Input Validation Flaw in AMD Secure Processor Bootloader
CVE-2021-46756
9.1CRITICAL
Key Information:
Summary
The AMD Secure Processor bootloader exhibits an insufficient validation of user inputs in the SVC_MAP_USER_STACK. This flaw permits an attacker utilizing a compromised user application (Uapp) or a malicious ABL to issue malformed system calls to the bootloader, potentially leading to a denial of service and compromising the integrity of the system.
Affected Version(s)
1st Gen AMD EPYC™ Processors x86 various
2nd Gen AMD EPYC™ Processors x86 various
2nd Gen AMD Ryzen™ Threadripper™ Processors “Colfax” x86 various
References
EPSS Score
0% chance of being exploited in the next 30 days.
CVSS V3.1
Score:
9.1
Severity:
CRITICAL
Confidentiality:
None
Integrity:
High
Availability:
None
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved
Collectors
NVD DatabaseMitre Database