Improper input validation in the SMM communications buffer could allow a privileged attacker to perform an out of bounds read or write to SMRAM potentially resulting in loss of confidentiality or integrity.
Advisories

No advisories yet.

Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Tue, 10 Feb 2026 22:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Tue, 10 Feb 2026 19:45:00 +0000

Type Values Removed Values Added
Description Improper input validation in the SMM communications buffer could allow a privileged attacker to perform an out of bounds read or write to SMRAM potentially resulting in loss of confidentiality or integrity.
Weaknesses CWE-124
References
Metrics cvssV4_0

{'score': 4.6, 'vector': 'CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N'}


Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: AMD

Published:

Updated: 2026-02-10T21:26:51.882Z

Reserved: 2024-05-23T19:44:32.296Z

Link: CVE-2024-36310

cve-icon Vulnrichment

Updated: 2026-02-10T21:26:45.410Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-02-10T20:16:42.550

Modified: 2026-02-10T21:51:48.077

Link: CVE-2024-36310

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses