Improper input and range checking in the AMD Secure Processor (ASP) boot loader image header may allow an attacker to use attacker-controlled values prior to signature validation potentially resulting in arbitrary code execution.
https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1027