Intel SMM Buffer OOB Read/Write via Improper Input Validation
CVE-2024-36310 Published on February 10, 2026

Improper input validation in the SMM communications buffer could allow a privileged attacker to perform an out of bounds read or write to SMRAM potentially resulting in loss of confidentiality or integrity.

NVD

Weakness Type

What is a buffer underrun Vulnerability?

The software writes to a buffer using an index or pointer that references a memory location prior to the beginning of the buffer. This typically occurs when a pointer or its index is decremented to a position before the buffer, when pointer arithmetic results in a position before the beginning of the valid memory location, or when a negative index is used.

CVE-2024-36310 has been classified to as a buffer underrun vulnerability or weakness.


Affected Versions

AMD EPYC™ 9004 Series Processors: AMD EPYC™ 9005 Series Processors: AMD Ryzen™ 6000 Series Processors with Radeon™ Graphics: AMD Ryzen™ 7040 Series Mobile Processors with Radeon™ Graphics: AMD Ryzen™ 7020 Series Processors with Radeon™ Graphics: AMD Ryzen™ 9000HX Series Mobile Processors: AMD Ryzen™ AI Max 300 Series Processors: AMD Ryzen™ AI 300 Series Processors: AMD Ryzen™ Threadripper™ 7000 Processors: AMD Ryzen™ Threadripper™ PRO 7000 WX-Series Processors: AMD Ryzen™ 8000 Series Desktop Processors: AMD Ryzen™ 9000 Series Desktop Processors: AMD Not public: AMD Ryzen™ 8040 Series Mobile Processors with Radeon™ Graphics: AMD Ryzen™ 7035 Series Processors with Radeon™ Graphics: AMD EPYC™ Embedded 9004 Series Processors (formerly codenamed "Genoa"): AMD Ryzen™ Embedded 8000 Series Processors: AMD Ryzen™ Embedded V3000 Series Processors:

Exploit Probability

EPSS
0.01%
Percentile
0.44%

EPSS (Exploit Prediction Scoring System) scores estimate the probability that a vulnerability will be exploited in the wild within the next 30 days. The percentile shows you how this score compares to all other vulnerabilities.