First published: Tue Nov 16 2021(Updated: )
Insufficient input validation in the SNP_GUEST_REQUEST command may lead to a potential data abort error and a denial of service.
Credit: psirt@amd.com
Affected Software | Affected Version | How to fix |
---|---|---|
AMD EPYC 7232p firmware | <romepi-sp3_1.0.0.c | |
AMD EPYC 7232p firmware | ||
AMD EPYC 7763 Firmware | <milanpi-sp3_1.0.0.4 | |
AMD EPYC 7763 Firmware | ||
AMD EPYC 7713P Firmware | <milanpi-sp3_1.0.0.4 | |
AMD EPYC 7713P Firmware | ||
AMD EPYC 7713P Firmware | <milanpi-sp3_1.0.0.4 | |
AMD EPYC 7713 Firmware | ||
AMD EPYC 7663 Firmware | <milanpi-sp3_1.0.0.4 | |
AMD EPYC 7663 Firmware | ||
AMD EPYC 7643P Firmware | <milanpi-sp3_1.0.0.4 | |
AMD EPYC 7643 Firmware | ||
AMD EPYC 75F3 Firmware | <milanpi-sp3_1.0.0.4 | |
AMD EPYC 75F3 Firmware | ||
AMD EPYC 7543P Firmware | <milanpi-sp3_1.0.0.4 | |
AMD EPYC 7543P Firmware | ||
Amd Epyc Server Firmware | <milanpi-sp3_1.0.0.4 | |
AMD EPYC 7543 Firmware | ||
AMD EPYC 7513 Firmware | <milanpi-sp3_1.0.0.4 | |
AMD EPYC 7513 Firmware | ||
Amd Epyc Server Firmware | <milanpi-sp3_1.0.0.4 | |
AMD EPYC 7453 | ||
AMD EPYC 74F3 Firmware | <milanpi-sp3_1.0.0.4 | |
AMD EPYC 74F3 Firmware | ||
AMD EPYC 7443P Firmware | <milanpi-sp3_1.0.0.4 | |
AMD EPYC 7443P Firmware | ||
AMD EPYC 7443P Firmware | <milanpi-sp3_1.0.0.4 | |
AMD EPYC 7443P | ||
AMD EPYC 7413 Firmware | <milanpi-sp3_1.0.0.4 | |
AMD EPYC 7413 Firmware | ||
AMD EPYC 73F3 Firmware | <milanpi-sp3_1.0.0.4 | |
AMD EPYC 73F3 Firmware | ||
Amd Epyc Server Firmware | <milanpi-sp3_1.0.0.4 | |
AMD EPYC 7343 Firmware | ||
AMD EPYC 7313P Firmware | <milanpi-sp3_1.0.0.4 | |
AMD EPYC 7313P Firmware | ||
AMD EPYC 7313P Firmware | <milanpi-sp3_1.0.0.4 | |
AMD EPYC 7313 Firmware | ||
AMD EPYC 72F3 Firmware | <milanpi-sp3_1.0.0.4 | |
AMD EPYC 72F3 Firmware |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2021-26325.
The severity of CVE-2021-26325 is medium, with a severity value of 5.5.
The affected software includes AMD Epyc 7232p Firmware (up to version romepi-sp3_1.0.0.c), AMD Epyc 7763 Firmware (up to version milanpi-sp3_1.0.0.4), and others.
The potential impact of CVE-2021-26325 is a data abort error and a denial of service.
You can find more information about CVE-2021-26325 on the AMD Product Security Bulletin page at https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1021.