Description
Failure to validate the AMD SMM communication buffer may allow an attacker to corrupt the SMRAM potentially leading to arbitrary code execution.
Reserved 2022-01-21 | Published 2023-11-14 | Updated 2024-08-03 | Assigner
AMDHIGH: 7.5CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H
Product status
Default status
unaffected
various
affected
Default status
unaffected
various
affected
Default status
unaffected
various
affected
Default status
unaffected
various
affected
Default status
unaffected
Various
affected
Default status
unaffected
various
affected
Default status
unaffected
various
affected
Default status
unaffected
various
affected
Default status
unaffected
various
affected
Default status
unaffected
various
affected
Default status
unaffected
various
affected
Default status
unaffected
various
affected
Default status
unaffected
various
affected
Default status
unaffected
various
affected
Default status
unaffected
various
affected
Default status
unaffected
various
affected
Default status
unaffected
various
affected
Default status
unaffected
various
affected
Default status
unaffected
various
affected
Default status
unaffected
various
affected
References
www.amd.com/...rporate/product-security/bulletin/AMD-SB-4002 vendor-advisory
www.amd.com/...rporate/product-security/bulletin/AMD-SB-3002 vendor-advisory
www.amd.com/...rporate/product-security/bulletin/AMD-SB-5001 vendor-advisory
cve.org (CVE-2022-23820)
nvd.nist.gov (CVE-2022-23820)
Download JSON
Subscribe to our newsletter to learn more about our work.