Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Fri, 15 May 2026 04:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Title | SMM Callout Handler Enables Execution of Untrusted Code |
Fri, 15 May 2026 02:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A System Management Mode (SMM) handler could perform a callout to code located in non-SMM/untrusted memory. A highly privileged attacker could, with active user interaction and under high complexity and present preconditions, trigger execution of attacker-controlled code in SMM, potentially compromising the system’s confidentiality, integrity, and availability. | |
| Weaknesses | CWE-1072 | |
| References |
| |
| Metrics |
cvssV4_0
|
Subscriptions
No data.
Status: PUBLISHED
Assigner: AMD
Published:
Updated: 2026-05-15T13:29:51.481Z
Reserved: 2025-12-06T13:53:51.228Z
Link: CVE-2026-0438
No data.
Status : Awaiting Analysis
Published: 2026-05-15T02:16:23.637
Modified: 2026-05-15T14:10:17.083
Link: CVE-2026-0438
No data.
OpenCVE Enrichment
Updated: 2026-05-15T04:00:12Z