Vulnerability Name: | CVE-2022-35408 (CCN-236918) | ||||||||||||
Assigned: | 2022-09-21 | ||||||||||||
Published: | 2022-09-21 | ||||||||||||
Updated: | 2022-09-23 | ||||||||||||
Summary: | An issue was discovered in Insyde InsydeH2O with kernel 5.0 through 5.5. An SMM callout vulnerability in the SMM driver in UsbLegacyControlSmm leads to possible arbitrary code execution in SMM and escalation of privileges. An attacker could overwrite the function pointers in the EFI_BOOT_SERVICES table before the USB SMI handler triggers. (This is not exploitable from code running in the operating system.) | ||||||||||||
CVSS v3 Severity: | 8.2 High (CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H) 7.1 High (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C)
6.5 Medium (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C)
| ||||||||||||
CVSS v2 Severity: | 6.0 Medium (CCN CVSS v2 Vector: AV:L/AC:H/Au:S/C:C/I:C/A:C)
| ||||||||||||
Vulnerability Type: | CWE-noinfo | ||||||||||||
Vulnerability Consequences: | Gain Access | ||||||||||||
References: | Source: MITRE Type: CNA CVE-2022-35408 Source: MISC Type: Exploit, Third Party Advisory https://binarly.io/advisories/BRLY-2022-022/index.html Source: XF Type: UNKNOWN insyde-cve202235408-code-exec(236918) Source: MISC Type: Vendor Advisory https://www.insyde.com/security-pledge Source: CCN Type: Insyde Security Advisory 2022031 SMM callout vulnerability in SMM driver (SMM arbitrary code execution) in InsydeH2O Source: MISC Type: Vendor Advisory https://www.insyde.com/security-pledge/SA-2022031 | ||||||||||||
Vulnerable Configuration: | Configuration 1: Configuration 2: Configuration 3: Configuration 4: Configuration 5: Configuration 6: Configuration CCN 1: ![]() | ||||||||||||
BACK |