CVE-2025-7028
Description
A vulnerability in the Software SMI handler (SwSmiInputValue 0x20) allows a local attacker to supply a crafted pointer (FuncBlock) through RBX and RCX register values. This pointer is passed unchecked into multiple flash management functions (ReadFlash, WriteFlash, EraseFlash, and GetFlashInfo) that dereference both the structure and its nested members, such as BufAddr. This enables arbitrary read/write access to System Management RAM (SMRAM), allowing an attacker to corrupt firmware memory, exfiltrate SMRAM content via flash, or install persistent implants.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
CVE-2025-7028 is an SMM vulnerability in Gigabyte firmware allowing local attackers to achieve arbitrary read/write to SMRAM via uncontrolled pointers in the SMI handler.
Vulnerability
The vulnerability resides in the Software SMI handler for SwSmiInputValue 0x20 within Gigabyte UEFI firmware. The handler accepts pointer values from the RBX and RCX registers without validation, using them as a FuncBlock structure that is passed to flash management functions such as ReadFlash, WriteFlash, EraseFlash, and GetFlashInfo. These functions dereference both the structure and its nested BufAddr member, allowing an attacker to control flash operations with arbitrary pointers [1].
Exploitation
An attacker requires local access and the ability to trigger the SMI handler, typically achieved through kernel-level code or during early boot phases. By crafting RBX and RCX register values, the attacker can supply a malicious FuncBlock pointer. The lack of checks on the pointer's validity permits the attacker to specify arbitrary SMRAM addresses, leading to read/write operations outside the intended buffer [2].
Impact
Successful exploitation enables arbitrary read and write access to System Management RAM (SMRAM). This can result in corruption of firmware memory, exfiltration of sensitive SMRAM content via flash operations, or installation of persistent implants that survive OS reboots, potentially compromising the entire system's security [1][2].
Mitigation
Binarly reported the vulnerability to CERT/CC, and affected Gigabyte devices (e.g., GA-IMB1900N, GA-J1800M-D2P-IN) have been identified. As of publication, vendors are expected to release firmware updates. Users should check for patches from their device manufacturer [1].
AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
4News mentions
0No linked articles in our index yet.