Home

Description

Improper input validation in system management mode (SMM) could allow a privileged attacker to overwrite stack memory leading to arbitrary code execution.

PUBLISHED Reserved 2025-03-12 | Published 2026-02-10 | Updated 2026-02-11 | Assigner AMD




HIGH: 7.1CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N

Problem types

CWE-1274 Improper Access Control for Volatile Memory Containing Boot Code

Product status

Default status
affected

GenoaPI 1.0.0.G
unaffected

Default status
affected

MilanPI 1.0.0.H
unaffected

Default status
affected

RomePI 1.0.0.N
unaffected

Default status
affected

NaplesPI 1.0.0.R
unaffected

Default status
affected

TurinPI 1.0.0.6
unaffected

Default status
affected

MI300A 1.0.0.B
unaffected

Default status
affected

MI300C 1.0.0.2
unaffected

Default status
affected

ChagallWSPI-sWRX8 1.0.0.C
unaffected

CastlePeakWSPI-sWRX8 1.0.0.I
unaffected

Default status
affected

ChagallWSPI-sWRX8 1.0.0.C
unaffected

Default status
affected

StormPeakPI-SP6_1.0.0.1l
unaffected

ShimadaPeakPI-SP6_1.0.0.1
unaffected

Default status
affected

StormPeakPI-SP6_1.1.0.0j
unaffected

ShimadaPeakPI-SP6_1.0.0.1
unaffected

Default status
affected

ShimadaPeakPI-SP6_1.0.0.1
unaffected

Default status
affected

ShimadaPeakPI-SP6_1.0.0.1
unaffected

Default status
affected

EmbMilanPI-SP3 v9 1.0.0.C
unaffected

Default status
affected

EmbGenoaPI-SP5 1.0.0.B
unaffected

Default status
affected

EmbRomePI-SP3 1.0.0.F
unaffected

Default status
affected

SnowyOwl_SP4_SP4r2.1.1.0.H
unaffected

Default status
affected

EmbTurinPI-SP5_1.0.0.1
unaffected

Default status
affected

EmbGenoaPI-SP5 1.0.0.B
unaffected

Default status
affected

EmbGenoaPI-SP5 1.0.0.B
unaffected

Credits

Reported through AMD Bug Bounty Program

References

www.amd.com/...es/product-security/bulletin/AMD-SB-4013.html

www.amd.com/...es/product-security/bulletin/AMD-SB-3023.html

cve.org (CVE-2025-29950)

nvd.nist.gov (CVE-2025-29950)

Download JSON