CVE-2022-29275
 
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
In UsbCoreDxe, untrusted input may allow SMRAM or OS memory tampering Use of untrusted pointers could allow OS or SMRAM memory tampering leading to escalation of privileges. This issue was discovered by Insyde during security review. It was fixed in: Kernel 5.0: version 05.09.21 Kernel 5.1: version 05.17.21 Kernel 5.2: version 05.27.21 Kernel 5.3: version 05.36.21 Kernel 5.4: version 05.44.21 Kernel 5.5: version 05.52.21 https://www.insyde.com/security-pledge/SA-2022058
En UsbCoreDxe, la entrada que no es de confianza puede permitir la manipulación de la memoria SMRAM o del Sistema Operativo. El uso de punteros que no son de confianza podría permitir la manipulación de la memoria SMRAM o del Sistema Operativo, lo que lleva a una escalada de privilegios. Insyde descubrió este problema durante la revisión de seguridad. Se solucionó en: Kernel 5.0: versión 05.09.21 Kernel 5.1: versión 05.17.21 Kernel 5.2: versión 05.27.21 Kernel 5.3: versión 05.36.21 Kernel 5.4: versión 05.44.21 Kernel 5.5: versión 05.52.21https:/ /www.insyde.com/security-pledge/SA-2022058
CVSS Scores
SSVC
- Decision:-
Timeline
- 2022-04-15 CVE Reserved
- 2022-11-15 CVE Published
- 2024-06-07 EPSS Updated
- 2024-08-03 CVE Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer
CAPEC
References (2)
URL | Tag | Source |
---|
URL | Date | SRC |
---|
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
https://www.insyde.com/security-pledge | 2022-11-23 | |
https://www.insyde.com/security-pledge/SA-2022058 | 2022-11-23 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Insyde Search vendor "Insyde" | Kernel Search vendor "Insyde" for product "Kernel" | >= 5.0 <= 5.0.05.09.21 Search vendor "Insyde" for product "Kernel" and version " >= 5.0 <= 5.0.05.09.21" | - |
Affected
| ||||||
Insyde Search vendor "Insyde" | Kernel Search vendor "Insyde" for product "Kernel" | >= 5.1 < 5.1.05.17.21 Search vendor "Insyde" for product "Kernel" and version " >= 5.1 < 5.1.05.17.21" | - |
Affected
| ||||||
Insyde Search vendor "Insyde" | Kernel Search vendor "Insyde" for product "Kernel" | >= 5.2 < 5.2.05.27.21 Search vendor "Insyde" for product "Kernel" and version " >= 5.2 < 5.2.05.27.21" | - |
Affected
| ||||||
Insyde Search vendor "Insyde" | Kernel Search vendor "Insyde" for product "Kernel" | >= 5.3 < 5.3.05.36.21 Search vendor "Insyde" for product "Kernel" and version " >= 5.3 < 5.3.05.36.21" | - |
Affected
| ||||||
Insyde Search vendor "Insyde" | Kernel Search vendor "Insyde" for product "Kernel" | >= 5.4 < 5.4.05.44.21 Search vendor "Insyde" for product "Kernel" and version " >= 5.4 < 5.4.05.44.21" | - |
Affected
| ||||||
Insyde Search vendor "Insyde" | Kernel Search vendor "Insyde" for product "Kernel" | >= 5.5 < 5.5.05.52.21 Search vendor "Insyde" for product "Kernel" and version " >= 5.5 < 5.5.05.52.21" | - |
Affected
|