Vulnerability Name: | CVE-2022-35894 (CCN-236934) | ||||||||||||
Assigned: | 2022-09-21 | ||||||||||||
Published: | 2022-09-21 | ||||||||||||
Updated: | 2022-09-26 | ||||||||||||
Summary: | An issue was discovered in Insyde InsydeH2O with kernel 5.0 through 5.5. The SMI handler for the FwBlockServiceSmm driver uses an untrusted pointer as the location to copy data to an attacker-specified buffer, leading to information disclosure. | ||||||||||||
CVSS v3 Severity: | 6.0 Medium (CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N) 5.2 Medium (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N/E:U/RL:O/RC:C)
5.2 Medium (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N/E:U/RL:O/RC:C)
| ||||||||||||
CVSS v2 Severity: | 4.6 Medium (CCN CVSS v2 Vector: AV:L/AC:L/Au:S/C:C/I:N/A:N)
| ||||||||||||
Vulnerability Type: | CWE-401 | ||||||||||||
Vulnerability Consequences: | Obtain Information | ||||||||||||
References: | Source: MITRE Type: CNA CVE-2022-35894 Source: MISC Type: Exploit, Third Party Advisory https://binarly.io/advisories/BRLY-2022-018/index.html Source: XF Type: UNKNOWN insyde-cve202235894-info-disc(236934) Source: MISC Type: Vendor Advisory https://www.insyde.com/security-pledge Source: CCN Type: Insyde Security Advisory 2022030 SMM memory leak vulnerability in SMM driver (SMRAM read) in InsydeH2O Source: MISC Type: Vendor Advisory https://www.insyde.com/security-pledge/SA-2022030 | ||||||||||||
Vulnerable Configuration: | Configuration 1: Configuration 2: Configuration 3: Configuration 4: Configuration 5: Configuration 6: Configuration CCN 1: ![]() | ||||||||||||
BACK |