// For flags

CVE-2022-30772

 

Severity Score

8.2
*CVSS v3.1

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

Manipulation of the input address in PnpSmm function 0x52 could be used by malware to overwrite SMRAM or OS kernel memory. Function 0x52 of the PnpSmm driver is passed the address and size of data to write into the SMBIOS table, but manipulation of the address could be used by malware to overwrite SMRAM or OS kernel memory. This issue was discovered by Insyde engineering during a security review. This issue is fixed in: Kernel 5.0: 05.09.41 Kernel 5.1: 05.17.43 Kernel 5.2: 05.27.30 Kernel 5.3: 05.36.30 Kernel 5.4: 05.44.30 Kernel 5.5: 05.52.30 https://www.insyde.com/security-pledge/SA-2022065

La manipulación de la dirección de entrada en la función PnpSmm 0x52 podría ser utilizada por malware para sobrescribir SMRAM o la memoria del kernel del Sistema Operativo. A la función 0x52 del controlador PnpSmm se le pasa la dirección y el tamaño de los datos para escribir en la tabla SMBIOS, pero el malware podría utilizar la manipulación de la dirección para sobrescribir SMRAM o la memoria del kernel del Sistema Operativo. Este problema fue descubierto por la ingeniería de Insyde durante una revisión de seguridad. Este problema se solucionó en: Kernel 5.0: 05.09.41 Kernel 5.1: 05.17.43 Kernel 5.2: 05.27.30 Kernel 5.3: 05.36.30 Kernel 5.4: 05.44.30 Kernel 5.5: 05.52.30
https://www.insyde.com/security-pledge/SA-2022065

*Credits: N/A
CVSS Scores
Attack Vector
Local
Attack Complexity
Low
Privileges Required
High
User Interaction
None
Scope
Changed
Confidentiality
High
Integrity
High
Availability
High
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2022-05-16 CVE Reserved
  • 2022-11-15 CVE Published
  • 2024-06-07 EPSS Updated
  • 2024-08-03 CVE Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
  • CWE-787: Out-of-bounds Write
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Insyde
Search vendor "Insyde"
Kernel
Search vendor "Insyde" for product "Kernel"
>= 5.0 < 5.0.05.09.41
Search vendor "Insyde" for product "Kernel" and version " >= 5.0 < 5.0.05.09.41"
-
Affected
Insyde
Search vendor "Insyde"
Kernel
Search vendor "Insyde" for product "Kernel"
>= 5.1 < 5.1.05.17.43
Search vendor "Insyde" for product "Kernel" and version " >= 5.1 < 5.1.05.17.43"
-
Affected
Insyde
Search vendor "Insyde"
Kernel
Search vendor "Insyde" for product "Kernel"
>= 5.2 < 5.2.05.27.30
Search vendor "Insyde" for product "Kernel" and version " >= 5.2 < 5.2.05.27.30"
-
Affected
Insyde
Search vendor "Insyde"
Kernel
Search vendor "Insyde" for product "Kernel"
>= 5.3 < 5.3.05.36.30
Search vendor "Insyde" for product "Kernel" and version " >= 5.3 < 5.3.05.36.30"
-
Affected
Insyde
Search vendor "Insyde"
Kernel
Search vendor "Insyde" for product "Kernel"
>= 5.4 < 5.4.05.44.30
Search vendor "Insyde" for product "Kernel" and version " >= 5.4 < 5.4.05.44.30"
-
Affected
Insyde
Search vendor "Insyde"
Kernel
Search vendor "Insyde" for product "Kernel"
>= 5.5 < 5.5.05.52.30
Search vendor "Insyde" for product "Kernel" and version " >= 5.5 < 5.5.05.52.30"
-
Affected