Search criteria
2 vulnerabilities found for UEFI-OverClockSmiHandler by GIGABYTE
CVE-2025-7029 (GCVE-0-2025-7029)
Vulnerability from nvd – Published: 2025-07-11 15:22 – Updated: 2025-11-03 20:07
VLAI?
Title
SMM Arbitrary Write via Unchecked OcHeader Buffer in Platform Configuration Handler
Summary
A vulnerability in the Software SMI handler (SwSmiInputValue 0xB2) allows a local attacker to control the RBX register, which is used to derive pointers (OcHeader, OcData) passed into power and thermal configuration logic. These buffers are not validated before performing multiple structured memory writes based on OcSetup NVRAM values, enabling arbitrary SMRAM corruption and potential SMM privilege escalation.
Severity ?
8.2 (High)
Assigner
References
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| GIGABYTE | UEFI-OverClockSmiHandler |
Affected:
1.0.0
|
{
"containers": {
"adp": [
{
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 8.2,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H",
"version": "3.1"
}
},
{
"other": {
"content": {
"id": "CVE-2025-7029",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-07-12T03:55:17.650535Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2025-07-15T14:43:47.539Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
},
{
"providerMetadata": {
"dateUpdated": "2025-11-03T20:07:24.142Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"url": "https://www.kb.cert.org/vuls/id/746790"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "UEFI-OverClockSmiHandler",
"vendor": "GIGABYTE",
"versions": [
{
"status": "affected",
"version": "1.0.0"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability in the Software SMI handler (SwSmiInputValue 0xB2) allows a local attacker to control the RBX register, which is used to derive pointers (OcHeader, OcData) passed into power and thermal configuration logic. These buffers are not validated before performing multiple structured memory writes based on OcSetup NVRAM values, enabling arbitrary SMRAM corruption and potential SMM privilege escalation."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "CWE-822 uncontrolled pointer deference",
"lang": "en"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-07-11T15:22:12.577Z",
"orgId": "37e5125f-f79b-445b-8fad-9564f167944b",
"shortName": "certcc"
},
"references": [
{
"url": "https://www.gigabyte.com/Support/Security"
},
{
"url": "https://www.binarly.io/advisories/brly-dva-2025-011"
},
{
"url": "https://kb.cert.org/vuls/id/746790"
}
],
"source": {
"discovery": "EXTERNAL"
},
"title": "SMM Arbitrary Write via Unchecked OcHeader Buffer in Platform Configuration Handler",
"x_generator": {
"engine": "VINCE 3.0.21",
"env": "prod",
"origin": "https://cveawg.mitre.org/api/cve/CVE-2025-7029"
}
}
},
"cveMetadata": {
"assignerOrgId": "37e5125f-f79b-445b-8fad-9564f167944b",
"assignerShortName": "certcc",
"cveId": "CVE-2025-7029",
"datePublished": "2025-07-11T15:22:12.577Z",
"dateReserved": "2025-07-02T15:43:34.209Z",
"dateUpdated": "2025-11-03T20:07:24.142Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.2"
}
CVE-2025-7029 (GCVE-0-2025-7029)
Vulnerability from cvelistv5 – Published: 2025-07-11 15:22 – Updated: 2025-11-03 20:07
VLAI?
Title
SMM Arbitrary Write via Unchecked OcHeader Buffer in Platform Configuration Handler
Summary
A vulnerability in the Software SMI handler (SwSmiInputValue 0xB2) allows a local attacker to control the RBX register, which is used to derive pointers (OcHeader, OcData) passed into power and thermal configuration logic. These buffers are not validated before performing multiple structured memory writes based on OcSetup NVRAM values, enabling arbitrary SMRAM corruption and potential SMM privilege escalation.
Severity ?
8.2 (High)
Assigner
References
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| GIGABYTE | UEFI-OverClockSmiHandler |
Affected:
1.0.0
|
{
"containers": {
"adp": [
{
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 8.2,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H",
"version": "3.1"
}
},
{
"other": {
"content": {
"id": "CVE-2025-7029",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-07-12T03:55:17.650535Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2025-07-15T14:43:47.539Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
},
{
"providerMetadata": {
"dateUpdated": "2025-11-03T20:07:24.142Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"url": "https://www.kb.cert.org/vuls/id/746790"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "UEFI-OverClockSmiHandler",
"vendor": "GIGABYTE",
"versions": [
{
"status": "affected",
"version": "1.0.0"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability in the Software SMI handler (SwSmiInputValue 0xB2) allows a local attacker to control the RBX register, which is used to derive pointers (OcHeader, OcData) passed into power and thermal configuration logic. These buffers are not validated before performing multiple structured memory writes based on OcSetup NVRAM values, enabling arbitrary SMRAM corruption and potential SMM privilege escalation."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "CWE-822 uncontrolled pointer deference",
"lang": "en"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-07-11T15:22:12.577Z",
"orgId": "37e5125f-f79b-445b-8fad-9564f167944b",
"shortName": "certcc"
},
"references": [
{
"url": "https://www.gigabyte.com/Support/Security"
},
{
"url": "https://www.binarly.io/advisories/brly-dva-2025-011"
},
{
"url": "https://kb.cert.org/vuls/id/746790"
}
],
"source": {
"discovery": "EXTERNAL"
},
"title": "SMM Arbitrary Write via Unchecked OcHeader Buffer in Platform Configuration Handler",
"x_generator": {
"engine": "VINCE 3.0.21",
"env": "prod",
"origin": "https://cveawg.mitre.org/api/cve/CVE-2025-7029"
}
}
},
"cveMetadata": {
"assignerOrgId": "37e5125f-f79b-445b-8fad-9564f167944b",
"assignerShortName": "certcc",
"cveId": "CVE-2025-7029",
"datePublished": "2025-07-11T15:22:12.577Z",
"dateReserved": "2025-07-02T15:43:34.209Z",
"dateUpdated": "2025-11-03T20:07:24.142Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.2"
}