Home

Description

Improper input validation in the SMM handler could allow an attacker with Ring0 access to write to SMRAM and modify execution flow for S3 (sleep) wake up, potentially resulting in arbitrary code execution.

PUBLISHED Reserved 2024-05-23 | Published 2026-02-10 | Updated 2026-02-12 | Assigner AMD




HIGH: 7.0CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:N/VI:H/VA:N/SC:H/SI:H/SA:H

Problem types

CWE-787 Out-of-bounds Write

Product status

Default status
affected

GenoaPI 1.0.0.E
unaffected

Default status
affected

ChagallWSPI-sWRX8-1.0.0.B
unaffected

Default status
affected

CezannePI-FP6_1.0.1.1b
unaffected

Default status
affected

CastlePeakWSPI-sWRX8 1.0.0.G
unaffected

ChagallWSPI-sWRX8-1.0.0.B
unaffected

Default status
affected

ComboAM5 1.1.0.3c / ComboAM5 1.2.0.3d
unaffected

Default status
affected

ComboAM5 1.2.0.3d
unaffected

Default status
affected

ComboAM5 1.2.0.3d
unaffected

ComboAM5 1.1.0.3c
unaffected

ComboAM5PI 1.0.0.E
unaffected

Default status
affected

PicassoPI-FP5_1.0.1.2c
unaffected

Default status
affected

ComboAM4v2PI 1.2.0.10
unaffected

Default status
affected

ComboAM4PI 1.0.0.10
unaffected

ComboAM4v2PI 1.2.0.10
unaffected

Default status
affected

ComboAM5 1.1.0.3c
unaffected

Default status
affected

PhoenixPI-FP8-FP7_1.2.0.0c
unaffected

Default status
affected

StormPeakPI-SP6 1.1.0.0i
unaffected

Default status
affected

StormPeakPI-SP6 1.0.0.1k / StormPeakPI-SP6 1.1.0.0i
unaffected

Default status
affected

PhoenixPI-FP8-FP7_1.2.0.0c
unaffected

Default status
affected

RenoirPI-FP6 1.0.0.Eb
unaffected

Default status
affected

RembrandtPI-FP7_1.0.0.Bb
unaffected

Default status
affected

ComboAM5 1.2.0.3d
unaffected

Default status
affected

MendocinoPI-FT6_1.0.0.7b
unaffected

Default status
affected

DragonRangeFL1_1.0.0.3g
unaffected

Default status
affected

PicassoPI-FP5_1.0.1.2c
unaffected

Default status
affected

ComboAM4v2PI 1.2.0.10
unaffected

Default status
affected

ComboAM4v2PI 1.2.0.10
unaffected

Default status
affected

StormPeakPI-SP6 1.1.0.0i
unaffected

Default status
affected

PhoenixPI-FP8-FP7_1.2.0.0c
unaffected

Default status
affected

RembrandtPI-FP7_1.0.0.Bb
unaffected

Default status
affected

EmbGenoaPI-SP5 1.0.0.B
unaffected

Default status
affected

EmbeddedPI-FP5 1211
unaffected

Default status
affected

EmbeddedR2KPI-FP5 1006
unaffected

Default status
affected

EmbAM4PI 1008
unaffected

Default status
affected

EmbeddedAM5PI 1.0.0.4​
unaffected

Default status
affected

EmbeddedPI-FP5 1211
unaffected

Default status
affected

EmbeddedPI-FP5 1211
unaffected

Default status
affected

EmbeddedPI-FP6_1.0.0.B
unaffected

Default status
affected

Embedded-PI_FP7r2 100F
unaffected

Default status
affected

EmbeddedPhoenixPI-FP7r2_1.0.0.2
unaffected

Credits

Reported through AMD Bug Bounty Program finder

References

www.amd.com/...es/product-security/bulletin/AMD-SB-4013.html

www.amd.com/...es/product-security/bulletin/AMD-SB-3023.html

cve.org (CVE-2024-36355)

nvd.nist.gov (CVE-2024-36355)

Download JSON