mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-28 17:21:36 +00:00
432 lines
16 KiB
JSON
432 lines
16 KiB
JSON
{
|
|
"id": "CVE-2021-26311",
|
|
"sourceIdentifier": "psirt@amd.com",
|
|
"published": "2021-05-13T12:15:07.597",
|
|
"lastModified": "2024-11-21T05:56:04.090",
|
|
"vulnStatus": "Modified",
|
|
"cveTags": [],
|
|
"descriptions": [
|
|
{
|
|
"lang": "en",
|
|
"value": "In the AMD SEV/SEV-ES feature, memory can be rearranged in the guest address space that is not detected by the attestation mechanism which could be used by a malicious hypervisor to potentially lead to arbitrary code execution within the guest VM if a malicious administrator has access to compromise the server hypervisor."
|
|
},
|
|
{
|
|
"lang": "es",
|
|
"value": "En la funcionalidad SEV/SEV-ES de AMD, la memoria puede ser reorganizada en el espacio de direcciones del invitado que no es detectado por el mecanismo de certificaci\u00f3n que podr\u00eda ser utilizado por un hypervisor malicioso para conllevar potencialmente a una ejecuci\u00f3n de c\u00f3digo arbitraria dentro de la VM invitada si un administrador malicioso tiene acceso para comprometer el hypervisor del servidor"
|
|
}
|
|
],
|
|
"metrics": {
|
|
"cvssMetricV31": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"cvssData": {
|
|
"version": "3.1",
|
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
|
|
"baseScore": 7.2,
|
|
"baseSeverity": "HIGH",
|
|
"attackVector": "NETWORK",
|
|
"attackComplexity": "LOW",
|
|
"privilegesRequired": "HIGH",
|
|
"userInteraction": "NONE",
|
|
"scope": "UNCHANGED",
|
|
"confidentialityImpact": "HIGH",
|
|
"integrityImpact": "HIGH",
|
|
"availabilityImpact": "HIGH"
|
|
},
|
|
"exploitabilityScore": 1.2,
|
|
"impactScore": 5.9
|
|
}
|
|
],
|
|
"cvssMetricV2": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"cvssData": {
|
|
"version": "2.0",
|
|
"vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C",
|
|
"baseScore": 9.0,
|
|
"accessVector": "NETWORK",
|
|
"accessComplexity": "LOW",
|
|
"authentication": "SINGLE",
|
|
"confidentialityImpact": "COMPLETE",
|
|
"integrityImpact": "COMPLETE",
|
|
"availabilityImpact": "COMPLETE"
|
|
},
|
|
"baseSeverity": "HIGH",
|
|
"exploitabilityScore": 8.0,
|
|
"impactScore": 10.0,
|
|
"acInsufInfo": false,
|
|
"obtainAllPrivilege": false,
|
|
"obtainUserPrivilege": false,
|
|
"obtainOtherPrivilege": false,
|
|
"userInteractionRequired": false
|
|
}
|
|
]
|
|
},
|
|
"weaknesses": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"description": [
|
|
{
|
|
"lang": "en",
|
|
"value": "CWE-77"
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"configurations": [
|
|
{
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:h:amd:epyc_7232p:-:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "16D55BEF-AFC8-45DC-9401-5DEF374E16C5"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:h:amd:epyc_7251:-:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "565383C4-F690-4E3B-8A6A-B7D4ACCFAA05"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:h:amd:epyc_7252:-:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "9B816918-6CCF-4010-AA16-7BF8A93AD7D1"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:h:amd:epyc_7261:-:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "71ED05E6-8E69-41B9-9A36-CCE2D59A2603"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:h:amd:epyc_7262:-:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "4FBBFDD3-A85D-43A3-AD67-D69E91C633B6"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:h:amd:epyc_7272:-:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "8F187412-26C2-4D8C-9199-D7CCF49D6520"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:h:amd:epyc_7281:-:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "805B4FEA-CFB2-429C-818B-9277B6D546C3"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:h:amd:epyc_7282:-:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "26FC5683-F612-4586-8BA3-FB1F66D8868B"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:h:amd:epyc_72f3:-:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "7F98FF1A-3A2B-4CED-AEA2-9C4F2AC2D8C1"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:h:amd:epyc_7301:-:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "F65FC5B9-0803-4D7F-8EF6-7B6681418596"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:h:amd:epyc_7302:-:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "0F7CB05E-C4F4-481F-AFB0-9288EBE6DB62"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:h:amd:epyc_7302p:-:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "8A2E0AC0-8BDE-49F8-B067-DB03037921DD"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:h:amd:epyc_7313:-:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "B02B61B7-7DD3-4164-8D32-EB961E981BC9"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:h:amd:epyc_7313p:-:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "9000686A-DC2B-4561-9C32-E90890EB2EBA"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:h:amd:epyc_7343:-:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "71B9C24B-2C10-4826-A91B-E1C60665FBBE"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:h:amd:epyc_7351:-:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "8A5FC951-9FAD-45B4-B7CF-D1A9482507F5"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:h:amd:epyc_7351p:-:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "9BB78361-9AAD-44BD-8B30-65715FEA4C06"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:h:amd:epyc_7352:-:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "A1540CCD-1ED8-4B4E-AD43-7DE2689D9A21"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:h:amd:epyc_7371:-:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "FA7576CB-A818-47A1-9A0D-6B8FD105FF08"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:h:amd:epyc_73f3:-:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "678C5F58-8AE9-46FF-8F01-4CF394C87A2C"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:h:amd:epyc_7401:-:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "C05F1EF0-3576-4D47-8704-36E9FAB1D432"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:h:amd:epyc_7401p:-:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "A2E41A87-7A39-4BB2-88E4-16DF0D81BFD2"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:h:amd:epyc_7402:-:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "430C9955-0090-4166-8E90-D81C2AA7DE0D"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:h:amd:epyc_7402p:-:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "92EBDDBF-37C2-4D09-B744-F78169B2C1C3"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:h:amd:epyc_7413:-:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "D1766FF1-77A9-4293-B826-F6A8FBD7AFBF"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:h:amd:epyc_7443:-:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "4C474537-3006-41BA-8C3D-5C370E3ACECD"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:h:amd:epyc_7443p:-:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "8E2B13CA-72F4-4CF6-9E12-62E6E9056A14"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:h:amd:epyc_7451:-:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "51C8CF00-8FC8-4206-9028-6F104699DE76"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:h:amd:epyc_7452:-:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "68ACF30E-62DD-4217-B7F0-4A0FFF47E8EF"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:h:amd:epyc_7453:-:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "241E39FF-FE66-444C-A4C2-3D28C45341BE"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:h:amd:epyc_74f3:-:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "02D08121-DC57-47D7-8214-23A209F0AF08"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:h:amd:epyc_7501:-:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "4E8BAB73-6F45-49AB-8F00-49A488006F3E"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:h:amd:epyc_7502:-:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "49BBC687-5C3C-4843-A028-B8BE29D1E302"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:h:amd:epyc_7502p:-:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "563708A3-7C51-4693-B02D-9A25A639FE42"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:h:amd:epyc_7513:-:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "F8264DF4-47B4-4716-AE89-44AFA870D385"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:h:amd:epyc_7532:-:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "1EDABE45-F529-453C-92DC-BF7747CEEC0E"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:h:amd:epyc_7542:-:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "BC94B03B-A7FE-47AE-969D-FFEF278A7A9B"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:h:amd:epyc_7543:-:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "52544912-FAA3-4025-A5FD-151B21CEC53B"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:h:amd:epyc_7543p:-:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "77A0A47B-74A1-4731-92A8-BC10FFE58ECF"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:h:amd:epyc_7551:-:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "1AAB403A-5A36-4DC3-A187-99127CF77BA7"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:h:amd:epyc_7551p:-:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "01BE5D42-1C62-4381-89E0-8F3264F696EC"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:h:amd:epyc_7552:-:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "7A6C7497-1B63-490F-B8EA-D9F3CB790952"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:h:amd:epyc_75f3:-:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "EBF0AFED-588A-4EFB-8C90-9280BC3A6720"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:h:amd:epyc_7601:-:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "168076CD-1E6D-4328-AB59-4C1A90735AC4"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:h:amd:epyc_7642:-:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "1EDF8A1E-B259-43D0-A56C-8C2BB688A32C"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:h:amd:epyc_7643:-:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "98E1D79D-0CB0-4FD9-8A82-27CDFBFE07B2"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:h:amd:epyc_7662:-:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "3E8C6528-9100-41D2-88A2-FFEABAB8F86A"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:h:amd:epyc_7663:-:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "A7DFCB62-6CDF-4AD2-9265-1887E5780CA5"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:h:amd:epyc_7702:-:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "8AC99346-DBF1-4060-8E6B-35D315944ADA"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:h:amd:epyc_7702p:-:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "72C86198-0BD4-42E1-974B-70A49F82C411"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:h:amd:epyc_7713:-:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "4D698D3E-BB05-4C65-90F4-8DAE275CD6A4"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:h:amd:epyc_7713p:-:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "2299ED50-B4D2-4BB3-AD87-56D552B84AE1"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:h:amd:epyc_7742:-:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "88F4A126-B4A6-480A-9DD7-7F68714DFB49"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:h:amd:epyc_7763:-:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "4F900BDD-F094-41A6-9A23-31F53DBA95D4"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:h:amd:epyc_7f32:-:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "E25652AB-E243-4C40-BE12-AB53AF52CD61"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:h:amd:epyc_7f52:-:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "87543FB4-658A-4300-9DC9-836AC1D4BCFB"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:h:amd:epyc_7f72:-:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "07B3C659-C31A-4F82-9587-9F8A943F637D"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:h:amd:epyc_7h12:-:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "89FAAD8C-6DD1-408D-849B-0CE707321B13"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:h:amd:epyc_embedded_3101:-:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "839C6991-D387-471D-9112-C79677D5A5AB"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:h:amd:epyc_embedded_3151:-:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "3480338B-290F-4E9C-88F9-A4160853B9BD"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:h:amd:epyc_embedded_3201:-:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "6943C2EC-1555-40B8-9533-BBB6572E9073"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:h:amd:epyc_embedded_3251:-:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "44A54822-42B0-47B4-A080-416D5C8AC20C"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:h:amd:epyc_embedded_3255:-:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "2F8DDDB3-E4B0-4354-955F-E2196E404970"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:h:amd:epyc_embedded_3351:-:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "4C3B6175-0366-473D-A82F-E3F1373C74F5"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:h:amd:epyc_embedded_3451:-:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "C38BB8F3-11AD-48C3-B751-AF93E3EA6138"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"references": [
|
|
{
|
|
"url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1004",
|
|
"source": "psirt@amd.com",
|
|
"tags": [
|
|
"Vendor Advisory"
|
|
]
|
|
},
|
|
{
|
|
"url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1004",
|
|
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
|
"tags": [
|
|
"Vendor Advisory"
|
|
]
|
|
}
|
|
]
|
|
} |