Improper input validation in the SMM handler could allow an attacker with Ring0 access to write to SMRAM and modify execution flow for S3 (sleep) wake up, potentially resulting in arbitrary code execution.
Improper input validation in the SMM handler could allow an attacker with Ring0 access to write to SMRAM and modify execution flow for S3 (sleep) wake up, potentially resulting in arbitrary code execution.
| Vendor | Product | Versions |
|---|---|---|
| AMD | AMD EPYC™ 9004 Series Processors | GenoaPI 1.0.0.E |
| AMD | AMD Ryzen™ Threadripper™ PRO 5000 WX | Series Processors — ChagallWSPI-sWRX8-1.0.0.B |
| AMD | AMD Ryzen™ 5000 Series Mobile Processors with Radeon™ Graphics | CezannePI-FP6_1.0.1.1b |
| AMD | AMD Ryzen™ Threadripper™ PRO 3000 WX | Series Processors — CastlePeakWSPI-sWRX8 1.0.0.G, ChagallWSPI-sWRX8-1.0.0.B |
| AMD | AMD Ryzen™ Z1 Series Processors | ComboAM5 1.1.0.3c / ComboAM5 1.2.0.3d |
| AMD | AMD Ryzen™ 9000 Series Desktop Processors | ComboAM5 1.2.0.3d |
| AMD | AMD Ryzen™ 7000 Series Desktop Processors | ComboAM5 1.2.0.3d, ComboAM5 1.1.0.3c, ComboAM5PI 1.0.0.E |
| AMD | AMD Ryzen™ 3000 Series Mobile Processors with Radeon™ Graphics | PicassoPI-FP5_1.0.1.2c |
| AMD | AMD Ryzen™ 5000 Series Desktop Processors with Radeon™ Graphics | ComboAM4v2PI 1.2.0.10 |
| AMD | AMD Ryzen™ 3000 Series Desktop Processors | ComboAM4PI 1.0.0.10, ComboAM4v2PI 1.2.0.10 |
| AMD | AMD Ryzen™ 8000 Series Desktop Processors | ComboAM5 1.1.0.3c |
| AMD | AMD Ryzen™ 7040 Series Mobile Processors with Radeon™ Graphics | PhoenixPI-FP8-FP7_1.2.0.0c |
| AMD | AMD Ryzen™ Threadripper™ 7000 processor | StormPeakPI-SP6 1.1.0.0i |
| AMD | AMD Ryzen™ Threadripper™ PRO 7000 WX | Series processors — StormPeakPI-SP6 1.0.0.1k / StormPeakPI-SP6 1.1.0.0i |
| AMD | AMD Ryzen™ 8040 Series Mobile Processors with Radeon™ Graphics | PhoenixPI-FP8-FP7_1.2.0.0c |
| AMD | AMD Ryzen™ 4000 Series Mobile Processors with Radeon™ Graphics | RenoirPI-FP6 1.0.0.Eb |
| AMD | AMD Ryzen™ 6000 Series Processors with Radeon™ Graphics | RembrandtPI-FP7_1.0.0.Bb |
| AMD | AMD Ryzen™ 8000 Series Desktop | ComboAM5 1.2.0.3d |
| AMD | AMD Ryzen™ 7020 Series Processors with Radeon™ Graphics | MendocinoPI-FT6_1.0.0.7b |
| AMD | AMD Ryzen™ 7045 Series Mobile Processors with Radeon™ Graphics | DragonRangeFL1_1.0.0.3g |
| AMD | AMD Athlon™ 3000 Series Mobile Processors with Radeon™ Graphics | PicassoPI-FP5_1.0.1.2c |
| AMD | AMD Ryzen™ 4000 Series Desktop Processors | ComboAM4v2PI 1.2.0.10 |
| AMD | AMD Ryzen™ 5000 Series Desktop Processors | ComboAM4v2PI 1.2.0.10 |
| AMD | AMD Ryzen™ Threadripper™ PRO 7000 WX | Series Processors — StormPeakPI-SP6 1.1.0.0i |
| AMD | AMD Ryzen™ Z2 Series Processors | PhoenixPI-FP8-FP7_1.2.0.0c |
| AMD | AMD Ryzen™ Z2 Series Processors Go | RembrandtPI-FP7_1.0.0.Bb |
| AMD | AMD EPYC™ Embedded 9004 Series Processors (formerly codenamed "Genoa") | EmbGenoaPI-SP5 1.0.0.B |
| AMD | AMD Ryzen™ Embedded R1000 Series Processors | EmbeddedPI-FP5 1211 |
| AMD | AMD Ryzen™ Embedded R2000 Series Processors | EmbeddedR2KPI-FP5 1006 |
| AMD | AMD Ryzen™ Embedded 5000 Series Processors | EmbAM4PI 1008 |
| AMD | AMD Ryzen™ Embedded 7000 Series Processors | EmbeddedAM5PI 1.0.0.4 |
| AMD | AMD Ryzen™ Embedded V1000 Series Processors (formerly codenamed "Raven Ridge") | EmbeddedPI-FP5 1211 |
| AMD | AMD Ryzen™ Embedded V1000 Series Processors (formerly codenamed "Picasso") | EmbeddedPI-FP5 1211 |
| AMD | AMD Ryzen™ Embedded V2000 Series Processors | EmbeddedPI-FP6_1.0.0.B |
| AMD | AMD Ryzen™ Embedded V3000 Series Processors | Embedded-PI_FP7r2 100F |
| AMD | AMD Ryzen™ Embedded 8000 Series Processors | EmbeddedPhoenixPI-FP7r2_1.0.0.2 |
Not currently listed on the CISA Known Exploited Vulnerabilities (KEV) catalog. EPSS is the best forward-looking signal — see the EPSS row above.
For the full vendor write-up, exploit chains, and reference implementations, see the references list in section 09.
Open the Sigma generator with a pre-filled prompt for this CVE to draft a starting detection in your stack of choice:
No directly-cited follow-up CVEs in the KB record for this advisory. The references list in section 09 carries the vendor cross-references.