// For flags

CVE-2022-33907

 

Severity Score

6.4
*CVSS v3.1

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

DMA transactions which are targeted at input buffers used for the software SMI handler used by the IdeBusDxe driver could cause SMRAM corruption through a TOCTOU attack... DMA transactions which are targeted at input buffers used for the software SMI handler used by the IdeBusDxe driver could cause SMRAM corruption through a TOCTOU attack. This issue was discovered by Insyde engineering based on the general description provided by Intel's iSTARE group. Fixed in kernel 5.2: 05.27.25, kernel 5.3: 05.36.25, kernel 5.4: 05.44.25 https://www.insyde.com/security-pledge/SA-2022049

Las transacciones DMA que están dirigidas a los búferes de entrada utilizados para el controlador SMI de software utilizado por el controlador IdeBusDxe podrían causar corrupción de SMRAM a través de un ataque TOCTOU... Las transacciones DMA que están dirigidas a los búferes de entrada utilizados para el controlador SMI de software utilizado por el controlador IdeBusDxe podrían causar corrupción SMRAM a través de un ataque TOCTOU. Este problema fue descubierto por ingeniería de Insyde basándose en la descripción general proporcionada por el grupo iSTARE de Intel. Corregido en kernel 5.2: 05.27.25, kernel 5.3: 05.36.25, kernel 5.4: 05.44.25 https://www.insyde.com/security-pledge/SA-2022049

*Credits: N/A
CVSS Scores
Attack Vector
Local
Attack Complexity
High
Privileges Required
High
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2022-06-17 CVE Reserved
  • 2022-11-14 CVE Published
  • 2024-06-06 EPSS Updated
  • 2024-08-03 CVE Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
  • CWE-367: Time-of-check Time-of-use (TOCTOU) Race Condition
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Insyde
Search vendor "Insyde"
Kernel
Search vendor "Insyde" for product "Kernel"
>= 5.2 < 5.2.05.27.25
Search vendor "Insyde" for product "Kernel" and version " >= 5.2 < 5.2.05.27.25"
-
Affected
Insyde
Search vendor "Insyde"
Kernel
Search vendor "Insyde" for product "Kernel"
>= 5.3 < 5.3.05.36.25
Search vendor "Insyde" for product "Kernel" and version " >= 5.3 < 5.3.05.36.25"
-
Affected
Insyde
Search vendor "Insyde"
Kernel
Search vendor "Insyde" for product "Kernel"
>= 5.4 < 5.4.05.44.25
Search vendor "Insyde" for product "Kernel" and version " >= 5.4 < 5.4.05.44.25"
-
Affected