CVE-2021-26408
📋 TL;DR
This vulnerability in AMD SEV-legacy firmware allows insufficient validation of elliptic curve points during guest migration. Attackers could potentially compromise guest integrity or confidentiality during migration operations. This affects systems using AMD EPYC processors with SEV-legacy enabled.
💻 Affected Systems
- AMD EPYC processors with SEV-legacy firmware
📦 What is this software?
⚠️ Risk & Real-World Impact
Worst Case
Complete compromise of guest VM confidentiality and integrity during migration, allowing attackers to access sensitive data or modify guest execution.
Likely Case
Potential data leakage or integrity compromise during migration between trusted hosts in controlled environments.
If Mitigated
Minimal impact if migration occurs only between fully trusted hosts with proper isolation controls.
🎯 Exploit Status
Exploitation requires access to migration infrastructure and knowledge of SEV-legacy internals.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Refer to AMD advisory for specific firmware versions
Vendor Advisory: https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1021
Restart Required: Yes
Instructions:
1. Check AMD advisory for affected processor models. 2. Obtain updated firmware from hardware vendor. 3. Apply firmware update following vendor instructions. 4. Reboot system to activate new firmware.
🔧 Temporary Workarounds
Disable guest migration
allPrevent migration of SEV-legacy guests between hosts
# Configure hypervisor to disable SEV-legacy guest migration
Restrict migration to trusted hosts
allOnly allow migration between fully trusted and controlled hosts
# Configure migration policies to trusted host list only
🧯 If You Can't Patch
- Isolate SEV-legacy guests to single hosts without migration
- Implement strict access controls to migration infrastructure
🔍 How to Verify
Check if Vulnerable:
Check firmware version against AMD advisory and verify SEV-legacy is enabled
Check Version:
# Check firmware version via dmesg or vendor-specific tools
Verify Fix Applied:
Verify firmware version matches patched version from AMD advisory
📡 Detection & Monitoring
Log Indicators:
- Unusual migration patterns
- Failed migration attempts
- Firmware error logs related to SEV
Network Indicators:
- Unexpected migration traffic between hosts
- Anomalous patterns in migration protocols
SIEM Query:
Search for SEV migration events with error codes or from untrusted sources