CVE-2025-7029 – Intel Software SMI Handler Buffer Overflow Vulnerability

The following table lists the changes that have been made to the
CVE-2025-7029 vulnerability over time.

Vulnerability history details can be useful for understanding the evolution
of a vulnerability, and for identifying the most recent changes that may
impact the vulnerability’s severity, exploitability, or other characteristics.

  • New CVE Received
    by [email protected]

    Jul. 11, 2025

    Action Type Old Value New Value
    Added Description A vulnerability in the Software SMI handler (SwSmiInputValue 0xB2) allows a local attacker to control the RBX register, which is used to derive pointers (OcHeader, OcData) passed into power and thermal configuration logic. These buffers are not validated before performing multiple structured memory writes based on OcSetup NVRAM values, enabling arbitrary SMRAM corruption and potential SMM privilege escalation.
    Added Reference https://kb.cert.org/vuls/id/746790
    Added Reference https://www.binarly.io/advisories/brly-dva-2025-011
    Added Reference https://www.gigabyte.com/Support/Security
Share the Post:

Related Posts