fkie_cve-2021-26311
Vulnerability from fkie_nvd
Published
2021-05-13 12:15
Modified
2024-11-21 05:56
Summary
In the AMD SEV/SEV-ES feature, memory can be rearranged in the guest address space that is not detected by the attestation mechanism which could be used by a malicious hypervisor to potentially lead to arbitrary code execution within the guest VM if a malicious administrator has access to compromise the server hypervisor.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7232p:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "16D55BEF-AFC8-45DC-9401-5DEF374E16C5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:amd:epyc_7251:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "565383C4-F690-4E3B-8A6A-B7D4ACCFAA05",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:amd:epyc_7252:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9B816918-6CCF-4010-AA16-7BF8A93AD7D1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:amd:epyc_7261:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "71ED05E6-8E69-41B9-9A36-CCE2D59A2603",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:amd:epyc_7262:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4FBBFDD3-A85D-43A3-AD67-D69E91C633B6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:amd:epyc_7272:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8F187412-26C2-4D8C-9199-D7CCF49D6520",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:amd:epyc_7281:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "805B4FEA-CFB2-429C-818B-9277B6D546C3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:amd:epyc_7282:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "26FC5683-F612-4586-8BA3-FB1F66D8868B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:amd:epyc_72f3:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7F98FF1A-3A2B-4CED-AEA2-9C4F2AC2D8C1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:amd:epyc_7301:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F65FC5B9-0803-4D7F-8EF6-7B6681418596",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:amd:epyc_7302:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0F7CB05E-C4F4-481F-AFB0-9288EBE6DB62",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:amd:epyc_7302p:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8A2E0AC0-8BDE-49F8-B067-DB03037921DD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:amd:epyc_7313:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B02B61B7-7DD3-4164-8D32-EB961E981BC9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:amd:epyc_7313p:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9000686A-DC2B-4561-9C32-E90890EB2EBA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:amd:epyc_7343:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "71B9C24B-2C10-4826-A91B-E1C60665FBBE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:amd:epyc_7351:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8A5FC951-9FAD-45B4-B7CF-D1A9482507F5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:amd:epyc_7351p:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9BB78361-9AAD-44BD-8B30-65715FEA4C06",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:amd:epyc_7352:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A1540CCD-1ED8-4B4E-AD43-7DE2689D9A21",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:amd:epyc_7371:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FA7576CB-A818-47A1-9A0D-6B8FD105FF08",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:amd:epyc_73f3:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "678C5F58-8AE9-46FF-8F01-4CF394C87A2C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:amd:epyc_7401:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C05F1EF0-3576-4D47-8704-36E9FAB1D432",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:amd:epyc_7401p:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A2E41A87-7A39-4BB2-88E4-16DF0D81BFD2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:amd:epyc_7402:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "430C9955-0090-4166-8E90-D81C2AA7DE0D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:amd:epyc_7402p:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "92EBDDBF-37C2-4D09-B744-F78169B2C1C3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:amd:epyc_7413:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D1766FF1-77A9-4293-B826-F6A8FBD7AFBF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:amd:epyc_7443:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4C474537-3006-41BA-8C3D-5C370E3ACECD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:amd:epyc_7443p:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8E2B13CA-72F4-4CF6-9E12-62E6E9056A14",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:amd:epyc_7451:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "51C8CF00-8FC8-4206-9028-6F104699DE76",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:amd:epyc_7452:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "68ACF30E-62DD-4217-B7F0-4A0FFF47E8EF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:amd:epyc_7453:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "241E39FF-FE66-444C-A4C2-3D28C45341BE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:amd:epyc_74f3:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "02D08121-DC57-47D7-8214-23A209F0AF08",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:amd:epyc_7501:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4E8BAB73-6F45-49AB-8F00-49A488006F3E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:amd:epyc_7502:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "49BBC687-5C3C-4843-A028-B8BE29D1E302",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:amd:epyc_7502p:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "563708A3-7C51-4693-B02D-9A25A639FE42",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:amd:epyc_7513:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F8264DF4-47B4-4716-AE89-44AFA870D385",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:amd:epyc_7532:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1EDABE45-F529-453C-92DC-BF7747CEEC0E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:amd:epyc_7542:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BC94B03B-A7FE-47AE-969D-FFEF278A7A9B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:amd:epyc_7543:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "52544912-FAA3-4025-A5FD-151B21CEC53B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:amd:epyc_7543p:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "77A0A47B-74A1-4731-92A8-BC10FFE58ECF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:amd:epyc_7551:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1AAB403A-5A36-4DC3-A187-99127CF77BA7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:amd:epyc_7551p:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "01BE5D42-1C62-4381-89E0-8F3264F696EC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:amd:epyc_7552:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7A6C7497-1B63-490F-B8EA-D9F3CB790952",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:amd:epyc_75f3:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EBF0AFED-588A-4EFB-8C90-9280BC3A6720",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:amd:epyc_7601:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "168076CD-1E6D-4328-AB59-4C1A90735AC4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:amd:epyc_7642:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1EDF8A1E-B259-43D0-A56C-8C2BB688A32C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:amd:epyc_7643:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "98E1D79D-0CB0-4FD9-8A82-27CDFBFE07B2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:amd:epyc_7662:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3E8C6528-9100-41D2-88A2-FFEABAB8F86A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:amd:epyc_7663:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A7DFCB62-6CDF-4AD2-9265-1887E5780CA5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:amd:epyc_7702:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8AC99346-DBF1-4060-8E6B-35D315944ADA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:amd:epyc_7702p:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "72C86198-0BD4-42E1-974B-70A49F82C411",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:amd:epyc_7713:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4D698D3E-BB05-4C65-90F4-8DAE275CD6A4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:amd:epyc_7713p:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2299ED50-B4D2-4BB3-AD87-56D552B84AE1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:amd:epyc_7742:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "88F4A126-B4A6-480A-9DD7-7F68714DFB49",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:amd:epyc_7763:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4F900BDD-F094-41A6-9A23-31F53DBA95D4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:amd:epyc_7f32:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E25652AB-E243-4C40-BE12-AB53AF52CD61",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:amd:epyc_7f52:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "87543FB4-658A-4300-9DC9-836AC1D4BCFB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:amd:epyc_7f72:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "07B3C659-C31A-4F82-9587-9F8A943F637D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:amd:epyc_7h12:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "89FAAD8C-6DD1-408D-849B-0CE707321B13",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:amd:epyc_embedded_3101:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "839C6991-D387-471D-9112-C79677D5A5AB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:amd:epyc_embedded_3151:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3480338B-290F-4E9C-88F9-A4160853B9BD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:amd:epyc_embedded_3201:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6943C2EC-1555-40B8-9533-BBB6572E9073",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:amd:epyc_embedded_3251:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "44A54822-42B0-47B4-A080-416D5C8AC20C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:amd:epyc_embedded_3255:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2F8DDDB3-E4B0-4354-955F-E2196E404970",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:amd:epyc_embedded_3351:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4C3B6175-0366-473D-A82F-E3F1373C74F5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:amd:epyc_embedded_3451:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C38BB8F3-11AD-48C3-B751-AF93E3EA6138",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "In the AMD SEV/SEV-ES feature, memory can be rearranged in the guest address space that is not detected by the attestation mechanism which could be used by a malicious hypervisor to potentially lead to arbitrary code execution within the guest VM if a malicious administrator has access to compromise the server hypervisor."
    },
    {
      "lang": "es",
      "value": "En la funcionalidad SEV/SEV-ES de AMD, la memoria puede ser reorganizada en el espacio de direcciones del invitado que no es detectado por el mecanismo de certificaci\u00f3n que podr\u00eda ser utilizado por un hypervisor malicioso para conllevar potencialmente a una ejecuci\u00f3n de c\u00f3digo arbitraria dentro de la VM invitada si un administrador malicioso tiene acceso para comprometer el hypervisor del servidor"
    }
  ],
  "id": "CVE-2021-26311",
  "lastModified": "2024-11-21T05:56:04.090",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "SINGLE",
          "availabilityImpact": "COMPLETE",
          "baseScore": 9.0,
          "confidentialityImpact": "COMPLETE",
          "integrityImpact": "COMPLETE",
          "vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C",
          "version": "2.0"
        },
        "exploitabilityScore": 8.0,
        "impactScore": 10.0,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 7.2,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "HIGH",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 1.2,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2021-05-13T12:15:07.597",
  "references": [
    {
      "source": "psirt@amd.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1004"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1004"
    }
  ],
  "sourceIdentifier": "psirt@amd.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-77"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.