CVE-2021-26325
Severity CVSS v4.0:
Pending analysis
Type:
CWE-20
Input Validation
Publication date:
16/11/2021
Last modified:
19/11/2021
Description
Insufficient input validation in the SNP_GUEST_REQUEST command may lead to a potential data abort error and a denial of service.
Impact
Base Score 3.x
5.50
Severity 3.x
MEDIUM
Base Score 2.0
2.10
Severity 2.0
LOW
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:amd:epyc_7232p_firmware:*:*:*:*:*:*:*:* | romepi-sp3_1.0.0.c (excluding) | |
| cpe:2.3:h:amd:epyc_7232p:-:*:*:*:*:*:*:* | ||
| cpe:2.3:o:amd:epyc_7763_firmware:*:*:*:*:*:*:*:* | milanpi-sp3_1.0.0.4 (excluding) | |
| cpe:2.3:h:amd:epyc_7763:-:*:*:*:*:*:*:* | ||
| cpe:2.3:o:amd:epyc_7713p_firmware:*:*:*:*:*:*:*:* | milanpi-sp3_1.0.0.4 (excluding) | |
| cpe:2.3:h:amd:epyc_7713p:-:*:*:*:*:*:*:* | ||
| cpe:2.3:o:amd:epyc_7713_firmware:*:*:*:*:*:*:*:* | milanpi-sp3_1.0.0.4 (excluding) | |
| cpe:2.3:h:amd:epyc_7713:-:*:*:*:*:*:*:* | ||
| cpe:2.3:o:amd:epyc_7663_firmware:*:*:*:*:*:*:*:* | milanpi-sp3_1.0.0.4 (excluding) | |
| cpe:2.3:h:amd:epyc_7663:-:*:*:*:*:*:*:* | ||
| cpe:2.3:o:amd:epyc_7643_firmware:*:*:*:*:*:*:*:* | milanpi-sp3_1.0.0.4 (excluding) | |
| cpe:2.3:h:amd:epyc_7643:-:*:*:*:*:*:*:* | ||
| cpe:2.3:o:amd:epyc_75f3_firmware:*:*:*:*:*:*:*:* | milanpi-sp3_1.0.0.4 (excluding) | |
| cpe:2.3:h:amd:epyc_75f3:-:*:*:*:*:*:*:* | ||
| cpe:2.3:o:amd:epyc_7543p_firmware:*:*:*:*:*:*:*:* | milanpi-sp3_1.0.0.4 (excluding) |
To consult the complete list of CPE names with products and versions, see this page



