### [CVE-2024-21978](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21978) ![](https://img.shields.io/static/v1?label=Product&message=3rd%20Gen%20AMD%20EPYC%E2%84%A2%20Processors&color=blue) ![](https://img.shields.io/static/v1?label=Product&message=4th%20Gen%20AMD%20EPYC%E2%84%A2%20Processors&color=blue) ![](https://img.shields.io/static/v1?label=Product&message=AMD%20EPYC%E2%84%A2%20Embedded%207003&color=blue) ![](https://img.shields.io/static/v1?label=Product&message=AMD%20EPYC%E2%84%A2%20Embedded%209003&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) ![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-20%20Improper%20Input%20Validation&color=brighgreen) ### Description Improper input validation in SEV-SNP could allow a malicious hypervisor to read or overwrite guest memory potentially leading to data leakage or data corruption. ### POC #### Reference No PoCs from references. #### Github - https://github.com/Freax13/cve-2024-21978-poc - https://github.com/nomi-sec/PoC-in-GitHub