Page 3 of 36 results (0.002 seconds)

CVSS: 8.2EPSS: 0%CPEs: 6EXPL: 1

An issue was discovered in Insyde InsydeH2O with kernel 5.0 through 5.5. An SMM callout vulnerability in the SMM driver in UsbLegacyControlSmm leads to possible arbitrary code execution in SMM and escalation of privileges. An attacker could overwrite the function pointers in the EFI_BOOT_SERVICES table before the USB SMI handler triggers. (This is not exploitable from code running in the operating system.) Se ha detectado un problema en InsydeH2O con el kernel versiones 5.0 hasta 5.5. • https://binarly.io/advisories/BRLY-2022-022/index.html https://www.insyde.com/security-pledge https://www.insyde.com/security-pledge/SA-2022031 •

CVSS: 8.2EPSS: 0%CPEs: 6EXPL: 1

An issue was discovered in Insyde InsydeH2O with kernel 5.0 through 5.5. The FwBlockSericceSmm driver does not properly validate input parameters for a software SMI routine, leading to memory corruption of arbitrary addresses including SMRAM, and possible arbitrary code execution. Se ha detectado un problema en InsydeH2O con el kernel versiones 5.0 hasta 5.5. El controlador FwBlockSericceSmm no comprueba correctamente los parámetros de entrada para una rutina SMI de software, conllevando a una corrupción de la memoria de direcciones arbitrarias, incluida la SMRAM, y una posible ejecución de código arbitrario • https://binarly.io/advisories/BRLY-2022-024/index.html https://www.insyde.com/security-pledge https://www.insyde.com/security-pledge/SA-2022033 • CWE-787: Out-of-bounds Write •

CVSS: 8.2EPSS: 0%CPEs: 5EXPL: 0

An issue was discovered in NvmExpressDxe in Insyde InsydeH2O with kernel 5.1 through 5.5. An SMM memory corruption vulnerability allows an attacker to write fixed or predictable data to SMRAM. Exploiting this issue could lead to escalating privileges to SMM. Se ha detectado un problema en NvmExpressDxe en InsydeH2O con kernel versiones 5.1 hasta 5.5. Una vulnerabilidad de corrupción de memoria SMM permite a un atacante escribir datos fijos o predecibles en la SMRAM. • https://cert-portal.siemens.com/productcert/pdf/ssa-306654.pdf https://security.netapp.com/advisory/ntap-20220216-0009 https://www.insyde.com/security-pledge https://www.insyde.com/security-pledge/SA-2022015 • CWE-787: Out-of-bounds Write •

CVSS: 7.5EPSS: 0%CPEs: 38EXPL: 0

An issue was discovered in Kernel 5.x in Insyde InsydeH2O, affecting HddPassword. Software SMI services that use the Communicate() function of the EFI_SMM_COMMUNICATION_PROTOCOL do not check whether the address of the buffer is valid, which allows use of SMRAM, MMIO, or OS kernel addresses. Se ha descubierto un problema en el Kernel versión 5.x de InsydeH2O, que afecta a HddPassword. Los servicios SMI de software que utilizan la función Communicate() del EFI_SMM_COMMUNICATION_PROTOCOL no comprueban si la dirección del búfer es válida, lo que permite el uso de direcciones de SMRAM, MMIO o del núcleo del SO • https://cert-portal.siemens.com/productcert/pdf/ssa-306654.pdf https://security.netapp.com/advisory/ntap-20220222-0004 https://www.insyde.com/security-pledge https://www.insyde.com/security-pledge/SA-2022014 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 8.2EPSS: 0%CPEs: 6EXPL: 0

An issue was discovered in UsbCoreDxe in Insyde InsydeH2O with kernel 5.5 before 05.51.45, 5.4 before 05.43.45, 5.3 before 05.35.45, 5.2 before 05.26.45, 5.1 before 05.16.45, and 5.0 before 05.08.45. An SMM callout vulnerability allows an attacker to hijack execution flow of code running in System Management Mode. Exploiting this issue could lead to escalating privileges to SMM. Se ha detectado un problema en UsbCoreDxe en InsydeH2O con el kernel versiones 5.5 anteriores a 05.51.45, versiones 5.4 anteriores a 05.43.45, versiones 5.3 anteriores a 05.35.45, versiones 5.2 anteriores a 05.26.45, versiones 5.1 anteriores a 05.16.45 y versiones 5.0 anteriores a 05.08.45. Una vulnerabilidad en la llamada SMM permite a un atacante secuestrar el flujo de ejecución del código que es ejecutado en el modo de administración del sistema. • https://cert-portal.siemens.com/productcert/pdf/ssa-306654.pdf https://security.netapp.com/advisory/ntap-20220217-0013 https://www.insyde.com/security-pledge •