Description
Improper input validation for DIMM serial presence detect (SPD) metadata could allow an attacker with physical access, ring0 access on a system with a non-compliant DIMM, or control over the Root of Trust for BIOS update, to bypass SMM isolation potentially resulting in arbitrary code execution at the SMM level.
Problem types
CWE-1231 - Improper Prevention of Lock Bit Modification
Product status
CastlePeakPI-SP3r3 1.0.0.D
ChagallWSPI-sWRX8-1.0.0.A
CezannePI-FP6_1.0.1.1a
CastlePeakWSPI-sWRX8 1.0.0.F
ChagallWSPI-sWRX8-1.0.0.A
PicassoPI-FP5_1.0.1.2a
PhoenixPI-FP8-FP7_1.1.8.0
PicassoPI-FP5_1.0.1.2a
ComboAM5PI_1.2.0.2a
PhoenixPI-FP8-FP7_1.1.8.0
RenoirPI-FP6 1.0.0.Ea
RembrandtPI-FP7_1.0.0.Ba
DragonRangeFL1_1.0.0.3f
RembrandtPI-FP7_1.0.0.Ba
ComboAM5PI_1.2.0.2a
CezannePI-FP6_1.0.1.1a
ComboAM5PI_1.2.0.2a
ComboAM4PI_1.0.0.C
ComboAM4v2PI_1.2.0.D
ComboAM4PI_1.0.0.C
ComboAM4v2PI_1.2.0.D
ComboAM4v2PI_1.2.0.D
ComboAM4v2PI_1.2.0.D
SnowyOwl PI 1.1.0.F
EmbRomePI-SP3_1.0.0.E
EmbMilanPI-SP3 1.0.0.A
EmbGenoaPI-SP5 1.0.0.8
EmbAM4PI 1.0.0.7
EmbeddedPI-FP6_1.0.0.B
Embedded-PI_FP7r2 100A
EmbGenoaPI-SP5 1.0.0.8
EmbeddedAM5PI 1.0.0.3
GenoaPI 1.0.0.D
MilanPI 1.0.0.D
Rome PI 1.0.0.M
Naples 1.0.0.Q
GenoaPI 1.0.0.D
ComboAM5PI_1.2.0.2a
GenoaPI 1.0.0.D
References
www.amd.com/...es/product-security/bulletin/AMD-SB-4012.html
www.amd.com/...es/product-security/bulletin/AMD-SB-5007.html
www.amd.com/...es/product-security/bulletin/AMD-SB-3014.html