The following table lists the changes that have been made to the
CVE-2025-7026 vulnerability over time.
Vulnerability history details can be useful for understanding the evolution
of a vulnerability, and for identifying the most recent changes that may
impact the vulnerability’s severity, exploitability, or other characteristics.
-
New CVE Received
by [email protected]Jul. 11, 2025
Action Type Old Value New Value Added Description A vulnerability in the Software SMI handler (SwSmiInputValue 0xB2) allows a local attacker to control the RBX register, which is used as an unchecked pointer in the CommandRcx0 function. If the contents at RBX match certain expected values (e.g., ‘$DB$’ or ‘2DB$’), the function performs arbitrary writes to System Management RAM (SMRAM), leading to potential privilege escalation to System Management Mode (SMM) and persistent firmware compromise. Added Reference https://kb.cert.org/vuls/id/746790 Added Reference https://www.binarly.io/advisories/brly-dva-2025-008 Added Reference https://www.gigabyte.com/Support/Security -
CVE Modified
by 134c704f-9b21-4f2e-91b3-4a467353bcc0Jul. 11, 2025
Action Type Old Value New Value Added CVSS V3.1 AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H