
CVE-2022-32954
https://notcve.org/view.php?id=CVE-2022-32954
15 Feb 2023 — An issue was discovered in Insyde InsydeH2O with kernel 5.1 through 5.5. DMA attacks on the SdMmcDevice buffer used by SMM and non-SMM code could cause TOCTOU race-condition issues that could lead to corruption of SMRAM and escalation of privileges. This attack can be mitigated by using IOMMU protection for the ACPI runtime memory used for the command buffer. This attack can be mitigated by copying the link data to SMRAM before checking it and verifying that all pointers are within the buffer. • https://www.insyde.com/security-pledge • CWE-367: Time-of-check Time-of-use (TOCTOU) Race Condition •

CVE-2022-32476
https://notcve.org/view.php?id=CVE-2022-32476
15 Feb 2023 — An issue was discovered in Insyde InsydeH2O with kernel 5.0 through 5.5. DMA attacks on the AhciBusDxe shared buffer used by SMM and non-SMM code could cause TOCTOU race-condition issues that could lead to corruption of SMRAM and escalation of privileges. This attack can be mitigated using IOMMU protection for the ACPI runtime memory used for the command buffer. This attack can be mitigated by copying the firmware block services data to SMRAM before checking it. • https://www.insyde.com/security-pledge • CWE-367: Time-of-check Time-of-use (TOCTOU) Race Condition •

CVE-2022-32955
https://notcve.org/view.php?id=CVE-2022-32955
15 Feb 2023 — An issue was discovered in Insyde InsydeH2O with kernel 5.0 through 5.5. DMA attacks on the NvmExpressDxe buffer used by SMM and non-SMM code could cause TOCTOU race-condition issues that could lead to corruption of SMRAM and escalation of privileges. This attack can be mitigated by using IOMMU protection for the ACPI runtime memory used for the command buffer. This attack can be mitigated by copying the link data to SMRAM before checking it and verifying that all pointers are within the buffer. • https://www.insyde.com/security-pledge • CWE-367: Time-of-check Time-of-use (TOCTOU) Race Condition •

CVE-2022-32475
https://notcve.org/view.php?id=CVE-2022-32475
15 Feb 2023 — An issue was discovered in Insyde InsydeH2O with kernel 5.0 through 5.5. DMA attacks on the VariableRuntimeDxe shared buffer used by SMM and non-SMM code could cause TOCTOU race-condition issues that could lead to corruption of SMRAM and escalation of privileges. This issue was fixed in the kernel, which also protected chipset and OEM chipset code. • https://www.insyde.com/security-pledge • CWE-367: Time-of-check Time-of-use (TOCTOU) Race Condition •

CVE-2022-32478
https://notcve.org/view.php?id=CVE-2022-32478
15 Feb 2023 — An issue was discovered in Insyde InsydeH2O with kernel 5.0 through 5.5. DMA attacks on the IdeBusDxe shared buffer used by SMM and non-SMM code could cause TOCTOU race-condition issues that could lead to corruption of SMRAM and escalation of privileges. This attack can be mitigated using IOMMU protection for the ACPI runtime memory used for the command buffer. This attack can be mitigated by copying the firmware block services data to SMRAM before checking it. • https://www.insyde.com/security-pledge • CWE-367: Time-of-check Time-of-use (TOCTOU) Race Condition •

CVE-2022-32473
https://notcve.org/view.php?id=CVE-2022-32473
15 Feb 2023 — An issue was discovered in Insyde InsydeH2O with kernel 5.0 through 5.5. DMA attacks on the HddPassword shared buffer used by SMM and non-SMM code could cause TOCTOU race-condition issues that could lead to corruption of SMRAM and escalation of privileges. This attack can be mitigated using IOMMU protection for the ACPI runtime memory used for the command buffer. This attack can be mitigated by copying the firmware block services data to SMRAM before checking it. • https://www.insyde.com/security-pledge • CWE-367: Time-of-check Time-of-use (TOCTOU) Race Condition •

CVE-2022-32477
https://notcve.org/view.php?id=CVE-2022-32477
15 Feb 2023 — An issue was discovered in Insyde InsydeH2O with kernel 5.0 through 5.5. DMA attacks on the FvbServicesRuntimeDxe shared buffer used by SMM and non-SMM code could cause TOCTOU race-condition issues that could lead to corruption of SMRAM and escalation of privileges. This attack can be mitigated using IOMMU protection for the ACPI runtime memory used for the command buffer. This attack can be mitigated by copying the firmware block services data to SMRAM before checking it. • https://www.insyde.com/security-pledge • CWE-367: Time-of-check Time-of-use (TOCTOU) Race Condition •

CVE-2022-32474
https://notcve.org/view.php?id=CVE-2022-32474
15 Feb 2023 — An issue was discovered in Insyde InsydeH2O with kernel 5.0 through 5.5. DMA attacks on the StorageSecurityCommandDxe shared buffer used by SMM and non-SMM code could cause TOCTOU race-condition issues that could lead to corruption of SMRAM and escalation of privileges. This attack can be mitigated using IOMMU protection for the ACPI runtime memory used for the command buffer. This attack can be mitigated by copying the firmware block services data to SMRAM before checking it. • https://www.insyde.com/security-pledge • CWE-367: Time-of-check Time-of-use (TOCTOU) Race Condition •

CVE-2022-35893
https://notcve.org/view.php?id=CVE-2022-35893
23 Sep 2022 — An issue was discovered in Insyde InsydeH2O with kernel 5.0 through 5.5. An SMM memory corruption vulnerability in the FvbServicesRuntimeDxe driver allows an attacker to write fixed or predictable data to SMRAM. Exploiting this issue could lead to escalating privileges to SMM. Se ha detectado un problema en Insyde InsydeH2O con el kernel versiones 5.0 hasta 5.5. Una vulnerabilidad de corrupción de memoria SMM en el controlador FvbServicesRuntimeDxe permite a un atacante escribir datos fijos o predecibles en... • https://binarly.io/advisories/BRLY-2022-026/index.html • CWE-20: Improper Input Validation •

CVE-2022-36338
https://notcve.org/view.php?id=CVE-2022-36338
23 Sep 2022 — An issue was discovered in Insyde InsydeH2O with kernel 5.0 through 5.5. An SMM callout vulnerability in the SMM driver FwBlockServiceSmm, creating SMM, leads to arbitrary code execution. An attacker can replace the pointer to the UEFI boot service GetVariable with a pointer to malware, and then generate a software SMI. Se ha detectado un problema en InsydeH2O con el kernel 5.0 hasta 5.5. Una vulnerabilidad de llamada SMM en el controlador SMM FwBlockServiceSmm, que crea SMM, conlleva a una ejecución de cód... • https://binarly.io/advisories/BRLY-2022-017/index.html •