A vulnerability in the Software SMI handler (SwSmiInputValue 0xB2) allows a local attacker to control the RBX register, which is used as an unchecked pointer in the CommandRcx0 function. If the contents at RBX match certain expected values (e.g., '$DB$' or '2DB$'), the function performs arbitrary writes to System Management RAM (SMRAM), leading to potential privilege escalation to System Management Mode (SMM) and persistent firmware compromise.
Metrics
Affected Vendors & Products
References
History
Wed, 16 Jul 2025 13:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
epss
|
epss
|
Sat, 12 Jul 2025 13:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
epss
|
Fri, 11 Jul 2025 16:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
cvssV3_1
|
Fri, 11 Jul 2025 15:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | A vulnerability in the Software SMI handler (SwSmiInputValue 0xB2) allows a local attacker to control the RBX register, which is used as an unchecked pointer in the CommandRcx0 function. If the contents at RBX match certain expected values (e.g., '$DB$' or '2DB$'), the function performs arbitrary writes to System Management RAM (SMRAM), leading to potential privilege escalation to System Management Mode (SMM) and persistent firmware compromise. | |
Title | SMM Arbitrary Write via Unchecked RBX Pointer in CommandRcx0 | |
References |
|

Status: PUBLISHED
Assigner: certcc
Published: 2025-07-11T15:27:34.960Z
Updated: 2025-07-12T03:55:15.583Z
Reserved: 2025-07-02T15:42:52.209Z
Link: CVE-2025-7026

Updated: 2025-07-11T15:58:16.621Z

Status : Awaiting Analysis
Published: 2025-07-11T16:15:26.897
Modified: 2025-07-15T13:14:49.980
Link: CVE-2025-7026

No data.