A System Management Mode (SMM) handler could perform a callout to code located in non-SMM/untrusted memory. A highly privileged attacker could, with active user interaction and under high complexity and present preconditions, trigger execution of attacker-controlled code in SMM, potentially compromising the system’s confidentiality, integrity, and availability.
Project Subscriptions
No data.
Advisories
No advisories yet.
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Fri, 15 May 2026 04:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Title | SMM Callout Handler Enables Execution of Untrusted Code |
Fri, 15 May 2026 02:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A System Management Mode (SMM) handler could perform a callout to code located in non-SMM/untrusted memory. A highly privileged attacker could, with active user interaction and under high complexity and present preconditions, trigger execution of attacker-controlled code in SMM, potentially compromising the system’s confidentiality, integrity, and availability. | |
| Weaknesses | CWE-1072 | |
| References |
| |
| Metrics |
cvssV4_0
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: AMD
Published:
Updated: 2026-05-15T01:42:03.356Z
Reserved: 2025-12-06T13:53:51.228Z
Link: CVE-2026-0438
No data.
Status : Received
Published: 2026-05-15T02:16:23.637
Modified: 2026-05-15T02:16:23.637
Link: CVE-2026-0438
No data.
OpenCVE Enrichment
Updated: 2026-05-15T04:00:12Z
Weaknesses