8.2
HIGH
CVE-2021-26365
Oracle Firmware Out-of-Bounds Read Denial of Service/Cipher Text Side-Channel Information Leak
Description

Certain size values in firmware binary headers could trigger out of bounds reads during signature validation, leading to denial of service or potentially limited leakage of information about out-of-bounds memory contents.

INFO

Published Date :

May 9, 2023, 7:15 p.m.

Last Modified :

Nov. 21, 2024, 5:56 a.m.

Remotely Exploitable :

Yes !

Impact Score :

4.2

Exploitability Score :

3.9
Affected Products

The following products are affected by CVE-2021-26365 vulnerability. Even if cvefeed.io is aware of the exact versions of the products that are affected, the information is not represented in the table below.

ID Vendor Product Action
1 Amd ryzen_3_2200g_firmware
2 Amd ryzen_3_2200ge_firmware
3 Amd ryzen_3_2200u_firmware
4 Amd ryzen_3_2300u_firmware
5 Amd ryzen_3_5300g_firmware
6 Amd ryzen_3_5300ge_firmware
7 Amd ryzen_3_5300u_firmware
8 Amd ryzen_5_2400g_firmware
9 Amd ryzen_5_2400ge_firmware
10 Amd ryzen_5_2500u_firmware
11 Amd ryzen_5_2600h_firmware
12 Amd ryzen_5_5500_firmware
13 Amd ryzen_5_5500u_firmware
14 Amd ryzen_5_5600_firmware
15 Amd ryzen_5_5600g_firmware
16 Amd ryzen_5_5600ge_firmware
17 Amd ryzen_5_5600x_firmware
18 Amd ryzen_7_2700u_firmware
19 Amd ryzen_7_2800h_firmware
20 Amd ryzen_7_5700g_firmware
21 Amd ryzen_7_5700ge_firmware
22 Amd ryzen_7_5700u_firmware
23 Amd ryzen_7_5700x_firmware
24 Amd ryzen_7_5800_firmware
25 Amd ryzen_7_5800x_firmware
26 Amd ryzen_7_5800x3d_firmware
27 Amd ryzen_9_5900_firmware
28 Amd ryzen_9_5900x_firmware
29 Amd ryzen_9_5950x_firmware
30 Amd ryzen_3_3200g_firmware
31 Amd ryzen_3_3200u_firmware
32 Amd ryzen_3_3250c_firmware
33 Amd ryzen_3_3250u_firmware
34 Amd ryzen_3_pro_3200g_firmware
35 Amd ryzen_3_pro_3200ge_firmware
36 Amd ryzen_5_3400g_firmware
37 Amd ryzen_5_pro_3350g_firmware
38 Amd ryzen_5_pro_3350ge_firmware
39 Amd ryzen_5_pro_3400g_firmware
40 Amd ryzen_5_pro_3400ge_firmware
41 Amd ryzen_3_3200ge_firmware
42 Amd ryzen_9_6980hx_firmware
43 Amd ryzen_9_6980hs_firmware
44 Amd ryzen_9_6900hx_firmware
45 Amd ryzen_9_6900hs_firmware
46 Amd ryzen_7_6800h_firmware
47 Amd ryzen_7_6800hs_firmware
48 Amd ryzen_7_6800u_firmware
49 Amd ryzen_5_6600h_firmware
50 Amd ryzen_5_6600hs_firmware
51 Amd ryzen_5_6600u_firmware
52 Amd ryzen_3_pro_2100ge_firmware
53 Amd amd_3015e_firmware
54 Amd amd_3015ce_firmware
55 Amd ryzen_9_5950x
56 Amd ryzen_9_5900x
57 Amd ryzen_9_5900
58 Amd ryzen_7_5800x3d
59 Amd ryzen_7_5800x
60 Amd ryzen_7_5800
61 Amd ryzen_7_5700x
62 Amd ryzen_5_5600x
63 Amd ryzen_5_5600
64 Amd ryzen_5_5500
65 Amd ryzen_7_5700g
66 Amd ryzen_7_5700ge
67 Amd ryzen_5_5600g
68 Amd ryzen_5_5600ge
69 Amd ryzen_3_5300g
70 Amd ryzen_3_5300ge
71 Amd ryzen_7_5700u
72 Amd ryzen_5_5500u
73 Amd ryzen_3_5300u
74 Amd ryzen_9_6980hx
75 Amd ryzen_9_6980hs
76 Amd ryzen_9_6900hx
77 Amd ryzen_9_6900hs
78 Amd ryzen_7_6800h
79 Amd ryzen_7_6800hs
80 Amd ryzen_7_6800u
81 Amd ryzen_5_6600h
82 Amd ryzen_5_6600hs
83 Amd ryzen_5_6600u
84 Amd ryzen_5_pro_3400g
85 Amd ryzen_5_3400g
86 Amd ryzen_5_pro_3400ge
87 Amd ryzen_5_pro_3350g
88 Amd ryzen_5_pro_3350ge
89 Amd ryzen_3_pro_3200g
90 Amd ryzen_3_3200g
91 Amd ryzen_3_3200ge
92 Amd ryzen_3_pro_3200ge
93 Amd ryzen_3_3250u
94 Amd ryzen_3_3250c
95 Amd ryzen_3_3200u
96 Amd amd_3015e
97 Amd amd_3015ce
98 Amd ryzen_3_2200ge
99 Amd ryzen_3_2200g
100 Amd ryzen_5_2400ge
101 Amd ryzen_5_2400g
102 Amd ryzen_3_2200u
103 Amd ryzen_3_2300u
104 Amd ryzen_5_2500u
105 Amd ryzen_5_2600h
106 Amd ryzen_7_2700u
107 Amd ryzen_7_2800h
108 Amd ryzen_3_pro_2100ge
References to Advisories, Solutions, and Tools

Here, you will find a curated list of external links that provide in-depth information, practical solutions, and valuable tools related to CVE-2021-26365.

URL Resource
https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-4001 Vendor Advisory
https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-4001 Vendor Advisory

We scan GitHub repositories to detect new proof-of-concept exploits. Following list is a collection of public exploits and proof-of-concepts, which have been published on GitHub (sorted by the most recently updated).

Results are limited to the first 15 repositories due to potential performance issues.

The following list is the news that have been mention CVE-2021-26365 vulnerability anywhere in the article.

The following table lists the changes that have been made to the CVE-2021-26365 vulnerability over time.

Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability's severity, exploitability, or other characteristics.

  • CVE Modified by af854a3a-2127-422b-91ae-364da2661108

    Nov. 21, 2024

    Action Type Old Value New Value
    Added Reference https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-4001
  • CVE Modified by [email protected]

    May. 14, 2024

    Action Type Old Value New Value
  • Initial Analysis by [email protected]

    May. 26, 2023

    Action Type Old Value New Value
    Added CVSS V3.1 NIST AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H
    Changed Reference Type https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-4001 No Types Assigned https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-4001 Vendor Advisory
    Added CWE NIST CWE-125
    Added CPE Configuration AND OR *cpe:2.3:o:amd:ryzen_5_2400g_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:amd:ryzen_5_2400g:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:amd:ryzen_5_2400ge_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:amd:ryzen_5_2400ge:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:amd:ryzen_3_2200ge_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:amd:ryzen_3_2200ge:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:amd:ryzen_3_2200g_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:amd:ryzen_3_2200g:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:amd:ryzen_3_pro_2100ge_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:amd:ryzen_3_pro_2100ge:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:amd:ryzen_9_5900x_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:amd:ryzen_9_5900x:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:amd:ryzen_9_5950x_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:amd:ryzen_9_5950x:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:amd:ryzen_9_5900_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:amd:ryzen_9_5900:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:amd:ryzen_7_5800_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:amd:ryzen_7_5800:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:amd:ryzen_7_5800x_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:amd:ryzen_7_5800x:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:amd:ryzen_7_5800x3d_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:amd:ryzen_7_5800x3d:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:amd:ryzen_7_5700x_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:amd:ryzen_7_5700x:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:amd:ryzen_5_5600_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:amd:ryzen_5_5600:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:amd:ryzen_5_5600x_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:amd:ryzen_5_5600x:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:amd:ryzen_5_5500_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:amd:ryzen_5_5500:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:amd:ryzen_3_3200u_firmware:*:*:*:*:*:*:*:* versions up to (excluding) picassopi-fp5_1.0.0.d OR cpe:2.3:h:amd:ryzen_3_3200u:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:amd:ryzen_3_3250c_firmware:*:*:*:*:*:*:*:* versions up to (excluding) picassopi-fp5_1.0.0.d OR cpe:2.3:h:amd:ryzen_3_3250c:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:amd:ryzen_3_3250u_firmware:*:*:*:*:*:*:*:* versions up to (excluding) picassopi-fp5_1.0.0.d OR cpe:2.3:h:amd:ryzen_3_3250u:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:amd:amd_3015e_firmware:*:*:*:*:*:*:*:* versions up to (excluding) pollockpi-ft5_1.0.0.3 OR cpe:2.3:h:amd:amd_3015e:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:amd:amd_3015ce_firmware:*:*:*:*:*:*:*:* versions up to (excluding) pollockpi-ft5_1.0.0.3 OR cpe:2.3:h:amd:amd_3015ce:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:amd:ryzen_7_2800h_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:amd:ryzen_7_2800h:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:amd:ryzen_7_2700u_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:amd:ryzen_7_2700u:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:amd:ryzen_5_2600h_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:amd:ryzen_5_2600h:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:amd:ryzen_5_2500u_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:amd:ryzen_5_2500u:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:amd:ryzen_3_2300u_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:amd:ryzen_3_2300u:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:amd:ryzen_3_2200u_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:amd:ryzen_3_2200u:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:amd:ryzen_5_3400g_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:amd:ryzen_5_3400g:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:amd:ryzen_5_pro_3400g_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:amd:ryzen_5_pro_3400g:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:amd:ryzen_5_pro_3400ge_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:amd:ryzen_5_pro_3400ge:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:amd:ryzen_5_pro_3350g_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:amd:ryzen_5_pro_3350g:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:amd:ryzen_5_pro_3350ge_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:amd:ryzen_5_pro_3350ge:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:amd:ryzen_3_pro_3200g_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:amd:ryzen_3_pro_3200g:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:amd:ryzen_3_3200g_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:amd:ryzen_3_3200g:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:amd:ryzen_3_3200ge_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:amd:ryzen_3_3200ge:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:amd:ryzen_3_pro_3200ge_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:amd:ryzen_3_pro_3200ge:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:amd:ryzen_7_5700u_firmware:*:*:*:*:*:*:*:* versions up to (excluding) cezannepi-fp6_1.0.0.8 OR cpe:2.3:h:amd:ryzen_7_5700u:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:amd:ryzen_5_5500u_firmware:*:*:*:*:*:*:*:* versions up to (excluding) cezannepi-fp6_1.0.0.8 OR cpe:2.3:h:amd:ryzen_5_5500u:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:amd:ryzen_3_5300u_firmware:*:*:*:*:*:*:*:* versions up to (excluding) cezannepi-fp6_1.0.0.8 OR cpe:2.3:h:amd:ryzen_3_5300u:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:amd:ryzen_7_5700g_firmware:*:*:*:*:*:*:*:* versions up to (excluding) cezannepi-fp6_1.0.0.8 OR cpe:2.3:h:amd:ryzen_7_5700g:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:amd:ryzen_7_5700ge_firmware:*:*:*:*:*:*:*:* versions up to (excluding) cezannepi-fp6_1.0.0.8 OR cpe:2.3:h:amd:ryzen_7_5700ge:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:amd:ryzen_5_5600g_firmware:*:*:*:*:*:*:*:* versions up to (excluding) cezannepi-fp6_1.0.0.8 OR cpe:2.3:h:amd:ryzen_5_5600g:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:amd:ryzen_5_5600ge_firmware:*:*:*:*:*:*:*:* versions up to (excluding) cezannepi-fp6_1.0.0.8 OR cpe:2.3:h:amd:ryzen_5_5600ge:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:amd:ryzen_3_5300g_firmware:*:*:*:*:*:*:*:* versions up to (excluding) cezannepi-fp6_1.0.0.8 OR cpe:2.3:h:amd:ryzen_3_5300g:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:amd:ryzen_3_5300ge_firmware:*:*:*:*:*:*:*:* versions up to (excluding) cezannepi-fp6_1.0.0.8 OR cpe:2.3:h:amd:ryzen_3_5300ge:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:amd:ryzen_9_6980hx_firmware:*:*:*:*:*:*:*:* versions up to (excluding) rmb_1.0.0.4 OR cpe:2.3:h:amd:ryzen_9_6980hx:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:amd:ryzen_9_6980hs_firmware:*:*:*:*:*:*:*:* versions up to (excluding) rmb_1.0.0.4 OR cpe:2.3:h:amd:ryzen_9_6980hs:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:amd:ryzen_9_6900hx_firmware:*:*:*:*:*:*:*:* versions up to (excluding) rmb_1.0.0.4 OR cpe:2.3:h:amd:ryzen_9_6900hx:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:amd:ryzen_9_6900hs_firmware:*:*:*:*:*:*:*:* versions up to (excluding) rmb_1.0.0.4 OR cpe:2.3:h:amd:ryzen_9_6900hs:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:amd:ryzen_7_6800h_firmware:*:*:*:*:*:*:*:* versions up to (excluding) rmb_1.0.0.4 OR cpe:2.3:h:amd:ryzen_7_6800h:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:amd:ryzen_7_6800hs_firmware:*:*:*:*:*:*:*:* versions up to (excluding) rmb_1.0.0.4 OR cpe:2.3:h:amd:ryzen_7_6800hs:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:amd:ryzen_7_6800u_firmware:*:*:*:*:*:*:*:* versions up to (excluding) rmb_1.0.0.4 OR cpe:2.3:h:amd:ryzen_7_6800u:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:amd:ryzen_5_6600h_firmware:*:*:*:*:*:*:*:* versions up to (excluding) rmb_1.0.0.4 OR cpe:2.3:h:amd:ryzen_5_6600h:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:amd:ryzen_5_6600hs_firmware:*:*:*:*:*:*:*:* versions up to (excluding) rmb_1.0.0.4 OR cpe:2.3:h:amd:ryzen_5_6600hs:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:amd:ryzen_5_6600u_firmware:*:*:*:*:*:*:*:* versions up to (excluding) rmb_1.0.0.4 OR cpe:2.3:h:amd:ryzen_5_6600u:-:*:*:*:*:*:*:*
EPSS is a daily estimate of the probability of exploitation activity being observed over the next 30 days. Following chart shows the EPSS score history of the vulnerability.
CWE - Common Weakness Enumeration

While CVE identifies specific instances of vulnerabilities, CWE categorizes the common flaws or weaknesses that can lead to vulnerabilities. CVE-2021-26365 is associated with the following CWEs:

Common Attack Pattern Enumeration and Classification (CAPEC)

Common Attack Pattern Enumeration and Classification (CAPEC) stores attack patterns, which are descriptions of the common attributes and approaches employed by adversaries to exploit the CVE-2021-26365 weaknesses.

Exploit Prediction

EPSS is a daily estimate of the probability of exploitation activity being observed over the next 30 days.

0.06 }} 0.00%

score

0.28917

percentile

CVSS31 - Vulnerability Scoring System
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality
Integrity
Availability