Description
Improper input validation in the System Management Mode (SMM) communications buffer could allow a privileged attacker to perform an out of bounds read or write to a limited section of the Top of Memory Segment (TSEG) memory region, potentially resulting in loss of confidentiality or integrity.
Published: 2026-05-19
Score: 4.6 Medium
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

Improper input validation in the System Management Mode communications buffer allows a privileged attacker to read or write data outside the intended bounds of the Top of Memory Segment. This out‑of‑bounds access could result in loss of confidentiality or integrity of data stored in that limited memory region.

Affected Systems

The flaw affects a wide range of AMD processors, including the EPYC 4004 and 4005, Ryzen 6000, 7000, 7040, 7045, 8000, 9000, 9000HX, AI 300, AI MAX, Embedded 7000, 8000, 9000, V3000 series, as well as the Threadripper 7000 and Threadripper PRO 7000 WX‑Series. Affected version information is not provided.

Risk and Exploitability

The CVSS score of 4.6 indicates moderate severity. EPSS is not available, and the vulnerability is not listed in CISA KEV catalog. The described vector requires a privileged user that can manipulate SMM communication buffers, implying that the attack is local and likely dependent on firmware or driver interaction. While it does not provide remote code execution, it can still expose sensitive data or alter memory contents within the protected segment.

Generated by OpenCVE AI on May 19, 2026 at 23:26 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the firmware update referenced in AMD’s official bulletins (SB‑3030 or SB‑4017).
  • Check the AMD support portal for the latest firmware patches that address this vulnerability.
  • Continuously monitor for firmware updates and validate the integrity of the SMM implementation.

Generated by OpenCVE AI on May 19, 2026 at 23:26 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 20 May 2026 14:30:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 20 May 2026 11:45:00 +0000

Type Values Removed Values Added
First Time appeared Amd
Amd epyc 4004
Amd epyc 4005
Amd ryzen 6000 Series Processors With Radeon Graphics
Amd ryzen 7000 Series Desktop Processors
Amd ryzen 7040 Series Mobile Processors With Radeon Graphics
Amd ryzen 7045 Series Mobile Processors With Radeon Graphics
Amd ryzen 8000 Series Desktop Processors
Amd ryzen 9000 Series Desktop Processors
Amd ryzen 9000hx Series Mobile Processors
Amd ryzen Ai 300 Series Processors
Amd ryzen Al Max+
Amd ryzen Embedded 7000 Series Processors
Amd ryzen Embedded 8000 Series Processors
Amd ryzen Embedded 9000 Series Processors
Amd ryzen Embedded V3000 Series Processors
Amd ryzen Threadripper 7000 Processors
Amd ryzen Threadripper Pro 7000 Wx-series Processors
Vendors & Products Amd
Amd epyc 4004
Amd epyc 4005
Amd ryzen 6000 Series Processors With Radeon Graphics
Amd ryzen 7000 Series Desktop Processors
Amd ryzen 7040 Series Mobile Processors With Radeon Graphics
Amd ryzen 7045 Series Mobile Processors With Radeon Graphics
Amd ryzen 8000 Series Desktop Processors
Amd ryzen 9000 Series Desktop Processors
Amd ryzen 9000hx Series Mobile Processors
Amd ryzen Ai 300 Series Processors
Amd ryzen Al Max+
Amd ryzen Embedded 7000 Series Processors
Amd ryzen Embedded 8000 Series Processors
Amd ryzen Embedded 9000 Series Processors
Amd ryzen Embedded V3000 Series Processors
Amd ryzen Threadripper 7000 Processors
Amd ryzen Threadripper Pro 7000 Wx-series Processors

Tue, 19 May 2026 23:45:00 +0000

Type Values Removed Values Added
Title Out-of-Bounds Access in AMD System Management Mode Communication Buffer

Tue, 19 May 2026 21:30:00 +0000

Type Values Removed Values Added
Description Improper input validation in the System Management Mode (SMM) communications buffer could allow a privileged attacker to perform an out of bounds read or write to a limited section of the Top of Memory Segment (TSEG) memory region, potentially resulting in loss of confidentiality or integrity.
Weaknesses CWE-124
References
Metrics cvssV4_0

{'score': 4.6, 'vector': 'CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N'}


Subscriptions

Amd Epyc 4004 Epyc 4005 Ryzen 6000 Series Processors With Radeon Graphics Ryzen 7000 Series Desktop Processors Ryzen 7040 Series Mobile Processors With Radeon Graphics Ryzen 7045 Series Mobile Processors With Radeon Graphics Ryzen 8000 Series Desktop Processors Ryzen 9000 Series Desktop Processors Ryzen 9000hx Series Mobile Processors Ryzen Ai 300 Series Processors Ryzen Al Max+ Ryzen Embedded 7000 Series Processors Ryzen Embedded 8000 Series Processors Ryzen Embedded 9000 Series Processors Ryzen Embedded V3000 Series Processors Ryzen Threadripper 7000 Processors Ryzen Threadripper Pro 7000 Wx-series Processors
cve-icon MITRE

Status: PUBLISHED

Assigner: AMD

Published:

Updated: 2026-05-20T13:46:23.737Z

Reserved: 2024-05-23T19:44:47.200Z

Link: CVE-2024-36343

cve-icon Vulnrichment

Updated: 2026-05-20T13:46:18.360Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-05-19T22:16:35.420

Modified: 2026-05-20T14:04:24.967

Link: CVE-2024-36343

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-20T10:38:58Z

Weaknesses