CVE-2021-26370
Severity CVSS v4.0:
Pending analysis
Type:
CWE-20
Input Validation
Publication date:
10/05/2022
Last modified:
18/05/2022
Description
Improper validation of destination address in SVC_LOAD_FW_IMAGE_BY_INSTANCE and SVC_LOAD_BINARY_BY_ATTRIB in a malicious UApp or ABL may allow an attacker to overwrite arbitrary bootloader memory with SPI ROM contents resulting in a loss of integrity and availability.
Impact
Base Score 3.x
7.10
Severity 3.x
HIGH
Base Score 2.0
6.60
Severity 2.0
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:amd:epyc_7763_firmware:*:*:*:*:*:*:*:* | milanpi-sp3_1.0.0.4 (excluding) | |
| cpe:2.3:h:amd:epyc_7763:-:*:*:*:*:*:*:* | ||
| cpe:2.3:o:amd:epyc_7713p_firmware:*:*:*:*:*:*:*:* | milanpi-sp3_1.0.0.4 (excluding) | |
| cpe:2.3:h:amd:epyc_7713p:-:*:*:*:*:*:*:* | ||
| cpe:2.3:o:amd:epyc_7713_firmware:*:*:*:*:*:*:*:* | milanpi-sp3_1.0.0.4 (excluding) | |
| cpe:2.3:h:amd:epyc_7713:-:*:*:*:*:*:*:* | ||
| cpe:2.3:o:amd:epyc_7663_firmware:*:*:*:*:*:*:*:* | milanpi-sp3_1.0.0.4 (excluding) | |
| cpe:2.3:h:amd:epyc_7663:-:*:*:*:*:*:*:* | ||
| cpe:2.3:o:amd:epyc_7643_firmware:*:*:*:*:*:*:*:* | milanpi-sp3_1.0.0.4 (excluding) | |
| cpe:2.3:h:amd:epyc_7643:-:*:*:*:*:*:*:* | ||
| cpe:2.3:o:amd:epyc_75f3_firmware:*:*:*:*:*:*:*:* | milanpi-sp3_1.0.0.4 (excluding) | |
| cpe:2.3:h:amd:epyc_75f3:-:*:*:*:*:*:*:* | ||
| cpe:2.3:o:amd:epyc_7543p_firmware:*:*:*:*:*:*:*:* | milanpi-sp3_1.0.0.4 (excluding) | |
| cpe:2.3:h:amd:epyc_7543p:-:*:*:*:*:*:*:* | ||
| cpe:2.3:o:amd:epyc_7543_firmware:*:*:*:*:*:*:*:* | milanpi-sp3_1.0.0.4 (excluding) |
To consult the complete list of CPE names with products and versions, see this page



