Improper input validation for DIMM serial presence detect (SPD) metadata could allow an attacker with physical access, ring0 access on a system with a non-compliant DIMM, or control over the Root of Trust for BIOS update, to bypass SMM isolation potentially resulting in arbitrary
Improper input validation for DIMM serial presence detect (SPD) metadata could allow an attacker with physical access, ring0 access on a system with a non-compliant DIMM, or control over the Root of Trust for BIOS update, to bypass SMM isolation potentially resulting in arbitrary code execution at the SMM level.
| Vendor | Product | Versions |
|---|---|---|
| AMD | AMD Ryzen™ Threadripper™ 3000 Processors | CastlePeakPI-SP3r3 1.0.0.D |
| AMD | AMD Ryzen™ Threadripper™ PRO 5000 WX | Series Processors — ChagallWSPI-sWRX8-1.0.0.A |
| AMD | AMD Ryzen™ 5000 Series Mobile Processors with Radeon™ Graphics | CezannePI-FP6_1.0.1.1a |
| AMD | AMD Ryzen™ Threadripper™ PRO 3000 WX | Series Processors — CastlePeakWSPI-sWRX8 1.0.0.F |
| AMD | AMD Ryzen™ Threadripper™ PRO 3000 WX | Series Processors — ChagallWSPI-sWRX8-1.0.0.A |
| AMD | AMD Ryzen™ 3000 Series Mobile Processors with Radeon™ Graphics | PicassoPI-FP5_1.0.1.2a |
| AMD | AMD Ryzen™ 8040 Series Mobile Processors with Radeon™ Graphics | PhoenixPI-FP8-FP7_1.1.8.0 |
| AMD | AMD Athlon™ 3000 Series Mobile Processors with Radeon™ Graphics | PicassoPI-FP5_1.0.1.2a |
| AMD | AMD Ryzen™ 8000 Series Desktop Processors | ComboAM5PI_1.2.0.2a |
| AMD | AMD Ryzen™ 7040 Series Mobile Processors with Radeon™ Graphics | PhoenixPI-FP8-FP7_1.1.8.0 |
| AMD | AMD Ryzen™ 4000 Series Mobile Processors with Radeon™ Graphics | RenoirPI-FP6 1.0.0.Ea |
| AMD | AMD Ryzen™ 6000 Series Processors with Radeon™ Graphics | RembrandtPI-FP7_1.0.0.Ba |
| AMD | AMD Ryzen™ 7045 Series Mobile Processors with Radeon™ Graphics | DragonRangeFL1_1.0.0.3f |
| AMD | AMD Ryzen™ 7035 Series Processors with Radeon™ Graphics | RembrandtPI-FP7_1.0.0.Ba |
| AMD | AMD Ryzen™ 7000 Series Desktop Processors | ComboAM5PI_1.2.0.2a |
| AMD | AMD Ryzen™ 7030 Series Mobile Processors with Radeon™ Graphics | CezannePI-FP6_1.0.1.1a |
| AMD | AMD Ryzen™ 9000 Series Desktop Processors | ComboAM5PI_1.2.0.2a |
| AMD | AMD Ryzen™ 3000 Series Desktop Processors | ComboAM4PI_1.0.0.C, ComboAM4v2PI_1.2.0.D |
| AMD | AMD Athlon™ 3000 Series Desktop Processors with Radeon™ Graphics | ComboAM4PI_1.0.0.C |
| AMD | AMD Ryzen™ 5000 Series Desktop Processors with Radeon™ Graphics | ComboAM4v2PI_1.2.0.D |
| AMD | AMD Ryzen™ 4000 Series Desktop Processors | ComboAM4v2PI_1.2.0.D |
| AMD | AMD Ryzen™ 5000 Series Desktop Processors | ComboAM4v2PI_1.2.0.D |
| AMD | AMD EPYC™ Embedded 3000 Series Processors | SnowyOwl PI 1.1.0.F |
| AMD | AMD EPYC™ Embedded 7002 Series Processors | EmbRomePI-SP3_1.0.0.E |
| AMD | AMD EPYC™ Embedded 7003 Series Processors | EmbMilanPI-SP3 1.0.0.A |
| AMD | AMD EPYC™ Embedded 9004 Series Processors | EmbGenoaPI-SP5 1.0.0.8 |
| AMD | AMD Ryzen™ Embedded 5000 Series Processors | EmbAM4PI 1.0.0.7 |
| AMD | AMD Ryzen™ Embedded V2000 Series Processors | EmbeddedPI-FP6_1.0.0.B |
| AMD | AMD Ryzen™ Embedded V3000 Series Processors | Embedded-PI_FP7r2 100A |
| AMD | AMD EPYC™ Embedded 97X4 Series Processors | EmbGenoaPI-SP5 1.0.0.8 |
| AMD | AMD Ryzen™ Embedded 7000 Series Processors | EmbeddedAM5PI 1.0.0.3 |
| AMD | AMD EPYC™ 9004 Series Processors | GenoaPI 1.0.0.D |
| AMD | AMD EPYC™ 7003 Series Processors | MilanPI 1.0.0.D |
| AMD | AMD EPYC™ 7002 Series Processors | Rome PI 1.0.0.M |
| AMD | AMD EPYC™ 7001 Series Processors | Naples 1.0.0.Q |
| AMD | AMD EPYC™ 9004 Series Processors | GenoaPI 1.0.0.D |
| AMD | AMD EPYC™ 4004 Series Processors | ComboAM5PI_1.2.0.2a |
| AMD | AMD EPYC™ 8004 Series Processors | GenoaPI 1.0.0.D |
Not currently listed on the CISA Known Exploited Vulnerabilities (KEV) catalog. EPSS is the best forward-looking signal — see the EPSS row above.
For the full vendor write-up, exploit chains, and reference implementations, see the references list in section 09.
Open the Sigma generator with a pre-filled prompt for this CVE to draft a starting detection in your stack of choice:
No directly-cited follow-up CVEs in the KB record for this advisory. The references list in section 09 carries the vendor cross-references.