Vulnerability Details : CVE-2021-46744
An attacker with access to a malicious hypervisor may be able to infer data values used in a SEV guest on AMD CPUs by monitoring ciphertext values over time.
Products affected by CVE-2021-46744
- cpe:2.3:o:amd:epyc_7601_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:amd:epyc_7551p_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:amd:epyc_7551_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:amd:epyc_7501_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:amd:epyc_7451_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:amd:epyc_7401_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:amd:epyc_7371_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:amd:epyc_7351p_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:amd:epyc_7351_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:amd:epyc_7301_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:amd:epyc_7281_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:amd:epyc_7261_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:amd:epyc_7251_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:amd:epyc_7742_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:amd:epyc_7702_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:amd:epyc_7702p_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:amd:epyc_7662_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:amd:epyc_7642_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:amd:epyc_7552_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:amd:epyc_7542_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:amd:epyc_7532_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:amd:epyc_7502_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:amd:epyc_7502p_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:amd:epyc_7452_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:amd:epyc_7402_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:amd:epyc_7402p_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:amd:epyc_7352_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:amd:epyc_7302_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:amd:epyc_7302p_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:amd:epyc_7282_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:amd:epyc_7272_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:amd:epyc_7262_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:amd:epyc_7252_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:amd:epyc_7232p_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:amd:epyc_7763_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:amd:epyc_7713p_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:amd:epyc_7713_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:amd:epyc_7663_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:amd:epyc_7643_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:amd:epyc_7543p_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:amd:epyc_7543_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:amd:epyc_7513_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:amd:epyc_7453_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:amd:epyc_7443p_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:amd:epyc_7443_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:amd:epyc_7413_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:amd:epyc_7343_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:amd:epyc_7313p_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:amd:epyc_7313_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:amd:epyc_7003_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:amd:epyc_7002_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:amd:epyc_7001_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:amd:epyc_7401p_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:amd:epyc_embedded_3101_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:amd:epyc_embedded_3151_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:amd:epyc_embedded_3201_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:amd:epyc_embedded_3251_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:amd:epyc_embedded_3255_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:amd:epyc_embedded_3351_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:amd:epyc_embedded_3451_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:amd:epyc_embedded_7601_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:amd:epyc_embedded_7551_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:amd:epyc_embedded_7501_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:amd:epyc_embedded_7451_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:amd:epyc_embedded_7401_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:amd:epyc_embedded_7371_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:amd:epyc_embedded_7351_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:amd:epyc_embedded_7301_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:amd:epyc_embedded_7281_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:amd:epyc_embedded_7261_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:amd:epyc_embedded_7251_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:amd:epyc_embedded_755p_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:amd:epyc_embedded_740p_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:amd:epyc_embedded_735p_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:amd:epyc_embedded_7h12_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:amd:epyc_embedded_7742_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:amd:epyc_embedded_7702_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:amd:epyc_embedded_7662_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:amd:epyc_embedded_7642_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:amd:epyc_embedded_7552_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:amd:epyc_embedded_7542_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:amd:epyc_embedded_7532_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:amd:epyc_embedded_7502_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:amd:epyc_embedded_7452_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:amd:epyc_embedded_7f72_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:amd:epyc_embedded_7402_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:amd:epyc_embedded_7352_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:amd:epyc_embedded_7f52_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:amd:epyc_embedded_7302_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:amd:epyc_embedded_7282_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:amd:epyc_embedded_7272_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:amd:epyc_embedded_7f32_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:amd:epyc_embedded_7262_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:amd:epyc_embedded_7252_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:amd:epyc_embedded_7702p_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:amd:epyc_embedded_7502p_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:amd:epyc_embedded_7402p_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:amd:epyc_embedded_7302p_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:amd:epyc_embedded_7232p_firmware:-:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2021-46744
0.04%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 10 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2021-46744
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
2.1
|
LOW | AV:L/AC:L/Au:N/C:P/I:N/A:N |
3.9
|
2.9
|
NIST | |
6.5
|
MEDIUM | CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N |
2.0
|
4.0
|
NIST |
CWE ids for CVE-2021-46744
-
The product exposes a resource to the wrong control sphere, providing unintended actors with inappropriate access to the resource.Assigned by: nvd@nist.gov (Primary)
References for CVE-2021-46744
-
http://www.openwall.com/lists/oss-security/2022/08/08/6
oss-security - wolfSSL 5.4.0 fixes CVE-2022-34293 and other issuesMailing List;Third Party Advisory
-
https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1033
Ciphertext Side Channels on AMD SEV | AMDVendor Advisory
Jump to