We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2022-23820



Description

Failure to validate the AMD SMM communication buffer may allow an attacker to corrupt the SMRAM potentially leading to arbitrary code execution.

Reserved 2022-01-21 | Published 2023-11-14 | Updated 2024-08-03 | Assigner AMD


HIGH: 7.5CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H

Product status

Default status
unaffected

various
affected

Default status
unaffected

various
affected

Default status
unaffected

various
affected

Default status
unaffected

various
affected

Default status
unaffected

Various
affected

Default status
unaffected

various
affected

Default status
unaffected

various
affected

Default status
unaffected

various
affected

Default status
unaffected

various
affected

Default status
unaffected

various
affected

Default status
unaffected

various
affected

Default status
unaffected

various
affected

Default status
unaffected

various
affected

Default status
unaffected

various
affected

Default status
unaffected

various
affected

Default status
unaffected

various
affected

Default status
unaffected

various
affected

Default status
unaffected

various
affected

Default status
unaffected

various
affected

Default status
unaffected

various
affected

References

www.amd.com/...rporate/product-security/bulletin/AMD-SB-4002 vendor-advisory

www.amd.com/...rporate/product-security/bulletin/AMD-SB-3002 vendor-advisory

www.amd.com/...rporate/product-security/bulletin/AMD-SB-5001 vendor-advisory

cve.org (CVE-2022-23820)

nvd.nist.gov (CVE-2022-23820)

Download JSON

Share this page
https://cve.threatint.com/CVE/CVE-2022-23820

Support options

Helpdesk Chat, Email, Knowledgebase
Subscribe to our newsletter to learn more about our work.