First published: Tue May 10 2022(Updated: )
Improper validation of destination address in SVC_LOAD_FW_IMAGE_BY_INSTANCE and SVC_LOAD_BINARY_BY_ATTRIB in a malicious UApp or ABL may allow an attacker to overwrite arbitrary bootloader memory with SPI ROM contents resulting in a loss of integrity and availability.
Credit: psirt@amd.com
Affected Software | Affected Version | How to fix |
---|---|---|
AMD EPYC 7763 Firmware | <milanpi-sp3_1.0.0.4 | |
AMD EPYC 7763 Firmware | ||
AMD EPYC 7713P Firmware | <milanpi-sp3_1.0.0.4 | |
AMD EPYC 7713P Firmware | ||
AMD EPYC 7713P Firmware | <milanpi-sp3_1.0.0.4 | |
AMD EPYC 7713 | ||
AMD EPYC 7663 Firmware | <milanpi-sp3_1.0.0.4 | |
AMD EPYC 7663 Firmware | ||
AMD EPYC 7643 Firmware | <milanpi-sp3_1.0.0.4 | |
AMD EPYC 7643 | ||
AMD EPYC 75F3 Firmware | <milanpi-sp3_1.0.0.4 | |
AMD EPYC 75F3 | ||
AMD EPYC 7543P Firmware | <milanpi-sp3_1.0.0.4 | |
AMD EPYC 7543P Firmware | ||
Amd Epyc Server Firmware | <milanpi-sp3_1.0.0.4 | |
AMD EPYC 7543 Firmware | ||
AMD EPYC 7513 Firmware | <milanpi-sp3_1.0.0.4 | |
AMD EPYC 7513 | ||
Amd Epyc Server Firmware | <milanpi-sp3_1.0.0.4 | |
AMD EPYC 7453 | ||
AMD EPYC 74F3 Firmware | <milanpi-sp3_1.0.0.4 | |
AMD EPYC 74F3 | ||
AMD EPYC 7443P Firmware | <milanpi-sp3_1.0.0.4 | |
AMD EPYC 7443P | ||
AMD EPYC 7443 Firmware | <milanpi-sp3_1.0.0.4 | |
AMD EPYC 7443 | ||
AMD EPYC 7413 Firmware | <milanpi-sp3_1.0.0.4 | |
AMD EPYC 7413 Firmware | ||
AMD EPYC 73F3 Firmware | <milanpi-sp3_1.0.0.4 | |
AMD EPYC 73F3 | ||
Amd Epyc Server Firmware | <milanpi-sp3_1.0.0.4 | |
AMD EPYC 7343 | ||
AMD EPYC 7313P Firmware | <milanpi-sp3_1.0.0.4 | |
AMD EPYC 7313P | ||
Amd Epyc Server Firmware | <milanpi-sp3_1.0.0.4 | |
AMD EPYC 7313P | ||
AMD EPYC 72F3 Firmware | <milanpi-sp3_1.0.0.4 | |
AMD EPYC 72F3 Firmware | ||
AMD EPYC 7773X Firmware | <milanpi-sp3_1.0.0.4 | |
AMD EPYC 7773X | ||
AMD EPYC 7473X Firmware | <milanpi-sp3_1.0.0.4 | |
AMD EPYC 7473X | ||
AMD EPYC 7573X Firmware | <milanpi-sp3_1.0.0.4 | |
AMD EPYC 7573X | ||
AMD EPYC 7373X Firmware | <milanpi-sp3_1.0.0.4 | |
AMD EPYC 7373X | ||
AMD EPYC 7002 Firmware | <romepi-sp3_1.0.0.c | |
AMD EPYC 7002 | ||
AMD EPYC 7232p firmware | <romepi-sp3_1.0.0.c | |
AMD EPYC 7232p firmware | ||
AMD EPYC 7252 Firmware | <romepi-sp3_1.0.0.c | |
AMD EPYC 7252 Firmware | ||
AMD EPYC 7262 Firmware | <romepi-sp3_1.0.0.c | |
AMD EPYC 7262 Firmware | ||
AMD EPYC 7272 firmware | <romepi-sp3_1.0.0.c | |
AMD EPYC 7272 firmware | ||
AMD EPYC 7282 Firmware | <romepi-sp3_1.0.0.c | |
AMD EPYC 7282 | ||
Amd Epyc Server Firmware | <romepi-sp3_1.0.0.c | |
AMD EPYC 7302P | ||
AMD EPYC 7302P Firmware | <romepi-sp3_1.0.0.c | |
AMD EPYC 7302P | ||
AMD EPYC 7352 firmware | <romepi-sp3_1.0.0.c | |
AMD EPYC 7352 | ||
Amd Epyc Server Firmware | <romepi-sp3_1.0.0.c | |
AMD EPYC 7402 | ||
AMD EPYC 7402P Firmware | <romepi-sp3_1.0.0.c | |
AMD EPYC 7402P | ||
AMD EPYC 7452 Firmware | <romepi-sp3_1.0.0.c | |
AMD EPYC 7452 | ||
Amd Epyc Server Firmware | <romepi-sp3_1.0.0.c | |
AMD EPYC 7502 | ||
AMD EPYC 7502P Firmware | <romepi-sp3_1.0.0.c | |
AMD EPYC 7502P | ||
AMD EPYC 7532 Firmware | <romepi-sp3_1.0.0.c | |
AMD EPYC 7532 | ||
AMD EPYC 7542 Firmware | <romepi-sp3_1.0.0.c | |
AMD EPYC 7542 | ||
AMD EPYC 7552 Firmware | <romepi-sp3_1.0.0.c | |
AMD EPYC Embedded 7552 | ||
AMD EPYC 7642 Firmware | <romepi-sp3_1.0.0.c | |
AMD EPYC 7642 Firmware | ||
AMD EPYC 7662 Firmware | <romepi-sp3_1.0.0.c | |
AMD EPYC 7662 | ||
AMD EPYC 7702 Firmware | <romepi-sp3_1.0.0.c | |
AMD EPYC 7702 | ||
AMD EPYC 7702 Firmware | <romepi-sp3_1.0.0.c | |
AMD EPYC 7702p | ||
AMD EPYC 7742 firmware | <romepi-sp3_1.0.0.c | |
AMD EPYC 7742 firmware | ||
AMD EPYC 7F72 Firmware | <romepi-sp3_1.0.0.c | |
AMD EPYC 7F72 | ||
AMD EPYC 7F52 Firmware | <romepi-sp3_1.0.0.c | |
AMD EPYC 7F52 | ||
AMD EPYC 7F32 Firmware | <romepi-sp3_1.0.0.c | |
AMD EPYC 7F32 Firmware | ||
AMD EPYC 7H12 Firmware | <romepi-sp3_1.0.0.c | |
AMD EPYC 7H12 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-26370 is classified as a medium severity vulnerability due to its potential to allow an attacker to overwrite arbitrary bootloader memory.
To fix CVE-2021-26370, update the affected AMD EPYC firmware to the latest version that is not vulnerable.
CVE-2021-26370 affects multiple AMD EPYC firmware versions that are below milanpi-sp3_1.0.0.4.
An attacker exploiting CVE-2021-26370 may achieve unauthorized access and modification of the bootloader memory, leading to a loss of system integrity and availability.
CVE-2021-26370 was publicly disclosed as part of AMD's Product Security Bulletin on October 2021.