A vulnerability in the Software SMI handler (SwSmiInputValue 0xB2) allows a local attacker to control both the read and write addresses used by the CommandRcx1 function. The write target is derived from an unvalidated UEFI NVRAM variable (SetupXtuBufferAddress), while the write content is read from an attacker-controlled pointer based on the RBX register. This dual-pointer dereference enables arbitrary memory writes within System Management RAM (SMRAM), leading to potential SMM privilege escalation and firmware compromise.
History

Wed, 16 Jul 2025 13:45:00 +0000

Type Values Removed Values Added
Metrics epss

{'score': 0.00017}

epss

{'score': 0.00015}


Tue, 15 Jul 2025 15:15:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 8.2, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Sat, 12 Jul 2025 13:45:00 +0000

Type Values Removed Values Added
Metrics epss

{'score': 0.00017}


Fri, 11 Jul 2025 15:45:00 +0000

Type Values Removed Values Added
Description A vulnerability in the Software SMI handler (SwSmiInputValue 0xB2) allows a local attacker to control both the read and write addresses used by the CommandRcx1 function. The write target is derived from an unvalidated UEFI NVRAM variable (SetupXtuBufferAddress), while the write content is read from an attacker-controlled pointer based on the RBX register. This dual-pointer dereference enables arbitrary memory writes within System Management RAM (SMRAM), leading to potential SMM privilege escalation and firmware compromise.
Title SMM Arbitrary Write via Dual-Controlled Pointers in CommandRcx1
References

cve-icon MITRE

Status: PUBLISHED

Assigner: certcc

Published: 2025-07-11T15:24:26.568Z

Updated: 2025-07-15T14:44:51.936Z

Reserved: 2025-07-02T15:43:08.076Z

Link: CVE-2025-7027

cve-icon Vulnrichment

Updated: 2025-07-15T14:44:47.496Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2025-07-11T16:15:27.053

Modified: 2025-07-15T15:15:26.343

Link: CVE-2025-7027

cve-icon Redhat

No data.