AMD disclosed Two exploits for the Secure Encrypted Virtualization (SEV) function used by first, second and third generation EPYC processors before they will be presented at the 15th IEEE workshop on offensive technologies (WOOT’21).
The first exploit CVE-2020-12967is presented in a contribution by researchers from Fraunhofer AISEC and the Technical University of Munich with the title “SEVerity: Code Injection Attacks against encrypted virtual machines”.
AMD said the researchers who discovered this flaw “are utilizing previously discussed research into the lack of protection for nested page tables in the SEV / SEV-ES function that could potentially result in arbitrary code execution within the guest.”
The second exploit, CVE-2021-26311, is described in an article with the interesting capitalized title “UndeSErVed Trust: Exploiting Permutation-Agnostic Remote Attestation” by researchers at the University of Lübeck.
AMD said research showed that memory …