A vulnerability in the Software SMI handler (SwSmiInputValue 0xB2) allows a local attacker to control the RBX register, which is used to derive pointers (OcHeader, OcData) passed into power and thermal configuration logic. These buffers are not validated before performing multiple structured memory writes based on OcSetup NVRAM values, enabling arbitrary SMRAM corruption and potential SMM privilege escalation.
History

Wed, 16 Jul 2025 13:45:00 +0000

Type Values Removed Values Added
Metrics epss

{'score': 0.00017}

epss

{'score': 0.00015}


Tue, 15 Jul 2025 15:15:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 8.2, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Sat, 12 Jul 2025 13:45:00 +0000

Type Values Removed Values Added
Metrics epss

{'score': 0.00017}


Fri, 11 Jul 2025 15:45:00 +0000

Type Values Removed Values Added
Description A vulnerability in the Software SMI handler (SwSmiInputValue 0xB2) allows a local attacker to control the RBX register, which is used to derive pointers (OcHeader, OcData) passed into power and thermal configuration logic. These buffers are not validated before performing multiple structured memory writes based on OcSetup NVRAM values, enabling arbitrary SMRAM corruption and potential SMM privilege escalation.
Title SMM Arbitrary Write via Unchecked OcHeader Buffer in Platform Configuration Handler
References

cve-icon MITRE

Status: PUBLISHED

Assigner: certcc

Published: 2025-07-11T15:22:12.577Z

Updated: 2025-07-15T14:43:47.539Z

Reserved: 2025-07-02T15:43:34.209Z

Link: CVE-2025-7029

cve-icon Vulnrichment

Updated: 2025-07-15T14:43:40.815Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2025-07-11T16:15:27.237

Modified: 2025-07-15T15:15:26.493

Link: CVE-2025-7029

cve-icon Redhat

No data.