CVE-2021-26315

7.8 HIGH

📋 TL;DR

This vulnerability in AMD's Platform Security Processor (PSP) boot ROM allows attackers to execute arbitrary code when encrypted firmware images are loaded, due to insufficient integrity verification after decryption. It affects systems with AMD processors that use the PSP for secure boot functionality. This is a hardware/firmware-level vulnerability that could compromise the system's security foundation.

💻 Affected Systems

Products:
  • AMD Ryzen processors
  • AMD EPYC processors
  • AMD Athlon processors with Radeon Graphics
Versions: Various processor families and firmware versions prior to patched AGESA versions
Operating Systems: All operating systems running on affected AMD hardware
Default Config Vulnerable: ⚠️ Yes
Notes: Vulnerability exists at the hardware/firmware level, affecting all operating systems running on compromised hardware. Requires physical access or administrative privileges to exploit.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise including bypass of secure boot, installation of persistent firmware-level malware, and potential theft of encryption keys and sensitive data.

🟠

Likely Case

Local privilege escalation allowing attackers to gain higher privileges on the system, potentially leading to full system control.

🟢

If Mitigated

Limited impact if systems are physically secured and have strict access controls, though firmware-level compromise remains possible.

🌐 Internet-Facing: LOW
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: HIGH

Exploitation requires physical access or administrative privileges to flash malicious firmware. No public exploit code is known.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Updated AGESA firmware versions (specific versions vary by motherboard manufacturer)

Vendor Advisory: https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1021

Restart Required: Yes

Instructions:

1. Check motherboard manufacturer's website for BIOS/UEFI updates. 2. Download latest BIOS/UEFI firmware containing patched AGESA. 3. Follow manufacturer's instructions to flash updated firmware. 4. Verify successful update in system BIOS/UEFI settings.

🔧 Temporary Workarounds

Physical Security Controls

all

Restrict physical access to systems to prevent firmware flashing attacks

Secure Boot Enforcement

all

Enable and enforce secure boot to prevent unauthorized firmware modifications

🧯 If You Can't Patch

  • Implement strict physical security controls to prevent unauthorized access
  • Monitor for unauthorized firmware modification attempts and maintain hardware integrity logs

🔍 How to Verify

Check if Vulnerable:

Check system BIOS/UEFI version against motherboard manufacturer's patched versions. Use 'wmic bios get smbiosbiosversion' on Windows or 'dmidecode -t bios' on Linux.

Check Version:

Windows: wmic bios get smbiosbiosversion | Linux: sudo dmidecode -t bios | grep Version

Verify Fix Applied:

Verify BIOS/UEFI version matches or exceeds manufacturer's recommended patched version. Check that AGESA version includes fixes for CVE-2021-26315.

📡 Detection & Monitoring

Log Indicators:

  • BIOS/UEFI firmware modification events
  • Unauthorized physical access logs
  • Secure boot violation events

Network Indicators:

  • Unusual outbound connections from firmware management interfaces

SIEM Query:

EventID=12 OR EventID=13 (System events for firmware changes) OR unauthorized physical access alerts

🔗 References

📤 Share & Export