CVE-2025-7027
Unknown Unknown - Not Provided
BaseFortify

Publication date: 2025-07-11

Last updated on: 2025-11-03

Assigner: CERT/CC

Description
A vulnerability in the Software SMI handler (SwSmiInputValue 0xB2) allows a local attacker to control both the read and write addresses used by the CommandRcx1 function. The write target is derived from an unvalidated UEFI NVRAM variable (SetupXtuBufferAddress), while the write content is read from an attacker-controlled pointer based on the RBX register. This dual-pointer dereference enables arbitrary memory writes within System Management RAM (SMRAM), leading to potential SMM privilege escalation and firmware compromise.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-07-11
Last Modified
2025-11-03
Generated
2026-05-07
AI Q&A
2025-07-11
EPSS Evaluated
2026-05-05
NVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
gigabyte firmware *
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-UNKNOWN
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability exists in the Software SMI handler (SwSmiInputValue 0xB2) and allows a local attacker to control both the memory addresses used for reading and writing by the CommandRcx1 function. Specifically, the write address is derived from an unvalidated UEFI NVRAM variable called SetupXtuBufferAddress, and the data to be written is taken from an attacker-controlled pointer based on the RBX register. This results in arbitrary memory writes within System Management RAM (SMRAM), which can lead to privilege escalation within the System Management Mode (SMM) and potentially compromise the firmware.


How can this vulnerability impact me? :

This vulnerability can allow a local attacker to escalate their privileges by writing arbitrary data into SMRAM, which is a highly privileged memory area. This can lead to firmware compromise, potentially allowing the attacker to execute malicious code at a very high privilege level, bypass security controls, and persist on the system even after reboots or operating system reinstallations.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart