Improper input validation in the System Management Mode (SMM) communications buffer could allow a privileged attacker to perform an out of bounds read or write to a limited section of the Top of Memory Segment (TSEG) memory region, potentially resulting in loss of confidentiality or integrity.

Project Subscriptions

No data.

Advisories

No advisories yet.

Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Tue, 19 May 2026 21:30:00 +0000

Type Values Removed Values Added
Description Improper input validation in the System Management Mode (SMM) communications buffer could allow a privileged attacker to perform an out of bounds read or write to a limited section of the Top of Memory Segment (TSEG) memory region, potentially resulting in loss of confidentiality or integrity.
Weaknesses CWE-124
References
Metrics cvssV4_0

{'score': 4.6, 'vector': 'CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N'}


Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: AMD

Published:

Updated: 2026-05-19T21:03:48.439Z

Reserved: 2024-05-23T19:44:47.200Z

Link: CVE-2024-36343

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2026-05-19T22:16:35.420

Modified: 2026-05-19T22:16:35.420

Link: CVE-2024-36343

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses