Improper input validation in the SMM communications buffer could allow a privileged attacker to perform an out of bounds read or write to SMRAM potentially resulting in loss of confidentiality or integrity.
Improper input validation in the SMM communications buffer could allow a privileged attacker to perform an out of bounds read or write to SMRAM potentially resulting in loss of confidentiality or integrity.
| Vendor | Product | Versions |
|---|---|---|
| AMD | AMD EPYC™ 9004 Series Processors | GenoaPI 1.0.0.F |
| AMD | AMD EPYC™ 9005 Series Processors | TurinPI 1.0.0.4 |
| AMD | AMD Ryzen™ 6000 Series Processors with Radeon™ Graphics | RembrandtPI-FP7_1.0.0.BD |
| AMD | AMD Ryzen™ 7040 Series Mobile Processors with Radeon™ Graphics | PhoenixPI-FP8-FP7_1.2.0.0c |
| AMD | AMD Ryzen™ 7020 Series Processors with Radeon™ Graphics | MendocinoPI-FT6_1.0.0.7c |
| AMD | AMD Ryzen™ 9000HX Series Mobile Processors | FireRangeFL1PI 1.0.0.0a |
| AMD | AMD Ryzen™ AI Max 300 Series Processors | StrixHaloPI-FP11_1.0.0.1 |
| AMD | AMD Ryzen™ AI 300 Series Processors | StrixKrackanPI-FP8_1.1.0.0b |
| AMD | AMD Ryzen™ Threadripper™ 7000 Processors | StormPeakPI-SP6_1.1.0.0j |
| AMD | AMD Ryzen™ Threadripper™ PRO 7000 WX | Series Processors — StormPeakPI-SP6_1.0.0.1l, StormPeakPI-SP6_1.1.0.0j |
| AMD | AMD Ryzen™ 8000 Series Desktop Processors | ComboAM5 1.1.0.3d, ComboAM5 1.2.0.3d |
| AMD | AMD Ryzen™ 9000 Series Desktop Processors | ComboAM5 1.2.0.3d |
| AMD | Not public | ComboAM5 1.2.0.3d |
| AMD | AMD Ryzen™ 8040 Series Mobile Processors with Radeon™ Graphics | PhoenixPI-FP8-FP7_1.2.0.0c |
| AMD | AMD Ryzen™ 7035 Series Processors with Radeon™ Graphics | RembrandtPI-FP7_1.0.0.BD |
| AMD | AMD EPYC™ Embedded 9004 Series Processors (formerly codenamed "Genoa") | EmbGenoaPI-SP5 1.0.0.B |
| AMD | AMD Ryzen™ Embedded 8000 Series Processors | EmbeddedPhoenixPI-FP7r2_1.0.0.2 |
| AMD | AMD Ryzen™ Embedded V3000 Series Processors | Embedded-PI_FP7r2 100F |
Not currently listed on the CISA Known Exploited Vulnerabilities (KEV) catalog. EPSS is the best forward-looking signal — see the EPSS row above.
For the full vendor write-up, exploit chains, and reference implementations, see the references list in section 09.
Open the Sigma generator with a pre-filled prompt for this CVE to draft a starting detection in your stack of choice:
No directly-cited follow-up CVEs in the KB record for this advisory. The references list in section 09 carries the vendor cross-references.