Home
HIGH: 7.1 CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:NDefault status
affected
GenoaPI 1.0.0.G
unaffected
Default status
affected
MilanPI 1.0.0.H
unaffected
Default status
affected
RomePI 1.0.0.N
unaffected
Default status
affected
NaplesPI 1.0.0.R
unaffected
Default status
affected
TurinPI 1.0.0.6
unaffected
Default status
affected
MI300A 1.0.0.B
unaffected
Default status
affected
MI300C 1.0.0.2
unaffected
Default status
affected
ChagallWSPI-sWRX8 1.0.0.C
unaffected
CastlePeakWSPI-sWRX8 1.0.0.I
unaffected
Default status
affected
ChagallWSPI-sWRX8 1.0.0.C
unaffected
Default status
affected
StormPeakPI-SP6_1.0.0.1l
unaffected
ShimadaPeakPI-SP6_1.0.0.1
unaffected
Default status
affected
StormPeakPI-SP6_1.1.0.0j
unaffected
ShimadaPeakPI-SP6_1.0.0.1
unaffected
Default status
affected
ShimadaPeakPI-SP6_1.0.0.1
unaffected
Default status
affected
ShimadaPeakPI-SP6_1.0.0.1
unaffected
Default status
affected
EmbMilanPI-SP3 v9 1.0.0.C
unaffected
Default status
affected
EmbGenoaPI-SP5 1.0.0.B
unaffected
Default status
affected
EmbRomePI-SP3 1.0.0.F
unaffected
Default status
affected
SnowyOwl_SP4_SP4r2.1.1.0.H
unaffected
Default status
affected
EmbTurinPI-SP5_1.0.0.1
unaffected
Default status
affected
EmbGenoaPI-SP5 1.0.0.B
unaffected
Default status
affected
EmbGenoaPI-SP5 1.0.0.B
unaffected
Description
Improper input validation in system management mode (SMM) could allow a privileged attacker to overwrite stack memory leading to arbitrary code execution.
Problem types
CWE-1274 Improper Access Control for Volatile Memory Containing Boot Code
Product status
GenoaPI 1.0.0.G
MilanPI 1.0.0.H
RomePI 1.0.0.N
NaplesPI 1.0.0.R
TurinPI 1.0.0.6
MI300A 1.0.0.B
MI300C 1.0.0.2
ChagallWSPI-sWRX8 1.0.0.C
CastlePeakWSPI-sWRX8 1.0.0.I
ChagallWSPI-sWRX8 1.0.0.C
StormPeakPI-SP6_1.0.0.1l
ShimadaPeakPI-SP6_1.0.0.1
StormPeakPI-SP6_1.1.0.0j
ShimadaPeakPI-SP6_1.0.0.1
ShimadaPeakPI-SP6_1.0.0.1
ShimadaPeakPI-SP6_1.0.0.1
EmbMilanPI-SP3 v9 1.0.0.C
EmbGenoaPI-SP5 1.0.0.B
EmbRomePI-SP3 1.0.0.F
SnowyOwl_SP4_SP4r2.1.1.0.H
EmbTurinPI-SP5_1.0.0.1
EmbGenoaPI-SP5 1.0.0.B
EmbGenoaPI-SP5 1.0.0.B
Credits
Reported through AMD Bug Bounty Program
References
www.amd.com/...es/product-security/bulletin/AMD-SB-4013.html
www.amd.com/...es/product-security/bulletin/AMD-SB-3023.html