CVE-2025-7027
BaseFortify
Publication date: 2025-07-11
Last updated on: 2025-11-03
Assigner: CERT/CC
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| gigabyte | firmware | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability exists in the Software SMI handler (SwSmiInputValue 0xB2) and allows a local attacker to control both the memory addresses used for reading and writing by the CommandRcx1 function. Specifically, the write address is derived from an unvalidated UEFI NVRAM variable called SetupXtuBufferAddress, and the data to be written is taken from an attacker-controlled pointer based on the RBX register. This results in arbitrary memory writes within System Management RAM (SMRAM), which can lead to privilege escalation within the System Management Mode (SMM) and potentially compromise the firmware.
How can this vulnerability impact me? :
This vulnerability can allow a local attacker to escalate their privileges by writing arbitrary data into SMRAM, which is a highly privileged memory area. This can lead to firmware compromise, potentially allowing the attacker to execute malicious code at a very high privilege level, bypass security controls, and persist on the system even after reboots or operating system reinstallations.