Pasar al contenido principal
AMD Security Bulletin AMD-SB-3011, August 2024

Vulnerability Disclosure:

Supermicro is aware of the security issue where a malicious hypervisor may be able to decrypt the memory of a Secure Encrypted Virtualization–Secure Nested Paging (SEV-SNP) guest VM after it is decommissioned. This issue affects AMD EPYC™ 3rd and 4th Gen Processors.

CVE:

  • CVE-2023-31355
    • Severity: Medium
  • CVE-2024-21798
    • Severity: High
  • CVE-2024-21980
    • Severity: Medium

Findings:

This is a security vulnerability in AMD Secure Encrypted Virtualization – Secure Nested Paging (SEV-SNP) in which a malicious hypervisor could read or corrupt the memory of a guest VM. The SNP reclaim buffer attempts to write back reverse map table (RMP) changes for addresses that are not covered by the RMP. After the guest is decommissioned, a new guest context page can be created at address ‘0’ and the UMC key seed might match the key of the targeted guest VM. At that point an attacker can potentially read or corrupt the memory of the guest VM. This issue affects AMD EPYC™ 3rd Gen Processors.

Affected products:

Supermicro BIOS in the H11, H12 motherboards

AMD Motherboard GenerationBIOS Version with the fix
H12 - Milanv 3.0
H13 - Genoav 1.9

Remediation:

  • All affected Supermicro motherboard SKUs will require a BIOS update to mitigate this potential vulnerability.
  • An updated BIOS firmware had been created to mitigate this potential vulnerability. Supermicro is currently testing and validating affected products. Please check Release Notes for the resolution.