First published: Tue May 11 2021(Updated: )
In the AMD SEV/SEV-ES feature, memory can be rearranged in the guest address space that is not detected by the attestation mechanism which could be used by a malicious hypervisor to potentially lead to arbitrary code execution within the guest VM if a malicious administrator has access to compromise the server hypervisor.
Credit: psirt@amd.com
Affected Software | Affected Version | How to fix |
---|---|---|
Amd Epyc 7232p | ||
Amd Epyc 7251 | ||
Amd Epyc 7252 | ||
Amd Epyc 7261 | ||
Amd Epyc 7262 | ||
Amd Epyc 7272 | ||
Amd Epyc 7281 | ||
Amd Epyc 7282 | ||
Amd Epyc 72f3 | ||
Amd Epyc 7301 | ||
Amd Epyc 7302 | ||
Amd Epyc 7302p | ||
Amd Epyc 7313 | ||
Amd Epyc 7313p | ||
Amd Epyc 7343 | ||
Amd Epyc 7351 | ||
Amd Epyc 7351p | ||
Amd Epyc 7352 | ||
Amd Epyc 7371 | ||
Amd Epyc 73f3 | ||
Amd Epyc 7401 | ||
Amd Epyc 7401p | ||
Amd Epyc 7402 | ||
Amd Epyc 7402p | ||
Amd Epyc 7413 | ||
Amd Epyc 7443 | ||
Amd Epyc 7443p | ||
Amd Epyc 7451 | ||
Amd Epyc 7452 | ||
Amd Epyc 7453 | ||
Amd Epyc 74f3 | ||
Amd Epyc 7501 | ||
Amd Epyc 7502 | ||
Amd Epyc 7502p | ||
Amd Epyc 7513 | ||
Amd Epyc 7532 | ||
Amd Epyc 7542 | ||
Amd Epyc 7543 | ||
Amd Epyc 7543p | ||
Amd Epyc 7551 | ||
Amd Epyc 7551p | ||
Amd Epyc 7552 | ||
Amd Epyc 75f3 | ||
Amd Epyc 7601 | ||
Amd Epyc 7642 | ||
Amd Epyc 7643 | ||
Amd Epyc 7662 | ||
Amd Epyc 7663 | ||
Amd Epyc 7702 | ||
Amd Epyc 7702p | ||
Amd Epyc 7713 | ||
Amd Epyc 7713p | ||
Amd Epyc 7742 | ||
Amd Epyc 7763 | ||
Amd Epyc 7f32 | ||
Amd Epyc 7f52 | ||
Amd Epyc 7f72 | ||
Amd Epyc 7h12 | ||
Amd Epyc Embedded 3101 | ||
Amd Epyc Embedded 3151 | ||
Amd Epyc Embedded 3201 | ||
Amd Epyc Embedded 3251 | ||
Amd Epyc Embedded 3255 | ||
Amd Epyc Embedded 3351 | ||
Amd Epyc Embedded 3451 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this issue is CVE-2021-26311.
The severity of CVE-2021-26311 is critical with a severity score of 7.2.
The affected software versions include Amd Epyc 7232p, Amd Epyc 7251, Amd Epyc 7252, Microsoft Windows 11, and many more.
A malicious hypervisor can exploit CVE-2021-26311 by rearranging memory in the guest address space that is not detected by the attestation mechanism, potentially leading to arbitrary code execution within the guest VM.
You can find more information about CVE-2021-26311 at the following reference: [AMD Security Bulletin](https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1004).