CVE-2022-30772
 
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
Manipulation of the input address in PnpSmm function 0x52 could be used by malware to overwrite SMRAM or OS kernel memory. Function 0x52 of the PnpSmm driver is passed the address and size of data to write into the SMBIOS table, but manipulation of the address could be used by malware to overwrite SMRAM or OS kernel memory. This issue was discovered by Insyde engineering during a security review. This issue is fixed in: Kernel 5.0: 05.09.41 Kernel 5.1: 05.17.43 Kernel 5.2: 05.27.30 Kernel 5.3: 05.36.30 Kernel 5.4: 05.44.30 Kernel 5.5: 05.52.30 https://www.insyde.com/security-pledge/SA-2022065
La manipulación de la dirección de entrada en la función PnpSmm 0x52 podría ser utilizada por malware para sobrescribir SMRAM o la memoria del kernel del Sistema Operativo. A la función 0x52 del controlador PnpSmm se le pasa la dirección y el tamaño de los datos para escribir en la tabla SMBIOS, pero el malware podría utilizar la manipulación de la dirección para sobrescribir SMRAM o la memoria del kernel del Sistema Operativo. Este problema fue descubierto por la ingeniería de Insyde durante una revisión de seguridad. Este problema se solucionó en: Kernel 5.0: 05.09.41 Kernel 5.1: 05.17.43 Kernel 5.2: 05.27.30 Kernel 5.3: 05.36.30 Kernel 5.4: 05.44.30 Kernel 5.5: 05.52.30
https://www.insyde.com/security-pledge/SA-2022065
CVSS Scores
SSVC
- Decision:-
Timeline
- 2022-05-16 CVE Reserved
- 2022-11-15 CVE Published
- 2024-06-07 EPSS Updated
- 2024-08-03 CVE Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-787: Out-of-bounds Write
CAPEC
References (2)
URL | Tag | Source |
---|
URL | Date | SRC |
---|
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
https://www.insyde.com/security-pledge | 2022-11-23 | |
https://www.insyde.com/security-pledge/SA-2022065 | 2022-11-23 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Insyde Search vendor "Insyde" | Kernel Search vendor "Insyde" for product "Kernel" | >= 5.0 < 5.0.05.09.41 Search vendor "Insyde" for product "Kernel" and version " >= 5.0 < 5.0.05.09.41" | - |
Affected
| ||||||
Insyde Search vendor "Insyde" | Kernel Search vendor "Insyde" for product "Kernel" | >= 5.1 < 5.1.05.17.43 Search vendor "Insyde" for product "Kernel" and version " >= 5.1 < 5.1.05.17.43" | - |
Affected
| ||||||
Insyde Search vendor "Insyde" | Kernel Search vendor "Insyde" for product "Kernel" | >= 5.2 < 5.2.05.27.30 Search vendor "Insyde" for product "Kernel" and version " >= 5.2 < 5.2.05.27.30" | - |
Affected
| ||||||
Insyde Search vendor "Insyde" | Kernel Search vendor "Insyde" for product "Kernel" | >= 5.3 < 5.3.05.36.30 Search vendor "Insyde" for product "Kernel" and version " >= 5.3 < 5.3.05.36.30" | - |
Affected
| ||||||
Insyde Search vendor "Insyde" | Kernel Search vendor "Insyde" for product "Kernel" | >= 5.4 < 5.4.05.44.30 Search vendor "Insyde" for product "Kernel" and version " >= 5.4 < 5.4.05.44.30" | - |
Affected
| ||||||
Insyde Search vendor "Insyde" | Kernel Search vendor "Insyde" for product "Kernel" | >= 5.5 < 5.5.05.52.30 Search vendor "Insyde" for product "Kernel" and version " >= 5.5 < 5.5.05.52.30" | - |
Affected
|