4.4
CVE-2021-26328
- EPSS 0.06%
- Published 11.01.2023 08:15:10
- Last modified 09.04.2025 15:15:43
- Source psirt@amd.com
- Teams watchlist Login
- Open Login
Failure to verify the mode of CPU execution at the time of SNP_INIT may lead to a potential loss of memory integrity for SNP guests.
Data is provided by the National Vulnerability Database (NVD)
Amd ≫ Epyc 7003 Firmware Version < milanpi_1.0.0.8
Amd ≫ Epyc 72f3 Firmware Version < milanpi_1.0.0.8
Amd ≫ Epyc 7313 Firmware Version < milanpi_1.0.0.8
Amd ≫ Epyc 7313p Firmware Version < milanpi_1.0.0.8
Amd ≫ Epyc 7343 Firmware Version < milanpi_1.0.0.8
Amd ≫ Epyc 7373x Firmware Version < milanpi_1.0.0.8
Amd ≫ Epyc 73f3 Firmware Version < milanpi_1.0.0.8
Amd ≫ Epyc 7413 Firmware Version < milanpi_1.0.0.8
Amd ≫ Epyc 7443 Firmware Version < milanpi_1.0.0.8
Amd ≫ Epyc 7443p Firmware Version < milanpi_1.0.0.8
Amd ≫ Epyc 7453 Firmware Version < milanpi_1.0.0.8
Amd ≫ Epyc 74f3 Firmware Version < milanpi_1.0.0.8
Amd ≫ Epyc 7513 Firmware Version < milanpi_1.0.0.8
Amd ≫ Epyc 7543 Firmware Version < milanpi_1.0.0.8
Amd ≫ Epyc 7543p Firmware Version < milanpi_1.0.0.8
Amd ≫ Epyc 7573x Firmware Version < milanpi_1.0.0.8
Amd ≫ Epyc 75f3 Firmware Version < milanpi_1.0.0.8
Amd ≫ Epyc 7643 Firmware Version < milanpi_1.0.0.8
Amd ≫ Epyc 7663 Firmware Version < milanpi_1.0.0.8
Amd ≫ Epyc 7713 Firmware Version < milanpi_1.0.0.8
Amd ≫ Epyc 7713p Firmware Version < milanpi_1.0.0.8
Amd ≫ Epyc 7743 Firmware Version < milanpi_1.0.0.8
Amd ≫ Epyc 7763 Firmware Version < milanpi_1.0.0.8
Amd ≫ Epyc 7773x Firmware Version < milanpi_1.0.0.8
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Type | Source | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 0.06% | 0.188 |
Source | Base Score | Exploit Score | Impact Score | Vector string |
---|---|---|---|---|
nvd@nist.gov | 4.4 | 1.8 | 2.5 |
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L
|
134c704f-9b21-4f2e-91b3-4a467353bcc0 | 4.4 | 1.8 | 2.5 |
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L
|
CWE-358 Improperly Implemented Security Check for Standard
The product does not implement or incorrectly implements one or more security-relevant checks as specified by the design of a standardized algorithm, protocol, or technique.