Search criteria

6 vulnerabilities found for epyc_embedded_3255 by amd

FKIE_CVE-2021-26311

Vulnerability from fkie_nvd - Published: 2021-05-13 12:15 - Updated: 2024-11-21 05:56
Summary
In the AMD SEV/SEV-ES feature, memory can be rearranged in the guest address space that is not detected by the attestation mechanism which could be used by a malicious hypervisor to potentially lead to arbitrary code execution within the guest VM if a malicious administrator has access to compromise the server hypervisor.

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7232p:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "16D55BEF-AFC8-45DC-9401-5DEF374E16C5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:amd:epyc_7251:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "565383C4-F690-4E3B-8A6A-B7D4ACCFAA05",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:amd:epyc_7252:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9B816918-6CCF-4010-AA16-7BF8A93AD7D1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:amd:epyc_7261:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "71ED05E6-8E69-41B9-9A36-CCE2D59A2603",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:amd:epyc_7262:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4FBBFDD3-A85D-43A3-AD67-D69E91C633B6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:amd:epyc_7272:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8F187412-26C2-4D8C-9199-D7CCF49D6520",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:amd:epyc_7281:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "805B4FEA-CFB2-429C-818B-9277B6D546C3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:amd:epyc_7282:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "26FC5683-F612-4586-8BA3-FB1F66D8868B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:amd:epyc_72f3:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7F98FF1A-3A2B-4CED-AEA2-9C4F2AC2D8C1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:amd:epyc_7301:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F65FC5B9-0803-4D7F-8EF6-7B6681418596",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:amd:epyc_7302:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0F7CB05E-C4F4-481F-AFB0-9288EBE6DB62",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:amd:epyc_7302p:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8A2E0AC0-8BDE-49F8-B067-DB03037921DD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:amd:epyc_7313:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B02B61B7-7DD3-4164-8D32-EB961E981BC9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:amd:epyc_7313p:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9000686A-DC2B-4561-9C32-E90890EB2EBA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:amd:epyc_7343:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "71B9C24B-2C10-4826-A91B-E1C60665FBBE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:amd:epyc_7351:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8A5FC951-9FAD-45B4-B7CF-D1A9482507F5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:amd:epyc_7351p:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9BB78361-9AAD-44BD-8B30-65715FEA4C06",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:amd:epyc_7352:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A1540CCD-1ED8-4B4E-AD43-7DE2689D9A21",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:amd:epyc_7371:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FA7576CB-A818-47A1-9A0D-6B8FD105FF08",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:amd:epyc_73f3:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "678C5F58-8AE9-46FF-8F01-4CF394C87A2C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:amd:epyc_7401:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C05F1EF0-3576-4D47-8704-36E9FAB1D432",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:amd:epyc_7401p:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A2E41A87-7A39-4BB2-88E4-16DF0D81BFD2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:amd:epyc_7402:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "430C9955-0090-4166-8E90-D81C2AA7DE0D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:amd:epyc_7402p:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "92EBDDBF-37C2-4D09-B744-F78169B2C1C3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:amd:epyc_7413:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D1766FF1-77A9-4293-B826-F6A8FBD7AFBF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:amd:epyc_7443:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4C474537-3006-41BA-8C3D-5C370E3ACECD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:amd:epyc_7443p:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8E2B13CA-72F4-4CF6-9E12-62E6E9056A14",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:amd:epyc_7451:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "51C8CF00-8FC8-4206-9028-6F104699DE76",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:amd:epyc_7452:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "68ACF30E-62DD-4217-B7F0-4A0FFF47E8EF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:amd:epyc_7453:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "241E39FF-FE66-444C-A4C2-3D28C45341BE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:amd:epyc_74f3:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "02D08121-DC57-47D7-8214-23A209F0AF08",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:amd:epyc_7501:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4E8BAB73-6F45-49AB-8F00-49A488006F3E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:amd:epyc_7502:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "49BBC687-5C3C-4843-A028-B8BE29D1E302",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:amd:epyc_7502p:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "563708A3-7C51-4693-B02D-9A25A639FE42",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:amd:epyc_7513:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F8264DF4-47B4-4716-AE89-44AFA870D385",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:amd:epyc_7532:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1EDABE45-F529-453C-92DC-BF7747CEEC0E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:amd:epyc_7542:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BC94B03B-A7FE-47AE-969D-FFEF278A7A9B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:amd:epyc_7543:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "52544912-FAA3-4025-A5FD-151B21CEC53B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:amd:epyc_7543p:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "77A0A47B-74A1-4731-92A8-BC10FFE58ECF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:amd:epyc_7551:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1AAB403A-5A36-4DC3-A187-99127CF77BA7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:amd:epyc_7551p:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "01BE5D42-1C62-4381-89E0-8F3264F696EC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:amd:epyc_7552:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7A6C7497-1B63-490F-B8EA-D9F3CB790952",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:amd:epyc_75f3:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EBF0AFED-588A-4EFB-8C90-9280BC3A6720",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:amd:epyc_7601:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "168076CD-1E6D-4328-AB59-4C1A90735AC4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:amd:epyc_7642:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1EDF8A1E-B259-43D0-A56C-8C2BB688A32C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:amd:epyc_7643:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "98E1D79D-0CB0-4FD9-8A82-27CDFBFE07B2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:amd:epyc_7662:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3E8C6528-9100-41D2-88A2-FFEABAB8F86A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:amd:epyc_7663:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A7DFCB62-6CDF-4AD2-9265-1887E5780CA5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:amd:epyc_7702:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8AC99346-DBF1-4060-8E6B-35D315944ADA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:amd:epyc_7702p:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "72C86198-0BD4-42E1-974B-70A49F82C411",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:amd:epyc_7713:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4D698D3E-BB05-4C65-90F4-8DAE275CD6A4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:amd:epyc_7713p:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2299ED50-B4D2-4BB3-AD87-56D552B84AE1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:amd:epyc_7742:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "88F4A126-B4A6-480A-9DD7-7F68714DFB49",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:amd:epyc_7763:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4F900BDD-F094-41A6-9A23-31F53DBA95D4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:amd:epyc_7f32:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E25652AB-E243-4C40-BE12-AB53AF52CD61",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:amd:epyc_7f52:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "87543FB4-658A-4300-9DC9-836AC1D4BCFB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:amd:epyc_7f72:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "07B3C659-C31A-4F82-9587-9F8A943F637D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:amd:epyc_7h12:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "89FAAD8C-6DD1-408D-849B-0CE707321B13",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:amd:epyc_embedded_3101:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "839C6991-D387-471D-9112-C79677D5A5AB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:amd:epyc_embedded_3151:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3480338B-290F-4E9C-88F9-A4160853B9BD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:amd:epyc_embedded_3201:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6943C2EC-1555-40B8-9533-BBB6572E9073",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:amd:epyc_embedded_3251:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "44A54822-42B0-47B4-A080-416D5C8AC20C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:amd:epyc_embedded_3255:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2F8DDDB3-E4B0-4354-955F-E2196E404970",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:amd:epyc_embedded_3351:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4C3B6175-0366-473D-A82F-E3F1373C74F5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:amd:epyc_embedded_3451:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C38BB8F3-11AD-48C3-B751-AF93E3EA6138",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "In the AMD SEV/SEV-ES feature, memory can be rearranged in the guest address space that is not detected by the attestation mechanism which could be used by a malicious hypervisor to potentially lead to arbitrary code execution within the guest VM if a malicious administrator has access to compromise the server hypervisor."
    },
    {
      "lang": "es",
      "value": "En la funcionalidad SEV/SEV-ES de AMD, la memoria puede ser reorganizada en el espacio de direcciones del invitado que no es detectado por el mecanismo de certificaci\u00f3n que podr\u00eda ser utilizado por un hypervisor malicioso para conllevar potencialmente a una ejecuci\u00f3n de c\u00f3digo arbitraria dentro de la VM invitada si un administrador malicioso tiene acceso para comprometer el hypervisor del servidor"
    }
  ],
  "id": "CVE-2021-26311",
  "lastModified": "2024-11-21T05:56:04.090",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "SINGLE",
          "availabilityImpact": "COMPLETE",
          "baseScore": 9.0,
          "confidentialityImpact": "COMPLETE",
          "integrityImpact": "COMPLETE",
          "vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C",
          "version": "2.0"
        },
        "exploitabilityScore": 8.0,
        "impactScore": 10.0,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 7.2,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "HIGH",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 1.2,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2021-05-13T12:15:07.597",
  "references": [
    {
      "source": "psirt@amd.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1004"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1004"
    }
  ],
  "sourceIdentifier": "psirt@amd.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-77"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

FKIE_CVE-2020-12967

Vulnerability from fkie_nvd - Published: 2021-05-13 12:15 - Updated: 2024-11-21 05:00
Summary
The lack of nested page table protection in the AMD SEV/SEV-ES feature could potentially lead to arbitrary code execution within the guest VM if a malicious administrator has access to compromise the server hypervisor.

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7232p:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "16D55BEF-AFC8-45DC-9401-5DEF374E16C5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:amd:epyc_7251:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "565383C4-F690-4E3B-8A6A-B7D4ACCFAA05",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:amd:epyc_7252:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9B816918-6CCF-4010-AA16-7BF8A93AD7D1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:amd:epyc_7261:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "71ED05E6-8E69-41B9-9A36-CCE2D59A2603",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:amd:epyc_7262:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4FBBFDD3-A85D-43A3-AD67-D69E91C633B6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:amd:epyc_7272:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8F187412-26C2-4D8C-9199-D7CCF49D6520",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:amd:epyc_7281:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "805B4FEA-CFB2-429C-818B-9277B6D546C3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:amd:epyc_7282:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "26FC5683-F612-4586-8BA3-FB1F66D8868B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:amd:epyc_72f3:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7F98FF1A-3A2B-4CED-AEA2-9C4F2AC2D8C1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:amd:epyc_7301:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F65FC5B9-0803-4D7F-8EF6-7B6681418596",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:amd:epyc_7302:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0F7CB05E-C4F4-481F-AFB0-9288EBE6DB62",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:amd:epyc_7302p:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8A2E0AC0-8BDE-49F8-B067-DB03037921DD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:amd:epyc_7313:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B02B61B7-7DD3-4164-8D32-EB961E981BC9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:amd:epyc_7313p:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9000686A-DC2B-4561-9C32-E90890EB2EBA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:amd:epyc_7343:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "71B9C24B-2C10-4826-A91B-E1C60665FBBE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:amd:epyc_7351:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8A5FC951-9FAD-45B4-B7CF-D1A9482507F5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:amd:epyc_7351p:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9BB78361-9AAD-44BD-8B30-65715FEA4C06",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:amd:epyc_7352:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A1540CCD-1ED8-4B4E-AD43-7DE2689D9A21",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:amd:epyc_7371:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FA7576CB-A818-47A1-9A0D-6B8FD105FF08",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:amd:epyc_73f3:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "678C5F58-8AE9-46FF-8F01-4CF394C87A2C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:amd:epyc_7401:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C05F1EF0-3576-4D47-8704-36E9FAB1D432",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:amd:epyc_7401p:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A2E41A87-7A39-4BB2-88E4-16DF0D81BFD2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:amd:epyc_7402:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "430C9955-0090-4166-8E90-D81C2AA7DE0D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:amd:epyc_7402p:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "92EBDDBF-37C2-4D09-B744-F78169B2C1C3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:amd:epyc_7413:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D1766FF1-77A9-4293-B826-F6A8FBD7AFBF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:amd:epyc_7443:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4C474537-3006-41BA-8C3D-5C370E3ACECD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:amd:epyc_7443p:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8E2B13CA-72F4-4CF6-9E12-62E6E9056A14",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:amd:epyc_7451:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "51C8CF00-8FC8-4206-9028-6F104699DE76",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:amd:epyc_7452:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "68ACF30E-62DD-4217-B7F0-4A0FFF47E8EF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:amd:epyc_7453:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "241E39FF-FE66-444C-A4C2-3D28C45341BE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:amd:epyc_74f3:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "02D08121-DC57-47D7-8214-23A209F0AF08",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:amd:epyc_7501:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4E8BAB73-6F45-49AB-8F00-49A488006F3E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:amd:epyc_7502:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "49BBC687-5C3C-4843-A028-B8BE29D1E302",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:amd:epyc_7502p:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "563708A3-7C51-4693-B02D-9A25A639FE42",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:amd:epyc_7513:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F8264DF4-47B4-4716-AE89-44AFA870D385",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:amd:epyc_7532:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1EDABE45-F529-453C-92DC-BF7747CEEC0E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:amd:epyc_7542:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BC94B03B-A7FE-47AE-969D-FFEF278A7A9B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:amd:epyc_7543:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "52544912-FAA3-4025-A5FD-151B21CEC53B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:amd:epyc_7543p:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "77A0A47B-74A1-4731-92A8-BC10FFE58ECF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:amd:epyc_7551:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1AAB403A-5A36-4DC3-A187-99127CF77BA7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:amd:epyc_7551p:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "01BE5D42-1C62-4381-89E0-8F3264F696EC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:amd:epyc_7552:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7A6C7497-1B63-490F-B8EA-D9F3CB790952",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:amd:epyc_75f3:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EBF0AFED-588A-4EFB-8C90-9280BC3A6720",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:amd:epyc_7601:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "168076CD-1E6D-4328-AB59-4C1A90735AC4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:amd:epyc_7642:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1EDF8A1E-B259-43D0-A56C-8C2BB688A32C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:amd:epyc_7643:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "98E1D79D-0CB0-4FD9-8A82-27CDFBFE07B2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:amd:epyc_7662:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3E8C6528-9100-41D2-88A2-FFEABAB8F86A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:amd:epyc_7663:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A7DFCB62-6CDF-4AD2-9265-1887E5780CA5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:amd:epyc_7702:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8AC99346-DBF1-4060-8E6B-35D315944ADA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:amd:epyc_7702p:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "72C86198-0BD4-42E1-974B-70A49F82C411",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:amd:epyc_7713:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4D698D3E-BB05-4C65-90F4-8DAE275CD6A4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:amd:epyc_7713p:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2299ED50-B4D2-4BB3-AD87-56D552B84AE1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:amd:epyc_7742:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "88F4A126-B4A6-480A-9DD7-7F68714DFB49",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:amd:epyc_7763:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4F900BDD-F094-41A6-9A23-31F53DBA95D4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:amd:epyc_7f32:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E25652AB-E243-4C40-BE12-AB53AF52CD61",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:amd:epyc_7f52:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "87543FB4-658A-4300-9DC9-836AC1D4BCFB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:amd:epyc_7f72:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "07B3C659-C31A-4F82-9587-9F8A943F637D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:amd:epyc_7h12:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "89FAAD8C-6DD1-408D-849B-0CE707321B13",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:amd:epyc_embedded_3101:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "839C6991-D387-471D-9112-C79677D5A5AB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:amd:epyc_embedded_3151:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3480338B-290F-4E9C-88F9-A4160853B9BD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:amd:epyc_embedded_3201:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6943C2EC-1555-40B8-9533-BBB6572E9073",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:amd:epyc_embedded_3251:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "44A54822-42B0-47B4-A080-416D5C8AC20C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:amd:epyc_embedded_3255:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2F8DDDB3-E4B0-4354-955F-E2196E404970",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:amd:epyc_embedded_3351:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4C3B6175-0366-473D-A82F-E3F1373C74F5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:amd:epyc_embedded_3451:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C38BB8F3-11AD-48C3-B751-AF93E3EA6138",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "The lack of nested page table protection in the AMD SEV/SEV-ES feature could potentially lead to arbitrary code execution within the guest VM if a malicious administrator has access to compromise the server hypervisor."
    },
    {
      "lang": "es",
      "value": "La falta de protecci\u00f3n de tablas de p\u00e1ginas anidadas en la funcionalidad SEV/SEV-ES de AMD, podr\u00eda potencialmente conllevar a una ejecuci\u00f3n de c\u00f3digo arbitraria dentro de la M\u00e1quina Virtual invitada si un administrador malicioso tiene acceso para comprometer el hypervisor del servidor"
    }
  ],
  "id": "CVE-2020-12967",
  "lastModified": "2024-11-21T05:00:36.230",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "SINGLE",
          "availabilityImpact": "COMPLETE",
          "baseScore": 9.0,
          "confidentialityImpact": "COMPLETE",
          "integrityImpact": "COMPLETE",
          "vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C",
          "version": "2.0"
        },
        "exploitabilityScore": 8.0,
        "impactScore": 10.0,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 7.2,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "HIGH",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 1.2,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2021-05-13T12:15:07.443",
  "references": [
    {
      "source": "psirt@amd.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1004"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1004"
    }
  ],
  "sourceIdentifier": "psirt@amd.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-77"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

CVE-2021-26311 (GCVE-0-2021-26311)

Vulnerability from cvelistv5 – Published: 2021-05-13 11:06 – Updated: 2024-09-17 04:25
VLAI?
Summary
In the AMD SEV/SEV-ES feature, memory can be rearranged in the guest address space that is not detected by the attestation mechanism which could be used by a malicious hypervisor to potentially lead to arbitrary code execution within the guest VM if a malicious administrator has access to compromise the server hypervisor.
Severity ?
No CVSS data available.
CWE
  • Arbitrary Code Execution
Assigner
AMD
References
Impacted products
Vendor Product Version
AMD SEV/SEV-ES Affected: unspecified , < SEV-SNP (custom)
Create a notification for this product.
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-03T20:19:20.364Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1004"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "SEV/SEV-ES",
          "vendor": "AMD",
          "versions": [
            {
              "lessThan": "SEV-SNP",
              "status": "affected",
              "version": "unspecified",
              "versionType": "custom"
            }
          ]
        }
      ],
      "datePublic": "2021-05-11T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "In the AMD SEV/SEV-ES feature, memory can be rearranged in the guest address space that is not detected by the attestation mechanism which could be used by a malicious hypervisor to potentially lead to arbitrary code execution within the guest VM if a malicious administrator has access to compromise the server hypervisor."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "Arbitrary Code Execution",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2021-05-13T11:06:17",
        "orgId": "b58fc414-a1e4-4f92-9d70-1add41838648",
        "shortName": "AMD"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1004"
        }
      ],
      "source": {
        "advisory": "AMD-SB-1004",
        "discovery": "EXTERNAL"
      },
      "title": "AMD Secure Encrypted Virtualization",
      "x_generator": {
        "engine": "Vulnogram 0.0.9"
      },
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "psirt@amd.com",
          "DATE_PUBLIC": "2021-05-11T18:43:00.000Z",
          "ID": "CVE-2021-26311",
          "STATE": "PUBLIC",
          "TITLE": "AMD Secure Encrypted Virtualization"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "SEV/SEV-ES",
                      "version": {
                        "version_data": [
                          {
                            "version_affected": "\u003c",
                            "version_value": "SEV-SNP"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "AMD"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "In the AMD SEV/SEV-ES feature, memory can be rearranged in the guest address space that is not detected by the attestation mechanism which could be used by a malicious hypervisor to potentially lead to arbitrary code execution within the guest VM if a malicious administrator has access to compromise the server hypervisor."
            }
          ]
        },
        "generator": {
          "engine": "Vulnogram 0.0.9"
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "Arbitrary Code Execution"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1004",
              "refsource": "MISC",
              "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1004"
            }
          ]
        },
        "source": {
          "advisory": "AMD-SB-1004",
          "discovery": "EXTERNAL"
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "b58fc414-a1e4-4f92-9d70-1add41838648",
    "assignerShortName": "AMD",
    "cveId": "CVE-2021-26311",
    "datePublished": "2021-05-13T11:06:17.662304Z",
    "dateReserved": "2021-01-29T00:00:00",
    "dateUpdated": "2024-09-17T04:25:26.352Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2020-12967 (GCVE-0-2020-12967)

Vulnerability from cvelistv5 – Published: 2021-05-13 11:06 – Updated: 2024-09-16 18:55
VLAI?
Summary
The lack of nested page table protection in the AMD SEV/SEV-ES feature could potentially lead to arbitrary code execution within the guest VM if a malicious administrator has access to compromise the server hypervisor.
Severity ?
No CVSS data available.
CWE
  • Arbitrary Code Execution
Assigner
AMD
References
Impacted products
Vendor Product Version
AMD SEV/SEV-ES Affected: unspecified , < SEV-SNP (custom)
Create a notification for this product.
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-04T12:11:18.727Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1004"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "SEV/SEV-ES",
          "vendor": "AMD",
          "versions": [
            {
              "lessThan": "SEV-SNP",
              "status": "affected",
              "version": "unspecified",
              "versionType": "custom"
            }
          ]
        }
      ],
      "datePublic": "2021-05-11T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "The lack of nested page table protection in the AMD SEV/SEV-ES feature could potentially lead to arbitrary code execution within the guest VM if a malicious administrator has access to compromise the server hypervisor."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "Arbitrary Code Execution",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2021-05-13T11:06:11",
        "orgId": "b58fc414-a1e4-4f92-9d70-1add41838648",
        "shortName": "AMD"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1004"
        }
      ],
      "source": {
        "advisory": "AMD-SB-1004",
        "discovery": "EXTERNAL"
      },
      "title": "AMD Secure Encrypted Virtualization",
      "x_generator": {
        "engine": "Vulnogram 0.0.9"
      },
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "psirt@amd.com",
          "DATE_PUBLIC": "2021-05-11T18:43:00.000Z",
          "ID": "CVE-2020-12967",
          "STATE": "PUBLIC",
          "TITLE": "AMD Secure Encrypted Virtualization"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "SEV/SEV-ES",
                      "version": {
                        "version_data": [
                          {
                            "version_affected": "\u003c",
                            "version_value": "SEV-SNP"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "AMD"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "The lack of nested page table protection in the AMD SEV/SEV-ES feature could potentially lead to arbitrary code execution within the guest VM if a malicious administrator has access to compromise the server hypervisor."
            }
          ]
        },
        "generator": {
          "engine": "Vulnogram 0.0.9"
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "Arbitrary Code Execution"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1004",
              "refsource": "MISC",
              "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1004"
            }
          ]
        },
        "source": {
          "advisory": "AMD-SB-1004",
          "discovery": "EXTERNAL"
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "b58fc414-a1e4-4f92-9d70-1add41838648",
    "assignerShortName": "AMD",
    "cveId": "CVE-2020-12967",
    "datePublished": "2021-05-13T11:06:11.058128Z",
    "dateReserved": "2020-05-15T00:00:00",
    "dateUpdated": "2024-09-16T18:55:13.544Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2021-26311 (GCVE-0-2021-26311)

Vulnerability from nvd – Published: 2021-05-13 11:06 – Updated: 2024-09-17 04:25
VLAI?
Summary
In the AMD SEV/SEV-ES feature, memory can be rearranged in the guest address space that is not detected by the attestation mechanism which could be used by a malicious hypervisor to potentially lead to arbitrary code execution within the guest VM if a malicious administrator has access to compromise the server hypervisor.
Severity ?
No CVSS data available.
CWE
  • Arbitrary Code Execution
Assigner
AMD
References
Impacted products
Vendor Product Version
AMD SEV/SEV-ES Affected: unspecified , < SEV-SNP (custom)
Create a notification for this product.
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-03T20:19:20.364Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1004"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "SEV/SEV-ES",
          "vendor": "AMD",
          "versions": [
            {
              "lessThan": "SEV-SNP",
              "status": "affected",
              "version": "unspecified",
              "versionType": "custom"
            }
          ]
        }
      ],
      "datePublic": "2021-05-11T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "In the AMD SEV/SEV-ES feature, memory can be rearranged in the guest address space that is not detected by the attestation mechanism which could be used by a malicious hypervisor to potentially lead to arbitrary code execution within the guest VM if a malicious administrator has access to compromise the server hypervisor."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "Arbitrary Code Execution",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2021-05-13T11:06:17",
        "orgId": "b58fc414-a1e4-4f92-9d70-1add41838648",
        "shortName": "AMD"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1004"
        }
      ],
      "source": {
        "advisory": "AMD-SB-1004",
        "discovery": "EXTERNAL"
      },
      "title": "AMD Secure Encrypted Virtualization",
      "x_generator": {
        "engine": "Vulnogram 0.0.9"
      },
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "psirt@amd.com",
          "DATE_PUBLIC": "2021-05-11T18:43:00.000Z",
          "ID": "CVE-2021-26311",
          "STATE": "PUBLIC",
          "TITLE": "AMD Secure Encrypted Virtualization"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "SEV/SEV-ES",
                      "version": {
                        "version_data": [
                          {
                            "version_affected": "\u003c",
                            "version_value": "SEV-SNP"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "AMD"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "In the AMD SEV/SEV-ES feature, memory can be rearranged in the guest address space that is not detected by the attestation mechanism which could be used by a malicious hypervisor to potentially lead to arbitrary code execution within the guest VM if a malicious administrator has access to compromise the server hypervisor."
            }
          ]
        },
        "generator": {
          "engine": "Vulnogram 0.0.9"
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "Arbitrary Code Execution"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1004",
              "refsource": "MISC",
              "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1004"
            }
          ]
        },
        "source": {
          "advisory": "AMD-SB-1004",
          "discovery": "EXTERNAL"
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "b58fc414-a1e4-4f92-9d70-1add41838648",
    "assignerShortName": "AMD",
    "cveId": "CVE-2021-26311",
    "datePublished": "2021-05-13T11:06:17.662304Z",
    "dateReserved": "2021-01-29T00:00:00",
    "dateUpdated": "2024-09-17T04:25:26.352Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2020-12967 (GCVE-0-2020-12967)

Vulnerability from nvd – Published: 2021-05-13 11:06 – Updated: 2024-09-16 18:55
VLAI?
Summary
The lack of nested page table protection in the AMD SEV/SEV-ES feature could potentially lead to arbitrary code execution within the guest VM if a malicious administrator has access to compromise the server hypervisor.
Severity ?
No CVSS data available.
CWE
  • Arbitrary Code Execution
Assigner
AMD
References
Impacted products
Vendor Product Version
AMD SEV/SEV-ES Affected: unspecified , < SEV-SNP (custom)
Create a notification for this product.
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-04T12:11:18.727Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1004"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "SEV/SEV-ES",
          "vendor": "AMD",
          "versions": [
            {
              "lessThan": "SEV-SNP",
              "status": "affected",
              "version": "unspecified",
              "versionType": "custom"
            }
          ]
        }
      ],
      "datePublic": "2021-05-11T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "The lack of nested page table protection in the AMD SEV/SEV-ES feature could potentially lead to arbitrary code execution within the guest VM if a malicious administrator has access to compromise the server hypervisor."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "Arbitrary Code Execution",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2021-05-13T11:06:11",
        "orgId": "b58fc414-a1e4-4f92-9d70-1add41838648",
        "shortName": "AMD"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1004"
        }
      ],
      "source": {
        "advisory": "AMD-SB-1004",
        "discovery": "EXTERNAL"
      },
      "title": "AMD Secure Encrypted Virtualization",
      "x_generator": {
        "engine": "Vulnogram 0.0.9"
      },
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "psirt@amd.com",
          "DATE_PUBLIC": "2021-05-11T18:43:00.000Z",
          "ID": "CVE-2020-12967",
          "STATE": "PUBLIC",
          "TITLE": "AMD Secure Encrypted Virtualization"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "SEV/SEV-ES",
                      "version": {
                        "version_data": [
                          {
                            "version_affected": "\u003c",
                            "version_value": "SEV-SNP"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "AMD"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "The lack of nested page table protection in the AMD SEV/SEV-ES feature could potentially lead to arbitrary code execution within the guest VM if a malicious administrator has access to compromise the server hypervisor."
            }
          ]
        },
        "generator": {
          "engine": "Vulnogram 0.0.9"
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "Arbitrary Code Execution"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1004",
              "refsource": "MISC",
              "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1004"
            }
          ]
        },
        "source": {
          "advisory": "AMD-SB-1004",
          "discovery": "EXTERNAL"
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "b58fc414-a1e4-4f92-9d70-1add41838648",
    "assignerShortName": "AMD",
    "cveId": "CVE-2020-12967",
    "datePublished": "2021-05-13T11:06:11.058128Z",
    "dateReserved": "2020-05-15T00:00:00",
    "dateUpdated": "2024-09-16T18:55:13.544Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}