1.0.0.a
AND
amdepyc_7402pMatch-
Node
amdepyc_7452_firmwareMatchromepi_1.0.0.a
AND
amdepyc_7452Match-
Node
amdepyc_7502_firmwareMatchromepi_1.0.0.a
AND
amdepyc_7502Match-
Node
amdepyc_7502p_firmwareMatchromepi_1.0.0.a
AND
amdepyc_7502pMatch-
Node
amdepyc_7532_firmwareMatchromepi_1.0.0.a
AND
amdepyc_7532Match-
Node
amdepyc_7542_firmwareMatchromepi_1.0.0.a
AND
amdepyc_7542Match-
Node
amdepyc_7552_firmwareMatchromepi_1.0.0.a
AND
amdepyc_7552Match-
Node
amdepyc_7642_firmwareMatchromepi_1.0.0.a
AND
amdepyc_7642Match-
Node
amdepyc_7662_firmwareMatchromepi_1.0.0.a
AND
amdepyc_7662Match-
Node
amdepyc_7702_firmwareMatchromepi_1.0.0.a
AND
amdepyc_7702Match-
Node
amdepyc_7702p_firmwareMatchromepi_1.0.0.a
AND
amdepyc_7702pMatch-
Node
amdepyc_7742_firmwareMatchromepi_1.0.0.a
AND
amdepyc_7742Match-
Node
amdepyc_7f32_firmwareMatchromepi_1.0.0.a
AND
amdepyc_7f32Match-
Node
amdepyc_7f52_firmwareMatchromepi_1.0.0.a
AND
amdepyc_7f52Match-
Node
amdepyc_7f72_firmwareMatchromepi_1.0.0.a
AND
amdepyc_7f72Match-
Node
amdepyc_7h12_firmwareMatchromepi_1.0.0.a
AND
amdepyc_7h12Match-
Node
amdepyc_7251_firmwareMatchnaplespi_1.0.0.e
AND
amdepyc_7251Match-
Node
amdepyc_7261_firmwareMatchnaplespi_1.0.0.e
AND
amdepyc_7261Match-
Node
amdepyc_7281_firmwareMatchnaplespi_1.0.0.e
AND
amdepyc_7281Match-
Node
amdepyc_7301_firmwareMatchnaplespi_1.0.0.e
AND
amdepyc_7301Match-
Node
amdepyc_7351_firmwareMatchnaplespi_1.0.0.e
AND
amdepyc_7351Match-
Node
amdepyc_7351p_firmwareMatchnaplespi_1.0.0.e
AND
amdepyc_7351pMatch-
Node
amdepyc_7371_firmwareMatchnaplespi_1.0.0.e
AND
amdepyc_7371Match-
Node
amdepyc_7401_firmwareMatchnaplespi_1.0.0.e
AND
amdepyc_7401Match-
Node
amdepyc_7401p_firmwareMatchnaplespi_1.0.0.e
AND
amdepyc_7401pMatch-
Node
amdepyc_7451_firmwareMatchnaplespi_1.0.0.e
AND
amdepyc_7451Match-
Node
amdepyc_7501_firmwareMatchnaplespi_1.0.0.e
AND
amdepyc_7501Match-
Node
amdepyc_7551_firmwareMatchnaplespi_1.0.0.e
AND
amdepyc_7551Match-
Node
amdepyc_7551p_firmwareMatchnaplespi_1.0.0.e
AND
amdepyc_7551pMatch-
Node
amdepyc_7571_firmwareMatchnaplespi_1.0.0.e
AND
amdepyc_7571Match-
Node
amdepyc_7601_firmwareMatchnaplespi_1.0.0.e
AND
amdepyc_7601Match-

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

7.7 High

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

36.3%

Related for NVD:CVE-2021-26406