Vulnerability Database

327,210

Total vulnerabilities in the database

CVE-2022-23820

Failure to validate the AMD SMM communication buffer may allow an attacker to corrupt the SMRAM potentially leading to arbitrary code execution.

  • Published: Nov 14, 2023
  • Updated: Nov 16, 2025
  • CVE: CVE-2022-23820
  • Severity: High
  • Exploit:

CVSS v3:

  • Severity: High
  • Score: 7.5
  • AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H

CWEs:

Software From Fixed in
amd / ryzen_9_3900_firmware comboam4_pi_1.0.0.9 comboam4_pi_1.0.0.9.x
amd / ryzen_9_3900_firmware comboam4_v2_pi_1.2.0.8 comboam4_v2_pi_1.2.0.8.x
amd / ryzen_9_3900x_firmware comboam4_pi_1.0.0.9 comboam4_pi_1.0.0.9.x
amd / ryzen_9_3900x_firmware comboam4_v2_pi_1.2.0.8 comboam4_v2_pi_1.2.0.8.x
amd / ryzen_9_3900xt_firmware comboam4_pi_1.0.0.9 comboam4_pi_1.0.0.9.x
amd / ryzen_9_3900xt_firmware comboam4_v2_pi_1.2.0.8 comboam4_v2_pi_1.2.0.8.x
amd / ryzen_9_3950x_firmware comboam4_pi_1.0.0.9 comboam4_pi_1.0.0.9.x
amd / ryzen_9_3950x_firmware comboam4_v2_pi_1.2.0.8 comboam4_v2_pi_1.2.0.8.x
amd / ryzen_7_3700x_firmware comboam4_pi_1.0.0.9 comboam4_pi_1.0.0.9.x
amd / ryzen_7_3700x_firmware comboam4_v2_pi_1.2.0.8 comboam4_v2_pi_1.2.0.8.x
amd / ryzen_7_3800x_firmware comboam4_pi_1.0.0.9 comboam4_pi_1.0.0.9.x
amd / ryzen_7_3800x_firmware comboam4_v2_pi_1.2.0.8 comboam4_v2_pi_1.2.0.8.x
amd / ryzen_7_3800xt_firmware comboam4_pi_1.0.0.9 comboam4_pi_1.0.0.9.x
amd / ryzen_7_3800xt_firmware comboam4_v2_pi_1.2.0.8 comboam4_v2_pi_1.2.0.8.x
amd / ryzen_5_3500_firmware comboam4_pi_1.0.0.9 comboam4_pi_1.0.0.9.x
amd / ryzen_5_3500_firmware comboam4_v2_pi_1.2.0.8 comboam4_v2_pi_1.2.0.8.x
amd / ryzen_5_3500x_firmware comboam4_pi_1.0.0.9 comboam4_pi_1.0.0.9.x
amd / ryzen_5_3500x_firmware comboam4_v2_pi_1.2.0.8 comboam4_v2_pi_1.2.0.8.x
amd / ryzen_5_3600_firmware comboam4_pi_1.0.0.9 comboam4_pi_1.0.0.9.x
amd / ryzen_5_3600_firmware comboam4_v2_pi_1.2.0.8 comboam4_v2_pi_1.2.0.8.x
amd / ryzen_5_3600x_firmware comboam4_pi_1.0.0.9 comboam4_pi_1.0.0.9.x
amd / ryzen_5_3600x_firmware comboam4_v2_pi_1.2.0.8 comboam4_v2_pi_1.2.0.8.x
amd / ryzen_5_3600xt_firmware comboam4_pi_1.0.0.9 comboam4_pi_1.0.0.9.x
amd / ryzen_5_3600xt_firmware comboam4_v2_pi_1.2.0.8 comboam4_v2_pi_1.2.0.8.x
amd / ryzen_3_3100_firmware comboam4_pi_1.0.0.9 comboam4_pi_1.0.0.9.x
amd / ryzen_3_3100_firmware comboam4_v2_pi_1.2.0.8 comboam4_v2_pi_1.2.0.8.x
amd / ryzen_3_3300x_firmware comboam4_pi_1.0.0.9 comboam4_pi_1.0.0.9.x
amd / ryzen_3_3300x_firmware comboam4_v2_pi_1.2.0.8 comboam4_v2_pi_1.2.0.8.x
amd / ryzen_9_5900_firmware comboam4_v2_pi_1.2.0.8 comboam4_v2_pi_1.2.0.8.x
amd / ryzen_9_5900x_firmware comboam4_v2_pi_1.2.0.8 comboam4_v2_pi_1.2.0.8.x
amd / ryzen_9_5950x_firmware comboam4_v2_pi_1.2.0.8 comboam4_v2_pi_1.2.0.8.x
amd / ryzen_9_pro_5945_firmware comboam4_v2_pi_1.2.0.8 comboam4_v2_pi_1.2.0.8.x
amd / ryzen_7_pro_5845_firmware comboam4_v2_pi_1.2.0.8 comboam4_v2_pi_1.2.0.8.x
amd / ryzen_7_5800_firmware comboam4_v2_pi_1.2.0.8 comboam4_v2_pi_1.2.0.8.x
amd / ryzen_7_5800x_firmware comboam4_v2_pi_1.2.0.8 comboam4_v2_pi_1.2.0.8.x
amd / ryzen_7_5700x_firmware comboam4_v2_pi_1.2.0.8 comboam4_v2_pi_1.2.0.8.x
amd / ryzen_5_5600_firmware comboam4_v2_pi_1.2.0.8 comboam4_v2_pi_1.2.0.8.x
amd / ryzen_5_5600x_firmware comboam4_v2_pi_1.2.0.8 comboam4_v2_pi_1.2.0.8.x
amd / ryzen_5_56003xd_firmware comboam4_v2_pi_1.2.0.8 comboam4_v2_pi_1.2.0.8.x
amd / ryzen_5_pro_5645_firmware comboam4_v2_pi_1.2.0.8 comboam4_v2_pi_1.2.0.8.x
amd / ryzen_5_5500_firmware comboam4v2_pi_1.2.0.8 comboam4v2_pi_1.2.0.8.x
amd / ryzen_5_5500x_firmware comboam4v2_pi_1.2.0.8 comboam4v2_pi_1.2.0.8.x
amd / ryzen_5_55003xd_firmware comboam4v2_pi_1.2.0.8 comboam4v2_pi_1.2.0.8.x
amd / ryzen_7_5700_firmware comboam4v2_pi_1.2.0.8 comboam4v2_pi_1.2.0.8.x
amd / ryzen_3_5100_firmware comboam4v2_pi_1.2.0.8 comboam4v2_pi_1.2.0.8.x
amd / ryzen_5_pro_3400g_firmware comboam4_pi_1.0.0.9 comboam4_pi_1.0.0.9.x
amd / ryzen_5_pro_3400g_firmware comboam4_v2_pi_1.2.0.8 comboam4_v2_pi_1.2.0.8.x
amd / ryzen_5_pro_3400ge_firmware comboam4_pi_1.0.0.9 comboam4_pi_1.0.0.9.x
amd / ryzen_5_pro_3400ge_firmware comboam4_v2_pi_1.2.0.8 comboam4_v2_pi_1.2.0.8.x
amd / ryzen_5_pro_3350g_firmware comboam4_pi_1.0.0.9 comboam4_pi_1.0.0.9.x
amd / ryzen_5_pro_3350g_firmware comboam4_v2_pi_1.2.0.8 comboam4_v2_pi_1.2.0.8.x
amd / ryzen_5_pro_3350ge_firmware comboam4_pi_1.0.0.9 comboam4_pi_1.0.0.9.x
amd / ryzen_5_pro_3350ge_firmware comboam4_v2_pi_1.2.0.8 comboam4_v2_pi_1.2.0.8.x
amd / ryzen_threadripper_2990wx_firmware summitpi-sp3r2_1.1.0.6 summitpi-sp3r2_1.1.0.6.x
amd / ryzen_threadripper_2970wx_firmware summitpi-sp3r2_1.1.0.6 summitpi-sp3r2_1.1.0.6.x
amd / ryzen_threadripper_2950x_firmware summitpi-sp3r2_1.1.0.6 summitpi-sp3r2_1.1.0.6.x
amd / ryzen_threadripper_2920x_firmware summitpi-sp3r2_1.1.0.6 summitpi-sp3r2_1.1.0.6.x
amd / ryzen_threadripper_pro_3995wx_firmware castlepeakpi-sp3r2_1.1.0.8 castlepeakpi-sp3r2_1.1.0.8.x
amd / ryzen_threadripper_pro_3975wx_firmware castlepeakpi-sp3r2_1.1.0.8 castlepeakpi-sp3r2_1.1.0.8.x
amd / ryzen_threadripper_pro_3955wx_firmware castlepeakpi-sp3r2_1.1.0.8 castlepeakpi-sp3r2_1.1.0.8.x
amd / ryzen_threadripper_pro_3945wx_firmware castlepeakpi-sp3r2_1.1.0.8 castlepeakpi-sp3r2_1.1.0.8.x
amd / ryzen_threadripper_3990x_firmware castlepeakpi-sp3r2_1.1.0.8 castlepeakpi-sp3r2_1.1.0.8.x
amd / ryzen_threadripper_3970x_firmware castlepeakpi-sp3r2_1.1.0.8 castlepeakpi-sp3r2_1.1.0.8.x
amd / ryzen_threadripper_3960x_firmware castlepeakpi-sp3r2_1.1.0.8 castlepeakpi-sp3r2_1.1.0.8.x
amd / athlon_3015e_firmware pollockpi-ft5_1.0.0.5 pollockpi-ft5_1.0.0.5.x
amd / athlon_3015ce_firmware pollockpi-ft5_1.0.0.5 pollockpi-ft5_1.0.0.5.x
amd / ryzen_7_3780u_firmware picassopi-fp5_1.0.0.e picassopi-fp5_1.0.0.e.x
amd / ryzen_7_3750h_firmware picassopi-fp5_1.0.0.e picassopi-fp5_1.0.0.e.x
amd / ryzen_7_3700c_firmware picassopi-fp5_1.0.0.e picassopi-fp5_1.0.0.e.x
amd / ryzen_7_3700u_firmware picassopi-fp5_1.0.0.e picassopi-fp5_1.0.0.e.x
amd / ryzen_5_3580u_firmware picassopi-fp5_1.0.0.e picassopi-fp5_1.0.0.e.x
amd / ryzen_5_3550h_firmware picassopi-fp5_1.0.0.e picassopi-fp5_1.0.0.e.x
amd / ryzen_5_3500c_firmware picassopi-fp5_1.0.0.e picassopi-fp5_1.0.0.e.x
amd / ryzen_5_3500u_firmware picassopi-fp5_1.0.0.e picassopi-fp5_1.0.0.e.x
amd / ryzen_5_3450u_firmware picassopi-fp5_1.0.0.e picassopi-fp5_1.0.0.e.x
amd / ryzen_3_3350u_firmware picassopi-fp5_1.0.0.e picassopi-fp5_1.0.0.e.x
amd / ryzen_3_3300u_firmware picassopi-fp5_1.0.0.e picassopi-fp5_1.0.0.e.x
amd / ryzen_9_4900h_firmware renoirpi-fp6_1.0.0.9 renoirpi-fp6_1.0.0.9.x
amd / ryzen_9_4900hs_firmware renoirpi-fp6_1.0.0.9 renoirpi-fp6_1.0.0.9.x
amd / ryzen_7_4800hs_firmware renoirpi-fp6_1.0.0.9 renoirpi-fp6_1.0.0.9.x
amd / ryzen_7_4800h_firmware renoirpi-fp6_1.0.0.9 renoirpi-fp6_1.0.0.9.x
amd / ryzen_7_4800u_firmware renoirpi-fp6_1.0.0.9 renoirpi-fp6_1.0.0.9.x
amd / ryzen_7_4700u_firmware renoirpi-fp6_1.0.0.9 renoirpi-fp6_1.0.0.9.x
amd / ryzen_7_4980u_firmware renoirpi-fp6_1.0.0.9 renoirpi-fp6_1.0.0.9.x
amd / ryzen_5_4600h_firmware renoirpi-fp6_1.0.0.9 renoirpi-fp6_1.0.0.9.x
amd / ryzen_5_4600hs_firmware renoirpi-fp6_1.0.0.9 renoirpi-fp6_1.0.0.9.x
amd / ryzen_5_4500u_firmware renoirpi-fp6_1.0.0.9 renoirpi-fp6_1.0.0.9.x
amd / ryzen_5_4600u_firmware renoirpi-fp6_1.0.0.9 renoirpi-fp6_1.0.0.9.x
amd / ryzen_5_4680u_firmware renoirpi-fp6_1.0.0.9 renoirpi-fp6_1.0.0.9.x
amd / ryzen_3_4300u_firmware renoirpi-fp6_1.0.0.9 renoirpi-fp6_1.0.0.9.x
amd / ryzen_9_5900hs_firmware cezannepi-fp6_1.0.0.b cezannepi-fp6_1.0.0.b.x
amd / ryzen_9_5900hx_firmware cezannepi-fp6_1.0.0.b cezannepi-fp6_1.0.0.b.x
amd / ryzen_9_5980hx_firmware cezannepi-fp6_1.0.0.b cezannepi-fp6_1.0.0.b.x
amd / ryzen_9_5980hs_firmware cezannepi-fp6_1.0.0.b cezannepi-fp6_1.0.0.b.x
amd / ryzen_7_5800h_firmware cezannepi-fp6_1.0.0.b cezannepi-fp6_1.0.0.b.x
amd / ryzen_7_5800hs_firmware cezannepi-fp6_1.0.0.b cezannepi-fp6_1.0.0.b.x
amd / ryzen_7_5825u_firmware cezannepi-fp6_1.0.0.b cezannepi-fp6_1.0.0.b.x
amd / ryzen_7_5800u_firmware cezannepi-fp6_1.0.0.b cezannepi-fp6_1.0.0.b.x
amd / ryzen_5_5600h_firmware cezannepi-fp6_1.0.0.b cezannepi-fp6_1.0.0.b.x
amd / ryzen_5_5600hs_firmware cezannepi-fp6_1.0.0.b cezannepi-fp6_1.0.0.b.x
amd / ryzen_5_5625u_firmware cezannepi-fp6_1.0.0.b cezannepi-fp6_1.0.0.b.x
amd / ryzen_5_5600u_firmware cezannepi-fp6_1.0.0.b cezannepi-fp6_1.0.0.b.x
amd / ryzen_5_5560u_firmware cezannepi-fp6_1.0.0.b cezannepi-fp6_1.0.0.b.x
amd / ryzen_5_5500h_firmware cezannepi-fp6_1.0.0.b cezannepi-fp6_1.0.0.b.x
amd / ryzen_3_5425u_firmware cezannepi-fp6_1.0.0.b cezannepi-fp6_1.0.0.b.x
amd / ryzen_3_5400u_firmware cezannepi-fp6_1.0.0.b cezannepi-fp6_1.0.0.b.x
amd / ryzen_3_5125c_firmware cezannepi-fp6_1.0.0.b cezannepi-fp6_1.0.0.b.x
amd / ryzen_9_6900hs_firmware rembrandtpi-fp7_1.0.0.2 rembrandtpi-fp7_1.0.0.2.x
amd / ryzen_9_6900hx_firmware rembrandtpi-fp7_1.0.0.2 rembrandtpi-fp7_1.0.0.2.x
amd / ryzen_9_6980hx_firmware rembrandtpi-fp7_1.0.0.2 rembrandtpi-fp7_1.0.0.2.x
amd / ryzen_9_6980hs_firmware rembrandtpi-fp7_1.0.0.2 rembrandtpi-fp7_1.0.0.2.x
amd / ryzen_7_6800h_firmware rembrandtpi-fp7_1.0.0.2 rembrandtpi-fp7_1.0.0.2.x
amd / ryzen_7_6800hs_firmware rembrandtpi-fp7_1.0.0.2 rembrandtpi-fp7_1.0.0.2.x
amd / ryzen_7_6800u_firmware rembrandtpi-fp7_1.0.0.2 rembrandtpi-fp7_1.0.0.2.x
amd / ryzen_5_6600h_firmware rembrandtpi-fp7_1.0.0.2 rembrandtpi-fp7_1.0.0.2.x
amd / ryzen_5_6600hs_firmware rembrandtpi-fp7_1.0.0.2 rembrandtpi-fp7_1.0.0.2.x
amd / ryzen_5_6600u_firmware rembrandtpi-fp7_1.0.0.2 rembrandtpi-fp7_1.0.0.2.x
amd / ryzen_3_7335u_firmware rembrandtpi-fp7_1.0.0.2 rembrandtpi-fp7_1.0.0.2.x
amd / ryzen_5_7535u_firmware rembrandtpi-fp7_1.0.0.2 rembrandtpi-fp7_1.0.0.2.x
amd / ryzen_5_7535hs_firmware rembrandtpi-fp7_1.0.0.2 rembrandtpi-fp7_1.0.0.2.x
amd / ryzen_7_7735u_firmware rembrandtpi-fp7_1.0.0.2 rembrandtpi-fp7_1.0.0.2.x
amd / ryzen_7_7736u_firmware rembrandtpi-fp7_1.0.0.2 rembrandtpi-fp7_1.0.0.2.x
amd / ryzen_7_7735hs_firmware rembrandtpi-fp7_1.0.0.2 rembrandtpi-fp7_1.0.0.2.x

Frequently Asked Questions

A security vulnerability is a weakness in software, hardware, or configuration that can be exploited to compromise confidentiality, integrity, or availability. Many vulnerabilities are tracked as CVEs (Common Vulnerabilities and Exposures), which provide a standardized identifier so teams can coordinate patching, mitigation, and risk assessment across tools and vendors.

CVSS (Common Vulnerability Scoring System) estimates technical severity, but it doesn't automatically equal business risk. Prioritize using context like internet exposure, affected asset criticality, known exploitation (proof-of-concept or in-the-wild), and whether compensating controls exist. A "Medium" CVSS on an exposed, production system can be more urgent than a "Critical" on an isolated, non-production host.

A vulnerability is the underlying weakness. An exploit is the method or code used to take advantage of it. A zero-day is a vulnerability that is unknown to the vendor or has no publicly available fix when attackers begin using it. In practice, risk increases sharply when exploitation becomes reliable or widespread.

Recurring findings usually come from incomplete Asset Discovery, inconsistent patch management, inherited images, and configuration drift. In modern environments, you also need to watch the software supply chain: dependencies, containers, build pipelines, and third-party services can reintroduce the same weakness even after you patch a single host. Unknown or unmanaged assets (often called Shadow IT) are a common reason the same issues resurface.

Use a simple, repeatable triage model: focus first on externally exposed assets, high-value systems (identity, VPN, email, production), vulnerabilities with known exploits, and issues that enable remote code execution or privilege escalation. Then enforce patch SLAs and track progress using consistent metrics so remediation is steady, not reactive.

SynScan combines attack surface monitoring and continuous security auditing to keep your inventory current, flag high-impact vulnerabilities early, and help you turn raw findings into a practical remediation plan.