Metrics
Affected Vendors & Products
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Wed, 16 Jul 2025 13:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
epss
|
epss
|
Tue, 15 Jul 2025 15:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
cvssV3_1
|
Sat, 12 Jul 2025 13:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
epss
|
Fri, 11 Jul 2025 15:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | A vulnerability in the Software SMI handler (SwSmiInputValue 0xB2) allows a local attacker to control the RBX register, which is used to derive pointers (OcHeader, OcData) passed into power and thermal configuration logic. These buffers are not validated before performing multiple structured memory writes based on OcSetup NVRAM values, enabling arbitrary SMRAM corruption and potential SMM privilege escalation. | |
Title | SMM Arbitrary Write via Unchecked OcHeader Buffer in Platform Configuration Handler | |
References |
|

Status: PUBLISHED
Assigner: certcc
Published:
Updated: 2025-07-15T14:43:47.539Z
Reserved: 2025-07-02T15:43:34.209Z
Link: CVE-2025-7029

Updated: 2025-07-15T14:43:40.815Z

Status : Awaiting Analysis
Published: 2025-07-11T16:15:27.237
Modified: 2025-07-15T15:15:26.493
Link: CVE-2025-7029

No data.

No data.