The following table lists the changes that have been made to the
CVE-2025-7029 vulnerability over time.
Vulnerability history details can be useful for understanding the evolution
of a vulnerability, and for identifying the most recent changes that may
impact the vulnerability’s severity, exploitability, or other characteristics.
-
New CVE Received
by [email protected]Jul. 11, 2025
Action Type Old Value New Value Added Description A vulnerability in the Software SMI handler (SwSmiInputValue 0xB2) allows a local attacker to control the RBX register, which is used to derive pointers (OcHeader, OcData) passed into power and thermal configuration logic. These buffers are not validated before performing multiple structured memory writes based on OcSetup NVRAM values, enabling arbitrary SMRAM corruption and potential SMM privilege escalation. Added Reference https://kb.cert.org/vuls/id/746790 Added Reference https://www.binarly.io/advisories/brly-dva-2025-011 Added Reference https://www.gigabyte.com/Support/Security