CVE-2021-26362

7.1 HIGH

📋 TL;DR

This AMD processor vulnerability allows malicious or compromised applications to issue malformed system calls that map sensitive System Management Network registers, potentially compromising system integrity and availability. It affects systems with vulnerable AMD processors when running untrusted applications.

💻 Affected Systems

Products:
  • AMD EPYC 7002 Series Processors
  • AMD EPYC 7003 Series Processors
Versions: All versions before microcode patches
Operating Systems: All operating systems running on affected hardware
Default Config Vulnerable: ⚠️ Yes
Notes: Requires attacker to have ability to execute code on the system, typically through compromised applications.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise allowing attackers to bypass security controls, access sensitive data, or cause system crashes.

🟠

Likely Case

Privilege escalation or denial of service attacks from compromised applications.

🟢

If Mitigated

Limited impact with proper application sandboxing and security controls in place.

🌐 Internet-Facing: LOW
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: HIGH

Exploitation requires local code execution and detailed knowledge of AMD processor architecture.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Microcode updates via BIOS/UEFI updates

Vendor Advisory: https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1027

Restart Required: Yes

Instructions:

1. Check with your system manufacturer for BIOS/UEFI updates. 2. Apply the firmware update following manufacturer instructions. 3. Reboot the system to activate the microcode patch.

🔧 Temporary Workarounds

Application Sandboxing

all

Restrict application privileges and isolate untrusted applications

Principle of Least Privilege

all

Ensure applications run with minimal necessary permissions

🧯 If You Can't Patch

  • Implement strict application whitelisting and only run trusted applications
  • Isolate vulnerable systems in separate network segments with strict access controls

🔍 How to Verify

Check if Vulnerable:

Check BIOS/UEFI version against manufacturer's patched versions. Use 'dmidecode -t bios' on Linux or system information tools on Windows.

Check Version:

Linux: 'dmidecode -t bios' or 'cat /proc/cpuinfo | grep microcode'. Windows: 'wmic bios get smbiosbiosversion'

Verify Fix Applied:

Verify BIOS/UEFI version matches or exceeds manufacturer's patched version. Check with 'cat /proc/cpuinfo' on Linux for microcode version.

📡 Detection & Monitoring

Log Indicators:

  • Unexpected system crashes
  • Unusual privilege escalation attempts
  • Malformed system call patterns

Network Indicators:

  • Unusual outbound connections from compromised systems

SIEM Query:

EventID=6008 OR EventID=41 (Windows system crashes) combined with suspicious process creation events

🔗 References

📤 Share & Export