### [CVE-2021-26320](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-26320) ![](https://img.shields.io/static/v1?label=Product&message=1st%20Gen%20AMD%20EPYC%E2%84%A2&color=blue) ![](https://img.shields.io/static/v1?label=Product&message=2nd%20Gen%20AMD%20EPYC%E2%84%A2&color=blue) ![](https://img.shields.io/static/v1?label=Product&message=3rd%20Gen%20AMD%20EPYC%E2%84%A2&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=unspecified%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-295%20Improper%20Certificate%20Validation&color=brightgreen) ### Description Insufficient validation of the AMD SEV Signing Key (ASK) in the SEND_START command in the SEV Firmware may allow a local authenticated attacker to perform a denial of service of the PSP ### POC #### Reference - https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1021 #### Github No PoCs found on GitHub currently.