Improper validation in a model specific register (MSR) could allow a malicious program with ring0 access to modify SMM configuration while SMI lock is enabled, potentially leading to arbitrary code execution.
https://www.theregister.com/2024/08/13/amd_sinkclose_patches/
https://www.amd.com/en/resources/product-security/bulletin/amd-sb-7014.html