Vulnerability Description
Insufficient input validation in SEV firmware may allow an attacker to perform out-of-bounds memory reads within the ASP boot loader, potentially leading to a denial of service.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Amd | Romepi Firmware | < 1.0.0.d |
| Amd | Romepi | - |
| Amd | Milanpi Firmware | < 1.0.0.5 |
| Amd | Milanpi | - |
Related Weaknesses (CWE)
References
- https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-1032Vendor Advisory
- https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-1032Vendor Advisory
FAQ
What is CVE-2021-46768?
CVE-2021-46768 is a vulnerability with a CVSS score of 5.5 (MEDIUM). Insufficient input validation in SEV firmware may allow an attacker to perform out-of-bounds memory reads within the ASP boot loader, potentially leading to a denial of service.
How severe is CVE-2021-46768?
CVE-2021-46768 has been rated MEDIUM with a CVSS base score of 5.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2021-46768?
Check the references section above for vendor advisories and patch information. Affected products include: Amd Romepi Firmware, Amd Romepi, Amd Milanpi Firmware, Amd Milanpi.