cve/2024/CVE-2024-21947.md
2025-09-29 21:09:30 +02:00

43 lines
4.4 KiB
Markdown

### [CVE-2024-21947](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21947)
![](https://img.shields.io/static/v1?label=Product&message=AMD%20Athlon%E2%84%A2%203000%20Series%20Desktop%20Processors%20with%20Radeon%E2%84%A2%20Graphics&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=AMD%20Athlon%E2%84%A2%203000%20Series%20Mobile%20Processors%20with%20Radeon%E2%84%A2%20Graphics&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=AMD%20Ryzen%E2%84%A2%203000%20Series%20Desktop%20Processors&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=AMD%20Ryzen%E2%84%A2%203000%20Series%20Mobile%20Processors%20with%20Radeon%E2%84%A2%20Graphics&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=AMD%20Ryzen%E2%84%A2%204000%20Series%20Desktop%20Processors&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=AMD%20Ryzen%E2%84%A2%204000%20Series%20Mobile%20Processors%20with%20Radeon%E2%84%A2%20Graphics&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=AMD%20Ryzen%E2%84%A2%205000%20Series%20Desktop%20Processors%20with%20Radeon%E2%84%A2%20Graphics&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=AMD%20Ryzen%E2%84%A2%205000%20Series%20Desktop%20Processors&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=AMD%20Ryzen%E2%84%A2%205000%20Series%20Mobile%20Processors%20with%20Radeon%E2%84%A2%20Graphics&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=AMD%20Ryzen%E2%84%A2%206000%20Series%20Processors%20with%20Radeon%E2%84%A2%20Graphics&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=AMD%20Ryzen%E2%84%A2%207000%20Series%20Desktop%20Processors&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=AMD%20Ryzen%E2%84%A2%207020%20Series%20Processors%20with%20Radeon%E2%84%A2%20Graphics&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=AMD%20Ryzen%E2%84%A2%207030%20Series%20Mobile%20Processors%20with%20Radeon%E2%84%A2%20Graphics&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=AMD%20Ryzen%E2%84%A2%207035%20Series%20Processors%20with%20Radeon%E2%84%A2%20Graphics&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=AMD%20Ryzen%E2%84%A2%207040%20Series%20Mobile%20Processors%20with%20Radeon%E2%84%A2%20Graphics&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=AMD%20Ryzen%E2%84%A2%207045%20Series%20Mobile%20Processors%20with%20Radeon%E2%84%A2%20Graphics&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=AMD%20Ryzen%E2%84%A2%208000%20Series%20Desktop%20Processors&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=AMD%20Ryzen%E2%84%A2%20Embedded%205000%20Series%20Processors&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=AMD%20Ryzen%E2%84%A2%20Embedded%20R1000%20Series%20Processors&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=AMD%20Ryzen%E2%84%A2%20Embedded%20R2000%20Series%20Processors&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=AMD%20Ryzen%E2%84%A2%20Embedded%20V1000%20Series%20Processors&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=AMD%20Ryzen%E2%84%A2%20Embedded%20V2000%20Series%20Processors&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=AMD%20Ryzen%E2%84%A2%20Embedded%20V3000%20Series%20Processors&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=AMD%20Ryzen%E2%84%A2%20Threadripper%E2%84%A2%203000%20Processors&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=AMD%20Ryzen%E2%84%A2%20Threadripper%E2%84%A2%20PRO%203000%20WX-Series%20Processors&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=AMD%20Ryzen%E2%84%A2%20Threadripper%E2%84%A2%20PRO%205000%20WX-Series%20Processors&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=&color=brightgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-1220%20Insufficient%20Granularity%20of%20Access%20Control&color=brightgreen)
### Description
Improper input validation in the system management mode (SMM) could allow a privileged attacker to overwrite arbitrary memory potentially resulting in arbitrary code execution at the SMM level.
### POC
#### Reference
No PoCs from references.
#### Github
- https://github.com/fkie-cad/nvd-json-data-feeds