CVE-2021-26311 vulnerability in AMD Products
Published on May 13, 2021
AMD Secure Encrypted Virtualization
In the AMD SEV/SEV-ES feature, memory can be rearranged in the guest address space that is not detected by the attestation mechanism which could be used by a malicious hypervisor to potentially lead to arbitrary code execution within the guest VM if a malicious administrator has access to compromise the server hypervisor.
Products Associated with CVE-2021-26311
Want to know whenever a new CVE is published for AMD products? stack.watch will email you.
Affected Versions
AMD SEV/SEV-ES:- Version unspecified and below SEV-SNP is affected.
Exploit Probability
EPSS (Exploit Prediction Scoring System) scores estimate the probability that a vulnerability will be exploited in the wild within the next 30 days. The percentile shows you how this score compares to all other vulnerabilities.