Description
A System Management Mode (SMM) handler could perform a callout to code located in non-SMM/untrusted memory. A highly privileged attacker could, with active user interaction and under high complexity and present preconditions, trigger execution of attacker-controlled code in SMM, potentially compromising the system’s confidentiality, integrity, and availability.
Problem types
CWE-1072 Call to Function Pointer from Untrusted Control Sphere in SMM
Product status
PhoenixPI-FP8-FP7_1.2.0.0f
DragonRangeFL1PI 1.0.0.3k
ComboAM5PI 1.0.0.d
FireRangeFL1PI 1.0.0.0d
StrixKrackanPI-FP8_1.1.0.0e
StormPeakPI-SP6 1.0.0.1m
StormPeakPI-SP6_1.1.0.0k
ComboAM5PI 1.1.0.3f
ComboAM5PI_1.2.0.3i
ComboAM5PI 1.1.0.3f
ComboAM5PI_1.2.0.3i
ComboAM5PI_1.2.0.3i
PhoenixPI-FP8-FP7_1.2.0.0f
StrixHaloPI-FP11_1.0.0.2a
PhoenixPI-FP8-FP7_1.2.0.0f
PhoenixPI-FP8-FP7_1.2.0.0f
StrixKrackanPI-FP8_1.1.0.2d
PhoenixPI-FP8-FP7_1.2.0.0f
ShimadaPeakPI-SP6 1.0.0.1c
ShimadaPeakPI-SP6 1.0.0.1c
ShimadaPeakPI-SP6 1.0.0.1c
ShimadaPeakPI-SP6 1.0.0.1c
ComboAM5PI_1.3.0.0
ComboAM5PI_1.3.0.0
ComboAM5PI_1.3.0.0
EmbeddedAM5PI 1.0.0.5
EmbeddedPhoenixPI-FP7r2_1.0.0.4
EmbeddedAM5PI 1.0.0.5
ComboAM5PI 1.0.0.d / ComboAM5PI 1.1.0.3f / ComboAM5PI_1.2.0.3i
ComboAM5PI_1.2.0.3i
References
www.amd.com/...es/product-security/bulletin/AMD-SB-3030.html
www.amd.com/...es/product-security/bulletin/AMD-SB-4017.html