CVE-2022-32476
https://notcve.org/view.php?id=CVE-2022-32476
An issue was discovered in Insyde InsydeH2O with kernel 5.0 through 5.5. DMA attacks on the AhciBusDxe shared buffer used by SMM and non-SMM code could cause TOCTOU race-condition issues that could lead to corruption of SMRAM and escalation of privileges. This attack can be mitigated using IOMMU protection for the ACPI runtime memory used for the command buffer. This attack can be mitigated by copying the firmware block services data to SMRAM before checking it. • https://www.insyde.com/security-pledge https://www.insyde.com/security-pledge/SA-2023008 • CWE-367: Time-of-check Time-of-use (TOCTOU) Race Condition •
CVE-2022-32471
https://notcve.org/view.php?id=CVE-2022-32471
An issue was discovered in IhisiSmm in Insyde InsydeH2O with kernel 5.0 through 5.5. The IhisiDxe driver uses the command buffer to pass input and output data. By modifying the command buffer contents with DMA after the input parameters have been checked but before they are used, the IHISI SMM code may be convinced to modify SMRAM or OS, leading to possible data corruption or escalation of privileges. • https://www.insyde.com/security-pledge https://www.insyde.com/security-pledge/SA-2023003 • CWE-367: Time-of-check Time-of-use (TOCTOU) Race Condition •
CVE-2022-32470
https://notcve.org/view.php?id=CVE-2022-32470
An issue was discovered in Insyde InsydeH2O with kernel 5.0 through 5.5. DMA attacks on the FwBlockServiceSmm shared buffer used by SMM and non-SMM code could cause TOCTOU race-condition issues that could lead to corruption of SMRAM and escalation of privileges. This attack can be mitigated using IOMMU protection for the ACPI runtime memory used for the command buffer. This attack can be mitigated by copying the firmware block services data to SMRAM before checking it. • https://www.insyde.com/security-pledge https://www.insyde.com/security-pledge/SA-2023002 • CWE-367: Time-of-check Time-of-use (TOCTOU) Race Condition •
CVE-2022-34325
https://notcve.org/view.php?id=CVE-2022-34325
DMA transactions which are targeted at input buffers used for the StorageSecurityCommandDxe software SMI handler could cause SMRAM corruption through a TOCTOU attack. DMA transactions which are targeted at input buffers used for the software SMI handler used by the StorageSecurityCommandDxe driver could cause SMRAM corruption. This issue was discovered by Insyde engineering based on the general description provided by Las transacciones DMA que están dirigidas a los búferes de entrada utilizados para el controlador SMI del software StorageSecurityCommandDxe podrían causar corrupción de SMRAM a través de un ataque TOCTOU. Las transacciones DMA que están dirigidas a los búferes de entrada utilizados para el controlador SMI de software utilizado por el controlador StorageSecurityCommandDxe podrían provocar daños en SMRAM. Este problema fue descubierto por la ingeniería de Insyde basándose en la descripción general proporcionada por • https://www.insyde.com/security-pledge https://www.insyde.com/security-pledge/SA-2022057 • CWE-367: Time-of-check Time-of-use (TOCTOU) Race Condition •
CVE-2022-36448
https://notcve.org/view.php?id=CVE-2022-36448
An issue was discovered in Insyde InsydeH2O with kernel 5.0 through 5.5. There is an SMM memory corruption vulnerability in the Software SMI handler in the PnpSmm driver. Se ha detectado un problema en InsydeH2O con el kernel versiones 5.0 hasta 5.5. Se presenta una vulnerabilidad de corrupción de memoria SMM en el manejador SMI de software en el controlador PnpSmm • https://binarly.io/advisories/BRLY-2022-023/index.html https://www.insyde.com/security-pledge https://www.insyde.com/security-pledge/SA-2022032 • CWE-20: Improper Input Validation •