Improper input validation in the SMM handler could allow an attacker with Ring0 access to write to SMRAM and modify execution flow for S3 (sleep) wake up, potentially resulting in arbitrary code execution.CreditsReported through AMD Bug Bounty ProgramReferenceshttps://www.amd.com/en/resources/product-security/bulletin/AMD-SB-4013.htmlhttps://www.amd.com/en/resources/product-security/bulletin/AMD-SB-3023.htmlhttps://www.amd.com/en/resources/product-security/bulletin/Emb-Auto.html