Possible Overwrite of Guest Memory or UMC Seed in SNP Firmware
CVE-2024-21980
7.9HIGH
Key Information:
- Vendor
- Amd
- Status
- Vendor
- CVE Published:
- 5 August 2024
Summary
The vulnerability in AMD's SNP firmware arises from improper restrictions on write operations that could be exploited by a malicious hypervisor. This flaw allows unauthorized write actions, which could lead to overwriting a guest's memory or the UMC seed. Such an attack poses serious risks, including a potential breach of confidentiality and integrity, exposing sensitive information and disrupting system operations. Users of AMD's SNP Firmware are advised to assess their environments for this vulnerability and take appropriate measures to mitigate associated risks.
Affected Version(s)
3rd Gen AMD EPYC™ Processors various
4th Gen AMD EPYC™ Processors various
AMD EPYC™ Embedded 7003 various
References
CVSS V3.1
Score:
7.9
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Local
Attack Complexity:
Low
Privileges Required:
High
User Interaction:
None
Scope:
Changed
Timeline
Vulnerability published
Vulnerability Reserved
Collectors
NVD DatabaseMitre Database