{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2021-26344","assignerOrgId":"b58fc414-a1e4-4f92-9d70-1add41838648","state":"PUBLISHED","assignerShortName":"AMD","dateReserved":"2021-01-29T21:24:26.145Z","datePublished":"2024-08-13T16:49:52.889Z","dateUpdated":"2025-03-18T15:35:45.232Z"},"containers":{"cna":{"affected":[{"defaultStatus":"affected","product":"AMD EPYC™ 7001 Series Processors","vendor":"AMD","versions":[{"status":"affected","version":"various","versionType":"PI"}]},{"defaultStatus":"affected","product":"AMD EPYC™ 7002 Series Processors","vendor":"AMD","versions":[{"status":"unaffected","version":"RomePI 1.0.0.C"}]},{"defaultStatus":"affected","product":"AMD EPYC™ 7003 Series Processors","vendor":"AMD","versions":[{"status":"unaffected","version":"MilanPI 1.0.0.5"}]},{"defaultStatus":"affected","product":"AMD Ryzen™ 3000 Series Desktop Processors","vendor":"AMD","versions":[{"status":"affected","version":"various"}]},{"defaultStatus":"affected","product":"AMD Ryzen™ 5000 Series Desktop Processors","vendor":"AMD","versions":[{"status":"unaffected","version":"ComboAM4V2 1.2.0.A"}]},{"defaultStatus":"affected","product":"AMD Ryzen™ 5000 Series Desktop Processor with Radeon™ Graphics","vendor":"AMD","versions":[{"status":"unaffected","version":"ComboAM4V2 1.2.0.A"}]},{"defaultStatus":"affected","product":"AMD Athlon™ 3000 Series Desktop Processors with Radeon™ Graphics","vendor":"AMD","versions":[{"status":"affected","version":"various"}]},{"defaultStatus":"affected","product":"AMD Ryzen™ 4000 Series Desktop Processors with Radeon™ Graphics","vendor":"AMD","versions":[{"status":"affected","version":"various"}]},{"defaultStatus":"affected","product":"AMD Ryzen™ Threadripper™ 3000 Series Processors","vendor":"AMD","versions":[{"status":"affected","version":"various"}]},{"defaultStatus":"affected","product":"AMD Ryzen™ Threadripper™ PRO 5000WX Processors","vendor":"AMD","versions":[{"status":"unaffected","version":"ChagallWSPI-sWRX8  1.0.0.6"}]},{"defaultStatus":"affected","product":"AMD Athlon™ 3000 Series Mobile Processors with Radeon™ Graphics","vendor":"AMD","versions":[{"status":"affected","version":"various"}]},{"defaultStatus":"affected","product":"AMD Athlon™ 3000 Series Mobile Processors with Radeon™ Graphics","vendor":"AMD","versions":[{"status":"affected","version":"various"}]},{"defaultStatus":"affected","product":"AMD Ryzen™ 3000 Series Mobile Processors with Radeon™ Graphics","vendor":"AMD","versions":[{"status":"affected","version":"various"}]},{"defaultStatus":"affected","product":"AMD Ryzen™ 4000 Series Mobile Processors with Radeon™ Graphics","vendor":"AMD","versions":[{"status":"affected","version":"various"}]},{"defaultStatus":"affected","product":"AMD Ryzen™ 5000 Series Mobile Processors with Radeon™ Graphics","vendor":"AMD","versions":[{"status":"affected","version":"various"}]},{"defaultStatus":"affected","product":"AMD Ryzen™ 5000 Series Mobile Processors with Radeon™ Graphics","vendor":"AMD","versions":[{"status":"unaffected","version":"CezannePI-FP6 1.0.0.E"}]},{"defaultStatus":"affected","product":"AMD Ryzen™ 7020 Series Processors with Radeon™ Graphics","vendor":"AMD","versions":[{"status":"unaffected","version":"MendocinoPI-FT6 1.0.0.3"}]},{"defaultStatus":"affected","product":"AMD Ryzen™ 6000 Series Processors with Radeon™ Graphics","vendor":"AMD","versions":[{"status":"unaffected","version":"RembrandtPI-FP7 1.0.0.7"}]},{"defaultStatus":"affected","product":"AMD Ryzen™ 7035 Series Processors with Radeon™ Graphics","vendor":"AMD","versions":[{"status":"unaffected","version":"RembrandtPI-FP7 1.0.0.7"}]},{"defaultStatus":"affected","product":"AMD Ryzen™ 5000 Series Processors with Radeon™ Graphics","vendor":"AMD","versions":[{"status":"unaffected","version":"CezannePI-FP6 1.0.0.E"}]},{"defaultStatus":"affected","product":"AMD Ryzen™ 3000 Series Processors with Radeon™ Graphics","vendor":"AMD","versions":[{"status":"unaffected","version":"CezannePI-FP6 1.0.0.E"}]},{"defaultStatus":"affected","product":"AMD EPYC™ Embedded 7002 Series Processors","vendor":"AMD","versions":[{"status":"unaffected","version":"EmbRomePI-SP3  1.0.0.6"}]},{"defaultStatus":"affected","product":"AMD EPYC™ Embedded 3000 Series Processors","vendor":"AMD","versions":[{"status":"affected","version":"Various"}]},{"defaultStatus":"affected","product":"AMD EPYC™ Embedded 7003 Series Processors","vendor":"AMD","versions":[{"status":"unaffected","version":"EmbMilanPI-SP3  1.0.0.2"}]},{"defaultStatus":"affected","product":"AMD Ryzen™ Embedded R1000 Series Processors","vendor":"AMD","versions":[{"status":"affected","version":"v"}]},{"defaultStatus":"affected","product":"AMD Ryzen™ Embedded R2000 Series Processors","vendor":"AMD","versions":[{"status":"affected","version":"v"}]},{"defaultStatus":"affected","product":"AMD Ryzen™ Embedded 5000 Series Processors","vendor":"AMD","versions":[{"status":"affected","version":"v"}]},{"defaultStatus":"affected","product":"AMD Ryzen™ Embedded V1000 Series Processors","vendor":"AMD","versions":[{"status":"affected","version":"v"}]},{"defaultStatus":"affected","product":"AMD Ryzen™ Embedded V2000 Series Processors","vendor":"AMD","versions":[{"status":"affected","version":"v"}]},{"defaultStatus":"affected","product":"AMD Ryzen™ Embedded V3000 Series Processors","vendor":"AMD","versions":[{"status":"unaffected","version":"EmbeddedPI-FP7r2 1.0.0.4"}]}],"datePublic":"2024-08-13T16:00:00.000Z","descriptions":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"<span style=\"background-color: rgb(255, 255, 255);\">An out of bounds memory write when processing the AMD\nPSP1 Configuration Block (APCB) could allow an attacker with access the ability\nto modify the BIOS image, and the ability to sign the resulting image, to\npotentially modify the APCB block resulting in arbitrary code execution.\n\n\n\n<div><div><div>\n\n</div>\n\n</div>\n\n</div>\n\n\n\n\n\n</span>"}],"value":"An out of bounds memory write when processing the AMD\nPSP1 Configuration Block (APCB) could allow an attacker with access the ability\nto modify the BIOS image, and the ability to sign the resulting image, to\npotentially modify the APCB block resulting in arbitrary code execution."}],"metrics":[{"cvssV3_1":{"attackComplexity":"HIGH","attackVector":"LOCAL","availabilityImpact":"HIGH","baseScore":7.2,"baseSeverity":"HIGH","confidentialityImpact":"HIGH","integrityImpact":"HIGH","privilegesRequired":"HIGH","scope":"CHANGED","userInteraction":"REQUIRED","vectorString":"CVSS:3.1/AV:L/AC:H/PR:H/UI:R/S:C/C:H/I:H/A:H","version":"3.1"},"format":"CVSS","scenarios":[{"lang":"en","value":"GENERAL"}]}],"providerMetadata":{"orgId":"b58fc414-a1e4-4f92-9d70-1add41838648","shortName":"AMD","dateUpdated":"2024-08-13T16:49:52.889Z"},"references":[{"tags":["vendor-advisory"],"url":"https://www.amd.com/en/resources/product-security/bulletin/amd-sb-3003.html"}],"source":{"advisory":"AMD-SB-4002, AMD-SB-3002, AMD-SB-5001","discovery":"UNKNOWN"},"x_generator":{"engine":"Vulnogram 0.1.0-dev"}},"adp":[{"problemTypes":[{"descriptions":[{"type":"CWE","cweId":"CWE-787","lang":"en","description":"CWE-787 Out-of-bounds Write"}]}],"affected":[{"vendor":"amd","product":"naplespi","cpes":["cpe:2.3:h:amd:naplespi:-:*:*:*:*:*:*:*"],"defaultStatus":"unknown","versions":[{"version":"0","status":"affected","lessThan":"1.0.0.k","versionType":"custom"}]},{"vendor":"amd","product":"romepi","cpes":["cpe:2.3:h:amd:romepi:-:*:*:*:*:*:*:*"],"defaultStatus":"unknown","versions":[{"version":"0","status":"affected","lessThan":"1.0.0.C","versionType":"custom"}]},{"vendor":"amd","product":"milanpi","cpes":["cpe:2.3:h:amd:milanpi:-:*:*:*:*:*:*:*"],"defaultStatus":"unknown","versions":[{"version":"0","status":"affected","lessThan":"1.0.0.5","versionType":"custom"}]}],"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2024-08-13T18:29:11.333464Z","id":"CVE-2021-26344","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"total"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2025-03-18T15:35:45.232Z"}}]}}