Improper input validation in system management mode (SMM) could allow a privileged attacker to overwrite stack memory leading to arbitrary code execution.

Project Subscriptions

Vendors Products
Epyc 7001 Series Processors Subscribe
Epyc 7002 Series Processors Subscribe
Epyc 7003 Series Processors Subscribe
Epyc 9004 Series Processors Subscribe
Epyc 9005 Series Processors Subscribe
Epyc 9v64h Processor Subscribe
Epyc Embedded 3000 Series Processors Subscribe
Epyc Embedded 7002 Series Processors Subscribe
Epyc Embedded 7003 Series Processors Subscribe
Epyc Embedded 8004 Series Processors Subscribe
Epyc Embedded 9004 Series Processors Subscribe
Epyc Embedded 9005 Series Processors Subscribe
Instinct Mi300a Subscribe
Ryzen Threadripper 7000 Processors Subscribe
Ryzen Threadripper 9000 Processors Subscribe
Ryzen Threadripper Pro 3000wx Processors Subscribe
Ryzen Threadripper Pro 5000 Wx-series Processors Subscribe
Ryzen Threadripper Pro 7000 Wx-series Processors Subscribe
Ryzen Threadripper Pro 9000 Wx-series Processors Subscribe
Advisories

No advisories yet.

Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Thu, 12 Feb 2026 11:30:00 +0000

Type Values Removed Values Added
First Time appeared Amd
Amd epyc 7001 Series Processors
Amd epyc 7002 Series Processors
Amd epyc 7003 Series Processors
Amd epyc 9004 Series Processors
Amd epyc 9005 Series Processors
Amd epyc 9v64h Processor
Amd epyc Embedded 3000 Series Processors
Amd epyc Embedded 7002 Series Processors
Amd epyc Embedded 7003 Series Processors
Amd epyc Embedded 8004 Series Processors
Amd epyc Embedded 9004 Series Processors
Amd epyc Embedded 9005 Series Processors
Amd instinct Mi300a
Amd ryzen Threadripper 7000 Processors
Amd ryzen Threadripper 9000 Processors
Amd ryzen Threadripper Pro 3000wx Processors
Amd ryzen Threadripper Pro 5000 Wx-series Processors
Amd ryzen Threadripper Pro 7000 Wx-series Processors
Amd ryzen Threadripper Pro 9000 Wx-series Processors
Vendors & Products Amd
Amd epyc 7001 Series Processors
Amd epyc 7002 Series Processors
Amd epyc 7003 Series Processors
Amd epyc 9004 Series Processors
Amd epyc 9005 Series Processors
Amd epyc 9v64h Processor
Amd epyc Embedded 3000 Series Processors
Amd epyc Embedded 7002 Series Processors
Amd epyc Embedded 7003 Series Processors
Amd epyc Embedded 8004 Series Processors
Amd epyc Embedded 9004 Series Processors
Amd epyc Embedded 9005 Series Processors
Amd instinct Mi300a
Amd ryzen Threadripper 7000 Processors
Amd ryzen Threadripper 9000 Processors
Amd ryzen Threadripper Pro 3000wx Processors
Amd ryzen Threadripper Pro 5000 Wx-series Processors
Amd ryzen Threadripper Pro 7000 Wx-series Processors
Amd ryzen Threadripper Pro 9000 Wx-series Processors

Tue, 10 Feb 2026 21:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Tue, 10 Feb 2026 19:45:00 +0000

Type Values Removed Values Added
Description Improper input validation in system management mode (SMM) could allow a privileged attacker to overwrite stack memory leading to arbitrary code execution.
Weaknesses CWE-1274
References
Metrics cvssV4_0

{'score': 7.1, 'vector': 'CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N'}


Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: AMD

Published:

Updated: 2026-02-11T04:56:51.402Z

Reserved: 2025-03-12T15:15:04.911Z

Link: CVE-2025-29950

cve-icon Vulnrichment

Updated: 2026-02-10T21:01:43.154Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-02-10T20:16:44.493

Modified: 2026-02-10T21:51:48.077

Link: CVE-2025-29950

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-02-12T11:19:43Z

Weaknesses