CVE-2021-46771

7.8 HIGH

📋 TL;DR

This vulnerability in AMD Secure Processor firmware allows insufficient address validation in system calls, potentially enabling arbitrary code execution. It affects systems with AMD processors using vulnerable ASP firmware versions. A compromised user application could exploit this to execute malicious code.

💻 Affected Systems

Products:
  • AMD processors with Secure Processor (ASP) firmware
Versions: Specific vulnerable versions detailed in AMD advisory SB-1021
Operating Systems: All operating systems running on affected AMD processors
Default Config Vulnerable: ⚠️ Yes
Notes: Requires AMD processors with vulnerable ASP firmware; exact processor models listed in AMD advisory.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full system compromise with attacker gaining kernel-level privileges and persistent access to the system.

🟠

Likely Case

Local privilege escalation allowing a compromised application to execute arbitrary code with elevated privileges.

🟢

If Mitigated

Limited impact with proper access controls and isolation preventing user applications from reaching vulnerable components.

🌐 Internet-Facing: LOW - Requires local access or compromised local application, not directly exploitable over network.
🏢 Internal Only: MEDIUM - Local attackers or malware could exploit this for privilege escalation within the environment.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires local access and ability to execute code; exploitation details not publicly available.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Firmware updates specified in AMD advisory SB-1021

Vendor Advisory: https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1021

Restart Required: Yes

Instructions:

1. Check AMD advisory SB-1021 for affected processor models. 2. Obtain firmware update from system/motherboard manufacturer. 3. Apply firmware update following manufacturer instructions. 4. Reboot system to activate new firmware.

🔧 Temporary Workarounds

Restrict local code execution

all

Limit ability of users to execute arbitrary code through application whitelisting and privilege restrictions.

🧯 If You Can't Patch

  • Implement strict application control policies to prevent execution of untrusted code
  • Isolate systems with vulnerable firmware from critical networks and sensitive data

🔍 How to Verify

Check if Vulnerable:

Check system BIOS/UEFI firmware version against AMD advisory SB-1021 for affected versions.

Check Version:

On Linux: 'sudo dmidecode -t bios'; On Windows: 'wmic bios get smbiosbiosversion'

Verify Fix Applied:

Verify firmware version after update matches patched versions listed in AMD advisory.

📡 Detection & Monitoring

Log Indicators:

  • Unusual firmware access attempts
  • Privilege escalation events from user applications

Network Indicators:

  • Not network exploitable - focus on local system monitoring

SIEM Query:

Event logs showing unexpected firmware access or privilege escalation from userland processes

🔗 References

📤 Share & Export