CVE-2021-26408

7.1 HIGH

📋 TL;DR

This vulnerability in AMD SEV-legacy firmware allows insufficient validation of elliptic curve points during guest migration. Attackers could potentially compromise guest integrity or confidentiality during migration operations. This affects systems using AMD EPYC processors with SEV-legacy enabled.

💻 Affected Systems

Products:
  • AMD EPYC processors with SEV-legacy firmware
Versions: SEV-legacy firmware versions prior to fixes
Operating Systems: All guest operating systems using SEV-legacy
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects systems with SEV-legacy enabled and using guest migration features.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of guest VM confidentiality and integrity during migration, allowing attackers to access sensitive data or modify guest execution.

🟠

Likely Case

Potential data leakage or integrity compromise during migration between trusted hosts in controlled environments.

🟢

If Mitigated

Minimal impact if migration occurs only between fully trusted hosts with proper isolation controls.

🌐 Internet-Facing: LOW - SEV-legacy migration typically occurs within controlled data center environments, not directly internet-facing.
🏢 Internal Only: MEDIUM - Risk exists within data center environments where guest migration occurs between potentially untrusted hosts.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: HIGH

Exploitation requires access to migration infrastructure and knowledge of SEV-legacy internals.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Refer to AMD advisory for specific firmware versions

Vendor Advisory: https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1021

Restart Required: Yes

Instructions:

1. Check AMD advisory for affected processor models. 2. Obtain updated firmware from hardware vendor. 3. Apply firmware update following vendor instructions. 4. Reboot system to activate new firmware.

🔧 Temporary Workarounds

Disable guest migration

all

Prevent migration of SEV-legacy guests between hosts

# Configure hypervisor to disable SEV-legacy guest migration

Restrict migration to trusted hosts

all

Only allow migration between fully trusted and controlled hosts

# Configure migration policies to trusted host list only

🧯 If You Can't Patch

  • Isolate SEV-legacy guests to single hosts without migration
  • Implement strict access controls to migration infrastructure

🔍 How to Verify

Check if Vulnerable:

Check firmware version against AMD advisory and verify SEV-legacy is enabled

Check Version:

# Check firmware version via dmesg or vendor-specific tools

Verify Fix Applied:

Verify firmware version matches patched version from AMD advisory

📡 Detection & Monitoring

Log Indicators:

  • Unusual migration patterns
  • Failed migration attempts
  • Firmware error logs related to SEV

Network Indicators:

  • Unexpected migration traffic between hosts
  • Anomalous patterns in migration protocols

SIEM Query:

Search for SEV migration events with error codes or from untrusted sources

🔗 References

📤 Share & Export