In the AMD SEV/SEV-ES feature, memory can be rearranged in the guest address space that is not detected by the attestation mechanism which could be used by a malicious hypervisor to potentially lead to arbitrary code execution within the guest VM if a malicious administrator has access to compromise the server hypervisor.
Metrics
No CVSS v4.0
Attack Vector Network
Attack Complexity Low
Privileges Required High
Scope Unchanged
Confidentiality Impact High
Integrity Impact High
Availability Impact High
User Interaction None
No CVSS v3.0
Access Vector Network
Access Complexity Low
Authentication Single
Confidentiality Impact Complete
Integrity Impact Complete
Availability Impact Complete
This CVE is not in the KEV list.
The EPSS score is 0.01283.
Key SSVC decision points have not yet been added.
Affected Vendors & Products
| Vendors | Products |
|---|---|
|
Amd
Subscribe
|
Epyc 7232p
Subscribe
Epyc 7251
Subscribe
Epyc 7252
Subscribe
Epyc 7261
Subscribe
Epyc 7262
Subscribe
Epyc 7272
Subscribe
Epyc 7281
Subscribe
Epyc 7282
Subscribe
Epyc 72f3
Subscribe
Epyc 7301
Subscribe
Epyc 7302
Subscribe
Epyc 7302p
Subscribe
Epyc 7313
Subscribe
Epyc 7313p
Subscribe
Epyc 7343
Subscribe
Epyc 7351
Subscribe
Epyc 7351p
Subscribe
Epyc 7352
Subscribe
Epyc 7371
Subscribe
Epyc 73f3
Subscribe
Epyc 7401
Subscribe
Epyc 7401p
Subscribe
Epyc 7402
Subscribe
Epyc 7402p
Subscribe
Epyc 7413
Subscribe
Epyc 7443
Subscribe
Epyc 7443p
Subscribe
Epyc 7451
Subscribe
Epyc 7452
Subscribe
Epyc 7453
Subscribe
Epyc 74f3
Subscribe
Epyc 7501
Subscribe
Epyc 7502
Subscribe
Epyc 7502p
Subscribe
Epyc 7513
Subscribe
Epyc 7532
Subscribe
Epyc 7542
Subscribe
Epyc 7543
Subscribe
Epyc 7543p
Subscribe
Epyc 7551
Subscribe
Epyc 7551p
Subscribe
Epyc 7552
Subscribe
Epyc 75f3
Subscribe
Epyc 7601
Subscribe
Epyc 7642
Subscribe
Epyc 7643
Subscribe
Epyc 7662
Subscribe
Epyc 7663
Subscribe
Epyc 7702
Subscribe
Epyc 7702p
Subscribe
Epyc 7713
Subscribe
Epyc 7713p
Subscribe
Epyc 7742
Subscribe
Epyc 7763
Subscribe
Epyc 7f32
Subscribe
Epyc 7f52
Subscribe
Epyc 7f72
Subscribe
Epyc 7h12
Subscribe
Epyc Embedded 3101
Subscribe
Epyc Embedded 3151
Subscribe
Epyc Embedded 3201
Subscribe
Epyc Embedded 3251
Subscribe
Epyc Embedded 3255
Subscribe
Epyc Embedded 3351
Subscribe
Epyc Embedded 3451
Subscribe
|
Configuration 1 [-]
|
No data.
No data.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2021-13117 | In the AMD SEV/SEV-ES feature, memory can be rearranged in the guest address space that is not detected by the attestation mechanism which could be used by a malicious hypervisor to potentially lead to arbitrary code execution within the guest VM if a malicious administrator has access to compromise the server hypervisor. |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
No history.
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: AMD
Published:
Updated: 2024-09-17T04:25:26.352Z
Reserved: 2021-01-29T00:00:00
Link: CVE-2021-26311
No data.
Status : Modified
Published: 2021-05-13T12:15:07.597
Modified: 2024-11-21T05:56:04.090
Link: CVE-2021-26311
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD