Improper input validation for DIMM serial presence detect...
High severity
Unreviewed
Published
Sep 6, 2025
to the GitHub Advisory Database
•
Updated Sep 6, 2025
Description
Published by the National Vulnerability Database
Sep 6, 2025
Published to the GitHub Advisory Database
Sep 6, 2025
Last updated
Sep 6, 2025
Improper input validation for DIMM serial presence detect (SPD) metadata could allow an attacker with physical access, ring0 access on a system with a non-compliant DIMM, or control over the Root of Trust for BIOS update, to bypass SMM isolation potentially resulting in arbitrary code execution at the SMM level.
References