CVE-2021-39298
high-risk
Published 2022-02-16
A potential vulnerability in AMD System Management Mode (SMM) interrupt handler may allow an attacker with high privileges to access the SMM resulting in arbitrary code execution which could be used by malicious actors to bypass security mechanisms provided in the UEFI firmware.
Do I need to act?
-
0.06% chance of exploitation
EPSS score — low exploit probability
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
8
CVSS 8.8/10
High
LOCAL
/ LOW complexity
Affected Products (20)
Z1 Entry Tower G5 Workstation Firmware
Z1 Entry Tower G6 Workstation Firmware
Z1 G8 Tower Desktop Pc Firmware
Z4 G4 Workstation \(Core-X\) Firmware
Z4 G4 Workstation \(Core-X\) Firmware
Z4 G4 Workstation \(Core-X\) Firmware
Z4 G4 Workstation \(Xeon W\) Firmware
Z4 G4 Workstation \(Xeon W\) Firmware
Z4 G4 Workstation \(Xeon W\) Firmware
Z6 G4 Workstation Firmware
Z6 G4 Workstation Firmware
Z6 G4 Workstation Firmware
Z8 G4 Workstation Firmware
Z8 G4 Workstation Firmware
Z8 G4 Workstation Firmware
Engage Flex Mini Retail System Firmware
Affected Vendors
60
/ 100
high-risk
Severity
27/34 · High
Exploitability
0/34 · Minimal
Exposure
33/34 · Critical