We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2022-23820



AssignerAMD
Reserved2022-01-21
Published2023-11-14
Updated2024-08-03

Description

Failure to validate the AMD SMM communication buffer may allow an attacker to corrupt the SMRAM potentially leading to arbitrary code execution.



HIGH: 7.5CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H

Product status

Default status
unaffected

various
affected

Default status
unaffected

various
affected

Default status
unaffected

various
affected

Default status
unaffected

various
affected

Default status
unaffected

Various
affected

Default status
unaffected

various
affected

Default status
unaffected

various
affected

Default status
unaffected

various
affected

Default status
unaffected

various
affected

Default status
unaffected

various
affected

Default status
unaffected

various
affected

Default status
unaffected

various
affected

Default status
unaffected

various
affected

Default status
unaffected

various
affected

Default status
unaffected

various
affected

Default status
unaffected

various
affected

Default status
unaffected

various
affected

Default status
unaffected

various
affected

Default status
unaffected

various
affected

Default status
unaffected

various
affected

References

https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-4002 vendor-advisory

https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-3002 vendor-advisory

https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-5001 vendor-advisory

cve.org CVE-2022-23820

nvd.nist.gov CVE-2022-23820

Download JSON

Share this page
https://cve.threatint.com/CVE/CVE-2022-23820
Support options

Helpdesk Telegram

Subscribe to our newsletter to learn more about our work.