Search Results (Refine Search)
- Results Type: Overview
- Keyword (text search): cpe:2.3:h:amd:epyc_7451:-:*:*:*:*:*:*:*
- CPE Name Search: true
Vuln ID | Summary | CVSS Severity |
---|---|---|
CVE-2021-46744 |
An attacker with access to a malicious hypervisor may be able to infer data values used in a SEV guest on AMD CPUs by monitoring ciphertext values over time. Published: May 11, 2022; 1:15:09 PM -0400 |
V3.1: 6.5 MEDIUM V2.0: 2.1 LOW |
CVE-2021-26342 |
In SEV guest VMs, the CPU may fail to flush the Translation Lookaside Buffer (TLB) following a particular sequence of operations that includes creation of a new virtual machine control block (VMCB). The failure to flush the TLB may cause the microcode to use stale TLB translations which may allow for disclosure of SEV guest memory contents. Users of SEV-ES/SEV-SNP guest VMs are not impacted by this vulnerability. Published: May 11, 2022; 1:15:08 PM -0400 |
V3.1: 3.3 LOW V2.0: 2.1 LOW |
CVE-2021-26408 |
Insufficient validation of elliptic curve points in SEV-legacy firmware may compromise SEV-legacy guest migration potentially resulting in loss of guest's integrity or confidentiality. Published: May 10, 2022; 3:15:08 PM -0400 |
V3.1: 7.1 HIGH V2.0: 6.6 MEDIUM |
CVE-2021-26401 |
LFENCE/JMP (mitigation V2-2) may not sufficiently mitigate CVE-2017-5715 on some AMD CPUs. Published: March 11, 2022; 1:15:11 PM -0500 |
V3.1: 5.6 MEDIUM V2.0: 1.9 LOW |
CVE-2021-26341 |
Some AMD CPUs may transiently execute beyond unconditional direct branches, which may potentially result in data leakage. Published: March 11, 2022; 1:15:10 PM -0500 |
V3.1: 6.5 MEDIUM V2.0: 2.1 LOW |
CVE-2020-12966 |
AMD EPYC™ Processors contain an information disclosure vulnerability in the Secure Encrypted Virtualization with Encrypted State (SEV-ES) and Secure Encrypted Virtualization with Secure Nested Paging (SEV-SNP). A local authenticated attacker could potentially exploit this vulnerability leading to leaking guest data by the malicious hypervisor. Published: February 04, 2022; 6:15:10 PM -0500 |
V3.1: 5.5 MEDIUM V2.0: 2.1 LOW |
CVE-2021-26340 |
A malicious hypervisor in conjunction with an unprivileged attacker process inside an SEV/SEV-ES guest VM may fail to flush the Translation Lookaside Buffer (TLB) resulting in unexpected behavior inside the virtual machine (VM). Published: December 10, 2021; 5:15:08 PM -0500 |
V3.1: 8.4 HIGH V2.0: 3.6 LOW |
CVE-2021-26335 |
Improper input and range checking in the AMD Secure Processor (ASP) boot loader image header may allow an attacker to use attacker-controlled values prior to signature validation potentially resulting in arbitrary code execution. Published: November 16, 2021; 2:15:08 PM -0500 |
V3.1: 7.8 HIGH V2.0: 7.2 HIGH |
CVE-2021-26331 |
AMD System Management Unit (SMU) contains a potential issue where a malicious user may be able to manipulate mailbox entries leading to arbitrary code execution. Published: November 16, 2021; 2:15:08 PM -0500 |
V3.1: 7.8 HIGH V2.0: 7.2 HIGH |
CVE-2021-26330 |
AMD System Management Unit (SMU) may experience a heap-based overflow which may result in a loss of resources. Published: November 16, 2021; 2:15:08 PM -0500 |
V3.1: 5.5 MEDIUM V2.0: 2.1 LOW |
CVE-2021-26321 |
Insufficient ID command validation in the SEV Firmware may allow a local authenticated attacker to perform a denial of service of the PSP. Published: November 16, 2021; 2:15:07 PM -0500 |
V3.1: 5.5 MEDIUM V2.0: 4.9 MEDIUM |
CVE-2021-26320 |
Insufficient validation of the AMD SEV Signing Key (ASK) in the SEND_START command in the SEV Firmware may allow a local authenticated attacker to perform a denial of service of the PSP Published: November 16, 2021; 2:15:07 PM -0500 |
V3.1: 5.5 MEDIUM V2.0: 2.1 LOW |
CVE-2020-12954 |
A side effect of an integrated chipset option may be able to be used by an attacker to bypass SPI ROM protections, allowing unauthorized SPI ROM modification. Published: November 16, 2021; 2:15:07 PM -0500 |
V3.1: 5.5 MEDIUM V2.0: 2.1 LOW |
CVE-2020-12951 |
Race condition in ASP firmware could allow less privileged x86 code to perform ASP SMM (System Management Mode) operations. Published: November 16, 2021; 2:15:07 PM -0500 |
V3.1: 7.0 HIGH V2.0: 4.4 MEDIUM |
CVE-2020-12944 |
Insufficient validation of BIOS image length by ASP Firmware could lead to arbitrary code execution. Published: November 16, 2021; 2:15:07 PM -0500 |
V3.1: 7.8 HIGH V2.0: 4.6 MEDIUM |
CVE-2021-26329 |
AMD System Management Unit (SMU) may experience an integer overflow when an invalid length is provided which may result in a potential loss of resources. Published: November 16, 2021; 1:15:07 PM -0500 |
V3.1: 5.5 MEDIUM V2.0: 2.1 LOW |
CVE-2021-26322 |
Persistent platform private key may not be protected with a random IV leading to a potential “two time pad attack”. Published: November 16, 2021; 1:15:07 PM -0500 |
V3.1: 7.5 HIGH V2.0: 5.0 MEDIUM |
CVE-2021-26312 |
Failure to flush the Translation Lookaside Buffer (TLB) of the I/O memory management unit (IOMMU) may lead an IO device to write to memory it should not be able to access, resulting in a potential loss of integrity. Published: November 16, 2021; 1:15:07 PM -0500 |
V3.1: 5.5 MEDIUM V2.0: 2.1 LOW |
CVE-2020-12988 |
A potential denial of service (DoS) vulnerability exists in the integrated chipset that may allow a malicious attacker to hang the system when it is rebooted. Published: June 11, 2021; 6:15:11 PM -0400 |
V3.1: 7.5 HIGH V2.0: 7.8 HIGH |
CVE-2021-26311 |
In the AMD SEV/SEV-ES feature, memory can be rearranged in the guest address space that is not detected by the attestation mechanism which could be used by a malicious hypervisor to potentially lead to arbitrary code execution within the guest VM if a malicious administrator has access to compromise the server hypervisor. Published: May 13, 2021; 8:15:07 AM -0400 |
V3.1: 7.2 HIGH V2.0: 9.0 HIGH |