cve-2021-26311
Vulnerability from cvelistv5
Published
2021-05-13 11:06
Modified
2024-09-17 04:25
Severity ?
EPSS score ?
Summary
In the AMD SEV/SEV-ES feature, memory can be rearranged in the guest address space that is not detected by the attestation mechanism which could be used by a malicious hypervisor to potentially lead to arbitrary code execution within the guest VM if a malicious administrator has access to compromise the server hypervisor.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | AMD | SEV/SEV-ES |
Version: unspecified < SEV-SNP |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T20:19:20.364Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1004" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "SEV/SEV-ES", "vendor": "AMD", "versions": [ { "lessThan": "SEV-SNP", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "datePublic": "2021-05-11T00:00:00", "descriptions": [ { "lang": "en", "value": "In the AMD SEV/SEV-ES feature, memory can be rearranged in the guest address space that is not detected by the attestation mechanism which could be used by a malicious hypervisor to potentially lead to arbitrary code execution within the guest VM if a malicious administrator has access to compromise the server hypervisor." } ], "problemTypes": [ { "descriptions": [ { "description": "Arbitrary Code Execution", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-05-13T11:06:17", "orgId": "b58fc414-a1e4-4f92-9d70-1add41838648", "shortName": "AMD" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1004" } ], "source": { "advisory": "AMD-SB-1004", "discovery": "EXTERNAL" }, "title": "AMD Secure Encrypted Virtualization", "x_generator": { "engine": "Vulnogram 0.0.9" }, "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@amd.com", "DATE_PUBLIC": "2021-05-11T18:43:00.000Z", "ID": "CVE-2021-26311", "STATE": "PUBLIC", "TITLE": "AMD Secure Encrypted Virtualization" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "SEV/SEV-ES", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "SEV-SNP" } ] } } ] }, "vendor_name": "AMD" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "In the AMD SEV/SEV-ES feature, memory can be rearranged in the guest address space that is not detected by the attestation mechanism which could be used by a malicious hypervisor to potentially lead to arbitrary code execution within the guest VM if a malicious administrator has access to compromise the server hypervisor." } ] }, "generator": { "engine": "Vulnogram 0.0.9" }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Arbitrary Code Execution" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1004", "refsource": "MISC", "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1004" } ] }, "source": { "advisory": "AMD-SB-1004", "discovery": "EXTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "b58fc414-a1e4-4f92-9d70-1add41838648", "assignerShortName": "AMD", "cveId": "CVE-2021-26311", "datePublished": "2021-05-13T11:06:17.662304Z", "dateReserved": "2021-01-29T00:00:00", "dateUpdated": "2024-09-17T04:25:26.352Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "vulnerability-lookup:meta": { "fkie_nvd": { "configurations": "[{\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:amd:epyc_7232p:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"16D55BEF-AFC8-45DC-9401-5DEF374E16C5\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:amd:epyc_7251:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"565383C4-F690-4E3B-8A6A-B7D4ACCFAA05\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:amd:epyc_7252:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"9B816918-6CCF-4010-AA16-7BF8A93AD7D1\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:amd:epyc_7261:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"71ED05E6-8E69-41B9-9A36-CCE2D59A2603\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:amd:epyc_7262:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"4FBBFDD3-A85D-43A3-AD67-D69E91C633B6\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:amd:epyc_7272:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"8F187412-26C2-4D8C-9199-D7CCF49D6520\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:amd:epyc_7281:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"805B4FEA-CFB2-429C-818B-9277B6D546C3\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:amd:epyc_7282:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"26FC5683-F612-4586-8BA3-FB1F66D8868B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:amd:epyc_72f3:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"7F98FF1A-3A2B-4CED-AEA2-9C4F2AC2D8C1\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:amd:epyc_7301:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F65FC5B9-0803-4D7F-8EF6-7B6681418596\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:amd:epyc_7302:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"0F7CB05E-C4F4-481F-AFB0-9288EBE6DB62\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:amd:epyc_7302p:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"8A2E0AC0-8BDE-49F8-B067-DB03037921DD\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:amd:epyc_7313:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B02B61B7-7DD3-4164-8D32-EB961E981BC9\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:amd:epyc_7313p:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"9000686A-DC2B-4561-9C32-E90890EB2EBA\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:amd:epyc_7343:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"71B9C24B-2C10-4826-A91B-E1C60665FBBE\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:amd:epyc_7351:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"8A5FC951-9FAD-45B4-B7CF-D1A9482507F5\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:amd:epyc_7351p:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"9BB78361-9AAD-44BD-8B30-65715FEA4C06\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:amd:epyc_7352:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A1540CCD-1ED8-4B4E-AD43-7DE2689D9A21\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:amd:epyc_7371:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"FA7576CB-A818-47A1-9A0D-6B8FD105FF08\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:amd:epyc_73f3:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"678C5F58-8AE9-46FF-8F01-4CF394C87A2C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:amd:epyc_7401:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C05F1EF0-3576-4D47-8704-36E9FAB1D432\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:amd:epyc_7401p:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A2E41A87-7A39-4BB2-88E4-16DF0D81BFD2\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:amd:epyc_7402:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"430C9955-0090-4166-8E90-D81C2AA7DE0D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:amd:epyc_7402p:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"92EBDDBF-37C2-4D09-B744-F78169B2C1C3\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:amd:epyc_7413:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D1766FF1-77A9-4293-B826-F6A8FBD7AFBF\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:amd:epyc_7443:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"4C474537-3006-41BA-8C3D-5C370E3ACECD\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:amd:epyc_7443p:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"8E2B13CA-72F4-4CF6-9E12-62E6E9056A14\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:amd:epyc_7451:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"51C8CF00-8FC8-4206-9028-6F104699DE76\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:amd:epyc_7452:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"68ACF30E-62DD-4217-B7F0-4A0FFF47E8EF\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:amd:epyc_7453:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"241E39FF-FE66-444C-A4C2-3D28C45341BE\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:amd:epyc_74f3:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"02D08121-DC57-47D7-8214-23A209F0AF08\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:amd:epyc_7501:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"4E8BAB73-6F45-49AB-8F00-49A488006F3E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:amd:epyc_7502:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"49BBC687-5C3C-4843-A028-B8BE29D1E302\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:amd:epyc_7502p:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"563708A3-7C51-4693-B02D-9A25A639FE42\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:amd:epyc_7513:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F8264DF4-47B4-4716-AE89-44AFA870D385\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:amd:epyc_7532:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"1EDABE45-F529-453C-92DC-BF7747CEEC0E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:amd:epyc_7542:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"BC94B03B-A7FE-47AE-969D-FFEF278A7A9B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:amd:epyc_7543:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"52544912-FAA3-4025-A5FD-151B21CEC53B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:amd:epyc_7543p:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"77A0A47B-74A1-4731-92A8-BC10FFE58ECF\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:amd:epyc_7551:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"1AAB403A-5A36-4DC3-A187-99127CF77BA7\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:amd:epyc_7551p:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"01BE5D42-1C62-4381-89E0-8F3264F696EC\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:amd:epyc_7552:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"7A6C7497-1B63-490F-B8EA-D9F3CB790952\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:amd:epyc_75f3:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"EBF0AFED-588A-4EFB-8C90-9280BC3A6720\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:amd:epyc_7601:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"168076CD-1E6D-4328-AB59-4C1A90735AC4\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:amd:epyc_7642:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"1EDF8A1E-B259-43D0-A56C-8C2BB688A32C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:amd:epyc_7643:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"98E1D79D-0CB0-4FD9-8A82-27CDFBFE07B2\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:amd:epyc_7662:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"3E8C6528-9100-41D2-88A2-FFEABAB8F86A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:amd:epyc_7663:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A7DFCB62-6CDF-4AD2-9265-1887E5780CA5\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:amd:epyc_7702:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"8AC99346-DBF1-4060-8E6B-35D315944ADA\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:amd:epyc_7702p:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"72C86198-0BD4-42E1-974B-70A49F82C411\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:amd:epyc_7713:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"4D698D3E-BB05-4C65-90F4-8DAE275CD6A4\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:amd:epyc_7713p:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"2299ED50-B4D2-4BB3-AD87-56D552B84AE1\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:amd:epyc_7742:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"88F4A126-B4A6-480A-9DD7-7F68714DFB49\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:amd:epyc_7763:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"4F900BDD-F094-41A6-9A23-31F53DBA95D4\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:amd:epyc_7f32:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E25652AB-E243-4C40-BE12-AB53AF52CD61\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:amd:epyc_7f52:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"87543FB4-658A-4300-9DC9-836AC1D4BCFB\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:amd:epyc_7f72:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"07B3C659-C31A-4F82-9587-9F8A943F637D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:amd:epyc_7h12:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"89FAAD8C-6DD1-408D-849B-0CE707321B13\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:amd:epyc_embedded_3101:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"839C6991-D387-471D-9112-C79677D5A5AB\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:amd:epyc_embedded_3151:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"3480338B-290F-4E9C-88F9-A4160853B9BD\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:amd:epyc_embedded_3201:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"6943C2EC-1555-40B8-9533-BBB6572E9073\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:amd:epyc_embedded_3251:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"44A54822-42B0-47B4-A080-416D5C8AC20C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:amd:epyc_embedded_3255:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"2F8DDDB3-E4B0-4354-955F-E2196E404970\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:amd:epyc_embedded_3351:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"4C3B6175-0366-473D-A82F-E3F1373C74F5\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:amd:epyc_embedded_3451:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C38BB8F3-11AD-48C3-B751-AF93E3EA6138\"}]}]}]", "descriptions": "[{\"lang\": \"en\", \"value\": \"In the AMD SEV/SEV-ES feature, memory can be rearranged in the guest address space that is not detected by the attestation mechanism which could be used by a malicious hypervisor to potentially lead to arbitrary code execution within the guest VM if a malicious administrator has access to compromise the server hypervisor.\"}, {\"lang\": \"es\", \"value\": \"En la funcionalidad SEV/SEV-ES de AMD, la memoria puede ser reorganizada en el espacio de direcciones del invitado que no es detectado por el mecanismo de certificaci\\u00f3n que podr\\u00eda ser utilizado por un hypervisor malicioso para conllevar potencialmente a una ejecuci\\u00f3n de c\\u00f3digo arbitraria dentro de la VM invitada si un administrador malicioso tiene acceso para comprometer el hypervisor del servidor\"}]", "id": "CVE-2021-26311", "lastModified": "2024-11-21T05:56:04.090", "metrics": "{\"cvssMetricV31\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"3.1\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H\", \"baseScore\": 7.2, \"baseSeverity\": \"HIGH\", \"attackVector\": \"NETWORK\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"HIGH\", \"userInteraction\": \"NONE\", \"scope\": \"UNCHANGED\", \"confidentialityImpact\": \"HIGH\", \"integrityImpact\": \"HIGH\", \"availabilityImpact\": \"HIGH\"}, \"exploitabilityScore\": 1.2, \"impactScore\": 5.9}], \"cvssMetricV2\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"2.0\", \"vectorString\": \"AV:N/AC:L/Au:S/C:C/I:C/A:C\", \"baseScore\": 9.0, \"accessVector\": \"NETWORK\", \"accessComplexity\": \"LOW\", \"authentication\": \"SINGLE\", \"confidentialityImpact\": \"COMPLETE\", \"integrityImpact\": \"COMPLETE\", \"availabilityImpact\": \"COMPLETE\"}, \"baseSeverity\": \"HIGH\", \"exploitabilityScore\": 8.0, \"impactScore\": 10.0, \"acInsufInfo\": false, \"obtainAllPrivilege\": false, \"obtainUserPrivilege\": false, \"obtainOtherPrivilege\": false, \"userInteractionRequired\": false}]}", "published": "2021-05-13T12:15:07.597", "references": "[{\"url\": \"https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1004\", \"source\": \"psirt@amd.com\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1004\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}]", "sourceIdentifier": "psirt@amd.com", "vulnStatus": "Modified", "weaknesses": "[{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-77\"}]}]" }, "nvd": "{\"cve\":{\"id\":\"CVE-2021-26311\",\"sourceIdentifier\":\"psirt@amd.com\",\"published\":\"2021-05-13T12:15:07.597\",\"lastModified\":\"2024-11-21T05:56:04.090\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"In the AMD SEV/SEV-ES feature, memory can be rearranged in the guest address space that is not detected by the attestation mechanism which could be used by a malicious hypervisor to potentially lead to arbitrary code execution within the guest VM if a malicious administrator has access to compromise the server hypervisor.\"},{\"lang\":\"es\",\"value\":\"En la funcionalidad SEV/SEV-ES de AMD, la memoria puede ser reorganizada en el espacio de direcciones del invitado que no es detectado por el mecanismo de certificaci\u00f3n que podr\u00eda ser utilizado por un hypervisor malicioso para conllevar potencialmente a una ejecuci\u00f3n de c\u00f3digo arbitraria dentro de la VM invitada si un administrador malicioso tiene acceso para comprometer el hypervisor del servidor\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H\",\"baseScore\":7.2,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"HIGH\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":1.2,\"impactScore\":5.9}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:S/C:C/I:C/A:C\",\"baseScore\":9.0,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"SINGLE\",\"confidentialityImpact\":\"COMPLETE\",\"integrityImpact\":\"COMPLETE\",\"availabilityImpact\":\"COMPLETE\"},\"baseSeverity\":\"HIGH\",\"exploitabilityScore\":8.0,\"impactScore\":10.0,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-77\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:amd:epyc_7232p:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"16D55BEF-AFC8-45DC-9401-5DEF374E16C5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:amd:epyc_7251:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"565383C4-F690-4E3B-8A6A-B7D4ACCFAA05\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:amd:epyc_7252:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9B816918-6CCF-4010-AA16-7BF8A93AD7D1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:amd:epyc_7261:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"71ED05E6-8E69-41B9-9A36-CCE2D59A2603\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:amd:epyc_7262:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4FBBFDD3-A85D-43A3-AD67-D69E91C633B6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:amd:epyc_7272:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8F187412-26C2-4D8C-9199-D7CCF49D6520\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:amd:epyc_7281:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"805B4FEA-CFB2-429C-818B-9277B6D546C3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:amd:epyc_7282:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"26FC5683-F612-4586-8BA3-FB1F66D8868B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:amd:epyc_72f3:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7F98FF1A-3A2B-4CED-AEA2-9C4F2AC2D8C1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:amd:epyc_7301:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F65FC5B9-0803-4D7F-8EF6-7B6681418596\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:amd:epyc_7302:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0F7CB05E-C4F4-481F-AFB0-9288EBE6DB62\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:amd:epyc_7302p:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8A2E0AC0-8BDE-49F8-B067-DB03037921DD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:amd:epyc_7313:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B02B61B7-7DD3-4164-8D32-EB961E981BC9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:amd:epyc_7313p:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9000686A-DC2B-4561-9C32-E90890EB2EBA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:amd:epyc_7343:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"71B9C24B-2C10-4826-A91B-E1C60665FBBE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:amd:epyc_7351:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8A5FC951-9FAD-45B4-B7CF-D1A9482507F5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:amd:epyc_7351p:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9BB78361-9AAD-44BD-8B30-65715FEA4C06\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:amd:epyc_7352:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A1540CCD-1ED8-4B4E-AD43-7DE2689D9A21\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:amd:epyc_7371:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FA7576CB-A818-47A1-9A0D-6B8FD105FF08\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:amd:epyc_73f3:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"678C5F58-8AE9-46FF-8F01-4CF394C87A2C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:amd:epyc_7401:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C05F1EF0-3576-4D47-8704-36E9FAB1D432\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:amd:epyc_7401p:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A2E41A87-7A39-4BB2-88E4-16DF0D81BFD2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:amd:epyc_7402:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"430C9955-0090-4166-8E90-D81C2AA7DE0D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:amd:epyc_7402p:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"92EBDDBF-37C2-4D09-B744-F78169B2C1C3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:amd:epyc_7413:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D1766FF1-77A9-4293-B826-F6A8FBD7AFBF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:amd:epyc_7443:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4C474537-3006-41BA-8C3D-5C370E3ACECD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:amd:epyc_7443p:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8E2B13CA-72F4-4CF6-9E12-62E6E9056A14\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:amd:epyc_7451:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"51C8CF00-8FC8-4206-9028-6F104699DE76\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:amd:epyc_7452:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"68ACF30E-62DD-4217-B7F0-4A0FFF47E8EF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:amd:epyc_7453:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"241E39FF-FE66-444C-A4C2-3D28C45341BE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:amd:epyc_74f3:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"02D08121-DC57-47D7-8214-23A209F0AF08\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:amd:epyc_7501:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4E8BAB73-6F45-49AB-8F00-49A488006F3E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:amd:epyc_7502:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"49BBC687-5C3C-4843-A028-B8BE29D1E302\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:amd:epyc_7502p:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"563708A3-7C51-4693-B02D-9A25A639FE42\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:amd:epyc_7513:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F8264DF4-47B4-4716-AE89-44AFA870D385\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:amd:epyc_7532:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1EDABE45-F529-453C-92DC-BF7747CEEC0E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:amd:epyc_7542:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BC94B03B-A7FE-47AE-969D-FFEF278A7A9B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:amd:epyc_7543:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"52544912-FAA3-4025-A5FD-151B21CEC53B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:amd:epyc_7543p:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"77A0A47B-74A1-4731-92A8-BC10FFE58ECF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:amd:epyc_7551:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1AAB403A-5A36-4DC3-A187-99127CF77BA7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:amd:epyc_7551p:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"01BE5D42-1C62-4381-89E0-8F3264F696EC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:amd:epyc_7552:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7A6C7497-1B63-490F-B8EA-D9F3CB790952\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:amd:epyc_75f3:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EBF0AFED-588A-4EFB-8C90-9280BC3A6720\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:amd:epyc_7601:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"168076CD-1E6D-4328-AB59-4C1A90735AC4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:amd:epyc_7642:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1EDF8A1E-B259-43D0-A56C-8C2BB688A32C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:amd:epyc_7643:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"98E1D79D-0CB0-4FD9-8A82-27CDFBFE07B2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:amd:epyc_7662:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3E8C6528-9100-41D2-88A2-FFEABAB8F86A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:amd:epyc_7663:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A7DFCB62-6CDF-4AD2-9265-1887E5780CA5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:amd:epyc_7702:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8AC99346-DBF1-4060-8E6B-35D315944ADA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:amd:epyc_7702p:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"72C86198-0BD4-42E1-974B-70A49F82C411\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:amd:epyc_7713:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4D698D3E-BB05-4C65-90F4-8DAE275CD6A4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:amd:epyc_7713p:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2299ED50-B4D2-4BB3-AD87-56D552B84AE1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:amd:epyc_7742:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"88F4A126-B4A6-480A-9DD7-7F68714DFB49\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:amd:epyc_7763:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4F900BDD-F094-41A6-9A23-31F53DBA95D4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:amd:epyc_7f32:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E25652AB-E243-4C40-BE12-AB53AF52CD61\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:amd:epyc_7f52:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"87543FB4-658A-4300-9DC9-836AC1D4BCFB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:amd:epyc_7f72:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"07B3C659-C31A-4F82-9587-9F8A943F637D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:amd:epyc_7h12:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"89FAAD8C-6DD1-408D-849B-0CE707321B13\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:amd:epyc_embedded_3101:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"839C6991-D387-471D-9112-C79677D5A5AB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:amd:epyc_embedded_3151:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3480338B-290F-4E9C-88F9-A4160853B9BD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:amd:epyc_embedded_3201:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6943C2EC-1555-40B8-9533-BBB6572E9073\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:amd:epyc_embedded_3251:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"44A54822-42B0-47B4-A080-416D5C8AC20C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:amd:epyc_embedded_3255:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2F8DDDB3-E4B0-4354-955F-E2196E404970\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:amd:epyc_embedded_3351:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4C3B6175-0366-473D-A82F-E3F1373C74F5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:amd:epyc_embedded_3451:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C38BB8F3-11AD-48C3-B751-AF93E3EA6138\"}]}]}],\"references\":[{\"url\":\"https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1004\",\"source\":\"psirt@amd.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1004\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]}]}}" } }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.