A vulnerability in the Software SMI handler (SwSmiInputValue 0xB2) allows a local attacker to control the RBX register, which is used as an unchecked pointer in the CommandRcx0 function. If the contents at RBX match certain expected values (e.g., '$DB$' or '2DB$'), the function performs arbitrary writes to System Management RAM (SMRAM), leading to potential privilege escalation to System Management Mode (SMM) and persistent firmware compromise.
History

Wed, 16 Jul 2025 13:45:00 +0000

Type Values Removed Values Added
Metrics epss

{'score': 0.00011}

epss

{'score': 0.00015}


Sat, 12 Jul 2025 13:45:00 +0000

Type Values Removed Values Added
Metrics epss

{'score': 0.00011}


Fri, 11 Jul 2025 16:15:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 8.2, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Fri, 11 Jul 2025 15:45:00 +0000

Type Values Removed Values Added
Description A vulnerability in the Software SMI handler (SwSmiInputValue 0xB2) allows a local attacker to control the RBX register, which is used as an unchecked pointer in the CommandRcx0 function. If the contents at RBX match certain expected values (e.g., '$DB$' or '2DB$'), the function performs arbitrary writes to System Management RAM (SMRAM), leading to potential privilege escalation to System Management Mode (SMM) and persistent firmware compromise.
Title SMM Arbitrary Write via Unchecked RBX Pointer in CommandRcx0
References

cve-icon MITRE

Status: PUBLISHED

Assigner: certcc

Published: 2025-07-11T15:27:34.960Z

Updated: 2025-07-12T03:55:15.583Z

Reserved: 2025-07-02T15:42:52.209Z

Link: CVE-2025-7026

cve-icon Vulnrichment

Updated: 2025-07-11T15:58:16.621Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2025-07-11T16:15:26.897

Modified: 2025-07-15T13:14:49.980

Link: CVE-2025-7026

cve-icon Redhat

No data.