Assigner | AMD |
Reserved | 2022-01-21 |
Published | 2024-06-18 |
Updated | 2024-08-29 |
Description
A potential weakness in AMD SPI protection features may allow a malicious attacker with Ring0 (kernel mode) access to bypass the native System Management Mode (SMM) ROM protections.
HIGH: 8.2 | CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H |
Product status
Default status
affected
various
affected
Default status
affected
various
affected
Default status
affected
various
affected
Default status
affected
various
affected
Default status
affected
various
affected
Default status
affected
various
affected
Default status
affected
various
affected
Default status
affected
various
affected
Default status
affected
various
affected
Default status
affected
various
affected
Default status
affected
various
affected
Default status
affected
various
affected
Default status
affected
various
affected
Default status
affected
various
affected
Default status
affected
various
affected
Default status
affected
various
affected
Default status
affected
various
affected
Default status
affected
various
affected
Default status
affected
various
affected
Default status
affected
various
affected
Default status
affected
various
affected
Default status
affected
various
affected
Default status
affected
various
affected
Default status
affected
various
affected
References
https://www.amd.com/en/resources/product-security/bulletin/amd-sb-1041.html
cve.org CVE-2022-23829
nvd.nist.gov CVE-2022-23829
Download JSON
Share this page
https://cve.threatint.com/CVE/CVE-2022-23829
Subscribe to our newsletter to learn more about our work.