### [CVE-2021-26331](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-26331) ![](https://img.shields.io/static/v1?label=Product&message=1st%20Gen%20AMD%20EPYC%E2%84%A2&color=blue) ![](https://img.shields.io/static/v1?label=Product&message=2nd%20Gen%20AMD%20EPYC%E2%84%A2&color=blue) ![](https://img.shields.io/static/v1?label=Product&message=3rd%20Gen%20AMD%20EPYC%E2%84%A2&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=unspecified%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-20%20Improper%20Input%20Validation&color=brightgreen) ### Description AMD System Management Unit (SMU) contains a potential issue where a malicious user may be able to manipulate mailbox entries leading to arbitrary code execution. ### POC #### Reference - https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1021 #### Github No PoCs found on GitHub currently.