Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-35m5-23fr-x9rq

Опубликовано: 11 июл. 2025
Источник: github
Github: Не прошло ревью
CVSS3: 8.2

Описание

A vulnerability in the Software SMI handler (SwSmiInputValue 0xB2) allows a local attacker to control the RBX register, which is used to derive pointers (OcHeader, OcData) passed into power and thermal configuration logic. These buffers are not validated before performing multiple structured memory writes based on OcSetup NVRAM values, enabling arbitrary SMRAM corruption and potential SMM privilege escalation.

A vulnerability in the Software SMI handler (SwSmiInputValue 0xB2) allows a local attacker to control the RBX register, which is used to derive pointers (OcHeader, OcData) passed into power and thermal configuration logic. These buffers are not validated before performing multiple structured memory writes based on OcSetup NVRAM values, enabling arbitrary SMRAM corruption and potential SMM privilege escalation.

EPSS

Процентиль: 8%
0.0003
Низкий

8.2 High

CVSS3

Связанные уязвимости

CVSS3: 8.2
nvd
7 месяцев назад

A vulnerability in the Software SMI handler (SwSmiInputValue 0xB2) allows a local attacker to control the RBX register, which is used to derive pointers (OcHeader, OcData) passed into power and thermal configuration logic. These buffers are not validated before performing multiple structured memory writes based on OcSetup NVRAM values, enabling arbitrary SMRAM corruption and potential SMM privilege escalation.

CVSS3: 8.2
fstec
10 месяцев назад

Уязвимость функции SwSmiInputValue() обработчика System Management Interrupt (SMI) микропрограммного обеспечения материнских плат Gigabyte, позволяющая нарушителю обойти ограничения безопасности, повысить свои привилегии и выполнить произвольный код

EPSS

Процентиль: 8%
0.0003
Низкий

8.2 High

CVSS3