CVE-2021-39298

high-risk
Published 2022-02-16

A potential vulnerability in AMD System Management Mode (SMM) interrupt handler may allow an attacker with high privileges to access the SMM resulting in arbitrary code execution which could be used by malicious actors to bypass security mechanisms provided in the UEFI firmware.

Do I need to act?

-
0.06% chance of exploitation
EPSS score — low exploit probability
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
8
CVSS 8.8/10 High
LOCAL / LOW complexity

Affected Products (20)

Z1 Entry Tower G5 Workstation Firmware
Z1 Entry Tower G6 Workstation Firmware
Z1 G8 Tower Desktop Pc Firmware
Z4 G4 Workstation \(Core-X\) Firmware
Z4 G4 Workstation \(Core-X\) Firmware
Z4 G4 Workstation \(Core-X\) Firmware
Z4 G4 Workstation \(Xeon W\) Firmware
Z4 G4 Workstation \(Xeon W\) Firmware
Z4 G4 Workstation \(Xeon W\) Firmware
Z6 G4 Workstation Firmware
Z6 G4 Workstation Firmware
Z6 G4 Workstation Firmware
Z8 G4 Workstation Firmware
Z8 G4 Workstation Firmware
Z8 G4 Workstation Firmware
Engage Flex Mini Retail System Firmware

Affected Vendors

Hp
60
/ 100
high-risk
Severity 27/34 · High
Exploitability 0/34 · Minimal
Exposure 33/34 · Critical