Home

Description

Improper input validation in the system management mode (SMM) could allow a privileged attacker to overwrite arbitrary memory potentially resulting in arbitrary code execution at the SMM level.

PUBLISHED Reserved 2024-01-03 | Published 2025-09-06 | Updated 2025-09-23 | Assigner AMD




HIGH: 7.5CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H

Problem types

CWE-1220 Insufficient Granularity of Access Control

Product status

Default status
affected

CastlePeakPI-SP3r3 1.0.0.C
unaffected

Default status
affected

ChagallWSPI-sWRX8-1.0.0.7
unaffected

Default status
affected

CezannePI-FP6_1.0.1.0
unaffected

Default status
affected

CastlePeakWSPI-sWRX8 1.0.0.E
unaffected

ChagallWSPI-sWRX8-1.0.0.7
unaffected

Default status
affected

ComboAM4 1.0.0.B
unaffected

ComboAM4v2PI_1.2.0.CA
unaffected

Default status
affected

Picasso-FP5 1.0.1.1
unaffected

Default status
affected

Picasso-FP5 1.0.1.1
unaffected

Default status
affected

ComboAM4v2PI_1.2.0.CA
unaffected

Default status
affected

ComboAM4 1.0.0.B
unaffected

Default status
affected

ComboAM5 1.2.0.0
unaffected

Default status
affected

PhoenixPI-FP8-FP7_1.1.0.2
unaffected

Default status
affected

Renoir-FP6 1.0.0.D
unaffected

Default status
affected

Rembrandt-FP7 1.0.0.A
unaffected

Default status
affected

ComboAM5 1.2.0.0
unaffected

Default status
affected

MendocinoPI-FT6_1.0.0.6
unaffected

Default status
affected

DragonRangeFL1 1.0.0.3d
unaffected

Default status
affected

Rembrandt-FP7 1.0.0.A
unaffected

Default status
affected

CezannePI-FP6_1.0.1.0
unaffected

Default status
affected

ComboAM4v2PI_1.2.0.CA
unaffected

Default status
affected

ComboAM4v2PI_1.2.0.CA
unaffected

Default status
affected

EmbeddedPI-FP5 120C
unaffected

Default status
affected

EmbeddedR2KPI-FP5_1003
unaffected

Default status
affected

EmbAM4PI 1.0.0.5
unaffected

Default status
affected

EmbeddedPI-FP5 120C
unaffected

Default status
affected

EmbeddedPI-FP6_1.0.0.A
unaffected

Default status
affected

Embedded-PI_FP7r2 1009
unaffected

Credits

Reported through AMD Bug Bounty Program finder

References

www.amd.com/...es/product-security/bulletin/AMD-SB-4012.html

www.amd.com/...es/product-security/bulletin/AMD-SB-5007.html

cve.org (CVE-2024-21947)

nvd.nist.gov (CVE-2024-21947)

Download JSON