A System Management Mode (SMM) handler could perform a callout to code located in non-SMM/untrusted memory. A highly privileged attacker could, with active user interaction and under high complexity and present preconditions, trigger execution of attacker-controlled code in SMM, potentially compromising the system’s confidentiality, integrity, and availability.
Metrics
Affected Vendors & Products
References
History
Fri, 15 May 2026 04:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Title | SMM Callout Handler Enables Execution of Untrusted Code |
Fri, 15 May 2026 02:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A System Management Mode (SMM) handler could perform a callout to code located in non-SMM/untrusted memory. A highly privileged attacker could, with active user interaction and under high complexity and present preconditions, trigger execution of attacker-controlled code in SMM, potentially compromising the system’s confidentiality, integrity, and availability. | |
| Weaknesses | CWE-1072 | |
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: AMD
Published: 2026-05-15T01:41:25.568Z
Updated: 2026-05-15T01:42:03.356Z
Reserved: 2025-12-06T13:53:51.228Z
Link: CVE-2026-0438
No data.
Status : Received
Published: 2026-05-15T02:16:23.637
Modified: 2026-05-15T02:16:23.637
Link: CVE-2026-0438
No data.
ReportizFlow