CWE
77
Advisory Published
Updated

CVE-2021-26311: AMD Secure Encrypted Virtualization

First published: Tue May 11 2021(Updated: )

In the AMD SEV/SEV-ES feature, memory can be rearranged in the guest address space that is not detected by the attestation mechanism which could be used by a malicious hypervisor to potentially lead to arbitrary code execution within the guest VM if a malicious administrator has access to compromise the server hypervisor.

Credit: psirt@amd.com

Affected SoftwareAffected VersionHow to fix
Amd Epyc 7232p
Amd Epyc 7251
Amd Epyc 7252
Amd Epyc 7261
Amd Epyc 7262
Amd Epyc 7272
Amd Epyc 7281
Amd Epyc 7282
Amd Epyc 72f3
Amd Epyc 7301
Amd Epyc 7302
Amd Epyc 7302p
Amd Epyc 7313
Amd Epyc 7313p
Amd Epyc 7343
Amd Epyc 7351
Amd Epyc 7351p
Amd Epyc 7352
Amd Epyc 7371
Amd Epyc 73f3
Amd Epyc 7401
Amd Epyc 7401p
Amd Epyc 7402
Amd Epyc 7402p
Amd Epyc 7413
Amd Epyc 7443
Amd Epyc 7443p
Amd Epyc 7451
Amd Epyc 7452
Amd Epyc 7453
Amd Epyc 74f3
Amd Epyc 7501
Amd Epyc 7502
Amd Epyc 7502p
Amd Epyc 7513
Amd Epyc 7532
Amd Epyc 7542
Amd Epyc 7543
Amd Epyc 7543p
Amd Epyc 7551
Amd Epyc 7551p
Amd Epyc 7552
Amd Epyc 75f3
Amd Epyc 7601
Amd Epyc 7642
Amd Epyc 7643
Amd Epyc 7662
Amd Epyc 7663
Amd Epyc 7702
Amd Epyc 7702p
Amd Epyc 7713
Amd Epyc 7713p
Amd Epyc 7742
Amd Epyc 7763
Amd Epyc 7f32
Amd Epyc 7f52
Amd Epyc 7f72
Amd Epyc 7h12
Amd Epyc Embedded 3101
Amd Epyc Embedded 3151
Amd Epyc Embedded 3201
Amd Epyc Embedded 3251
Amd Epyc Embedded 3255
Amd Epyc Embedded 3351
Amd Epyc Embedded 3451

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Frequently Asked Questions

  • What is the vulnerability ID for this issue?

    The vulnerability ID for this issue is CVE-2021-26311.

  • What is the severity of CVE-2021-26311?

    The severity of CVE-2021-26311 is critical with a severity score of 7.2.

  • Which software versions are affected by CVE-2021-26311?

    The affected software versions include Amd Epyc 7232p, Amd Epyc 7251, Amd Epyc 7252, Microsoft Windows 11, and many more.

  • How can a malicious hypervisor exploit CVE-2021-26311?

    A malicious hypervisor can exploit CVE-2021-26311 by rearranging memory in the guest address space that is not detected by the attestation mechanism, potentially leading to arbitrary code execution within the guest VM.

  • Where can I find more information about CVE-2021-26311?

    You can find more information about CVE-2021-26311 at the following reference: [AMD Security Bulletin](https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1004).

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2024 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203