5.5
CVE-2021-26329
- EPSS 0.05%
- Published 16.11.2021 18:15:07
- Last modified 21.11.2024 05:56:06
- Source psirt@amd.com
- Teams watchlist Login
- Open Login
AMD System Management Unit (SMU) may experience an integer overflow when an invalid length is provided which may result in a potential loss of resources.
Data is provided by the National Vulnerability Database (NVD)
Amd ≫ Epyc 7601 Firmware Version < naplespi-sp3_1.0.0.g
Amd ≫ Epyc 7551p Firmware Version < naplespi-sp3_1.0.0.g
Amd ≫ Epyc 7551 Firmware Version < naplespi-sp3_1.0.0.g
Amd ≫ Epyc 7501 Firmware Version < naplespi-sp3_1.0.0.g
Amd ≫ Epyc 7451 Firmware Version < naplespi-sp3_1.0.0.g
Amd ≫ Epyc 7401 Firmware Version < naplespi-sp3_1.0.0.g
Amd ≫ Epyc 7371 Firmware Version < naplespi-sp3_1.0.0.g
Amd ≫ Epyc 7351p Firmware Version < naplespi-sp3_1.0.0.g
Amd ≫ Epyc 7351 Firmware Version < naplespi-sp3_1.0.0.g
Amd ≫ Epyc 7301 Firmware Version < naplespi-sp3_1.0.0.g
Amd ≫ Epyc 7281 Firmware Version < naplespi-sp3_1.0.0.g
Amd ≫ Epyc 7261 Firmware Version < naplespi-sp3_1.0.0.g
Amd ≫ Epyc 7251 Firmware Version < naplespi-sp3_1.0.0.g
Amd ≫ Epyc 7f72 Firmware Version < romepi-sp3_1.0.0.c
Amd ≫ Epyc 7f52 Firmware Version < romepi-sp3_1.0.0.c
Amd ≫ Epyc 7f32 Firmware Version < romepi-sp3_1.0.0.c
Amd ≫ Epyc 7h12 Firmware Version < romepi-sp3_1.0.0.c
Amd ≫ Epyc 7742 Firmware Version < romepi-sp3_1.0.0.c
Amd ≫ Epyc 7702 Firmware Version < romepi-sp3_1.0.0.c
Amd ≫ Epyc 7702p Firmware Version < romepi-sp3_1.0.0.c
Amd ≫ Epyc 7662 Firmware Version < romepi-sp3_1.0.0.c
Amd ≫ Epyc 7642 Firmware Version < romepi-sp3_1.0.0.c
Amd ≫ Epyc 7552 Firmware Version < romepi-sp3_1.0.0.c
Amd ≫ Epyc 7542 Firmware Version < romepi-sp3_1.0.0.c
Amd ≫ Epyc 7532 Firmware Version < romepi-sp3_1.0.0.c
Amd ≫ Epyc 7502 Firmware Version < romepi-sp3_1.0.0.c
Amd ≫ Epyc 7502p Firmware Version < romepi-sp3_1.0.0.c
Amd ≫ Epyc 7452 Firmware Version < romepi-sp3_1.0.0.c
Amd ≫ Epyc 7402 Firmware Version < romepi-sp3_1.0.0.c
Amd ≫ Epyc 7402p Firmware Version < romepi-sp3_1.0.0.c
Amd ≫ Epyc 7352 Firmware Version < romepi-sp3_1.0.0.c
Amd ≫ Epyc 7302 Firmware Version < romepi-sp3_1.0.0.c
Amd ≫ Epyc 7302p Firmware Version < romepi-sp3_1.0.0.c
Amd ≫ Epyc 7282 Firmware Version < romepi-sp3_1.0.0.c
Amd ≫ Epyc 7272 Firmware Version < romepi-sp3_1.0.0.c
Amd ≫ Epyc 7262 Firmware Version < romepi-sp3_1.0.0.c
Amd ≫ Epyc 7252 Firmware Version < romepi-sp3_1.0.0.c
Amd ≫ Epyc 7232p Firmware Version < romepi-sp3_1.0.0.c
Amd ≫ Epyc 7763 Firmware Version < milanpi-sp3_1.0.0.4
Amd ≫ Epyc 7713p Firmware Version < milanpi-sp3_1.0.0.4
Amd ≫ Epyc 7713 Firmware Version < milanpi-sp3_1.0.0.4
Amd ≫ Epyc 7663 Firmware Version < milanpi-sp3_1.0.0.4
Amd ≫ Epyc 7643 Firmware Version < milanpi-sp3_1.0.0.4
Amd ≫ Epyc 75f3 Firmware Version < milanpi-sp3_1.0.0.4
Amd ≫ Epyc 7543p Firmware Version < milanpi-sp3_1.0.0.4
Amd ≫ Epyc 7543 Firmware Version < milanpi-sp3_1.0.0.4
Amd ≫ Epyc 7513 Firmware Version < milanpi-sp3_1.0.0.4
Amd ≫ Epyc 7453 Firmware Version < milanpi-sp3_1.0.0.4
Amd ≫ Epyc 74f3 Firmware Version < milanpi-sp3_1.0.0.4
Amd ≫ Epyc 7443p Firmware Version < milanpi-sp3_1.0.0.4
Amd ≫ Epyc 7443 Firmware Version < milanpi-sp3_1.0.0.4
Amd ≫ Epyc 7413 Firmware Version < milanpi-sp3_1.0.0.4
Amd ≫ Epyc 73f3 Firmware Version < milanpi-sp3_1.0.0.4
Amd ≫ Epyc 7343 Firmware Version < milanpi-sp3_1.0.0.4
Amd ≫ Epyc 7313p Firmware Version < milanpi-sp3_1.0.0.4
Amd ≫ Epyc 7313 Firmware Version < milanpi-sp3_1.0.0.4
Amd ≫ Epyc 72f3 Firmware Version < milanpi-sp3_1.0.0.4
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Type | Source | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 0.05% | 0.152 |
Source | Base Score | Exploit Score | Impact Score | Vector string |
---|---|---|---|---|
nvd@nist.gov | 5.5 | 1.8 | 3.6 |
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
|
nvd@nist.gov | 2.1 | 3.9 | 2.9 |
AV:L/AC:L/Au:N/C:N/I:N/A:P
|
CWE-130 Improper Handling of Length Parameter Inconsistency
The product parses a formatted message or structure, but it does not handle or incorrectly handles a length field that is inconsistent with the actual length of the associated data.
CWE-190 Integer Overflow or Wraparound
The product performs a calculation that can produce an integer overflow or wraparound when the logic assumes that the resulting value will always be larger than the original value. This occurs when an integer value is incremented to a value that is too large to store in the associated representation. When this occurs, the value may become a very small or negative number.