CVE-2021-26327Improper Input Validation in AMD Epyc 7003 Firmware

Severity
5.5MEDIUMNVD
EPSS
0.1%
top 67.65%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedNov 16
Latest updateNov 17

Description

Insufficient validation of guest context in the SNP Firmware could lead to a potential loss of guest confidentiality.

CVSS vector

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:NExploitability: 1.8 | Impact: 3.6

Affected Packages21 packages

NVDamd/epyc_7003_firmware< milanpi-sp3_1.0.0.4
NVDamd/epyc_72f3_firmware< milanpi-sp3_1.0.0.4
NVDamd/epyc_7313_firmware< milanpi-sp3_1.0.0.4
NVDamd/epyc_7343_firmware< milanpi-sp3_1.0.0.4
NVDamd/epyc_73f3_firmware< milanpi-sp3_1.0.0.4

🔴Vulnerability Details

2
GHSA
GHSA-qg7x-g66q-6pmh: Insufficient validation of guest context in the SNP Firmware could lead to a potential loss of guest confidentiality2021-11-17
CVEList
CVE-2021-26327: Insufficient validation of guest context in the SNP Firmware could lead to a potential loss of guest confidentiality2021-11-16
CVE-2021-26327 — Improper Input Validation in AMD | cvebase