CVE-2022-40250
Stack overflow vulnerability in SMI handler on SmmSmbiosElog.
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
1Exploited in Wild
-Decision
Descriptions
An attacker can exploit this vulnerability to elevate privileges from ring 0 to ring -2, execute arbitrary code in System Management Mode - an environment more privileged than operating system (OS) and completely isolated from it. Running arbitrary code in SMM additionally bypasses SMM-based SPI flash protections against modifications, which can help an attacker to install a firmware backdoor/implant into BIOS. Such a malicious firmware code in BIOS could persist across operating system re-installs. Additionally, this vulnerability potentially could be used by malicious actors to bypass security mechanisms provided by UEFI firmware (for example, Secure Boot and some types of memory isolation for hypervisors). This issue affects: Module name: SmmSmbiosElog SHA256: 3a8acb4f9bddccb19ec3b22b22ad97963711550f76b27b606461cd5073a93b59 Module GUID: 8e61fd6b-7a8b-404f-b83f-aa90a47cabdf This issue affects: AMI Aptio 5.x. This issue affects: AMI Aptio 5.x.
Un atacante puede explotar esta vulnerabilidad para elevar privilegios del anillo 0 al anillo -2, ejecutar código arbitrario en el Modo de Administración del Sistema - un entorno más privilegiado que el sistema operativo (SO) y completamente aislado de él. Una ejecución de código arbitrario en el SMM también evita las protecciones de la flash SPI basadas en el SMM contra las modificaciones, lo que puede ayudar a un atacante a instalar una puerta trasera/implante de firmware en la BIOS. Dicho código de firmware malicioso en la BIOS podría persistir a través de las reinstalaciones del sistema operativo. Además, esta vulnerabilidad podría ser usada por actores maliciosos para omitir los mecanismos de seguridad proporcionados por el firmware UEFI (por ejemplo, Secure Boot y algunos tipos de aislamiento de memoria para hipervisores). Este problema afecta: Nombre del módulo: SmmSmbiosElog SHA256: 3a8acb4f9bddccb19ec3b22b22ad97963711550f76b27b606461cd5073a93b59 GUID del módulo: 8e61fd6b-7a8b-404f-b83f-aa90a47cabdf Este problema afecta a: AMI Aptio 5.x. Este problema afecta: AMI Aptio versión 5.x
CVSS Scores
SSVC
- Decision:-
Timeline
- 2022-09-08 CVE Reserved
- 2022-09-20 CVE Published
- 2024-04-01 EPSS Updated
- 2024-09-16 CVE Updated
- 2024-09-16 First Exploit
- ---------- Exploited in Wild
- ---------- KEV Due Date
CWE
- CWE-121: Stack-based Buffer Overflow
- CWE-787: Out-of-bounds Write
CAPEC
References (3)
URL | Tag | Source |
---|---|---|
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00712.html | Not Applicable |
URL | Date | SRC |
---|---|---|
https://www.binarly.io/advisories/BRLY-2022-016 | 2024-09-16 |
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
https://www.ami.com/security-center | 2022-09-24 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Intel Search vendor "Intel" | Nuc M15 Laptop Kit Lapbc510 Firmware Search vendor "Intel" for product "Nuc M15 Laptop Kit Lapbc510 Firmware" | bc0074 Search vendor "Intel" for product "Nuc M15 Laptop Kit Lapbc510 Firmware" and version "bc0074" | - |
Affected
| in | Intel Search vendor "Intel" | Nuc M15 Laptop Kit Lapbc510 Search vendor "Intel" for product "Nuc M15 Laptop Kit Lapbc510" | - | - |
Safe
|
Intel Search vendor "Intel" | Nuc M15 Laptop Kit Lapbc710 Firmware Search vendor "Intel" for product "Nuc M15 Laptop Kit Lapbc710 Firmware" | bc0074 Search vendor "Intel" for product "Nuc M15 Laptop Kit Lapbc710 Firmware" and version "bc0074" | - |
Affected
| in | Intel Search vendor "Intel" | Nuc M15 Laptop Kit Lapbc710 Search vendor "Intel" for product "Nuc M15 Laptop Kit Lapbc710" | - | - |
Safe
|
Ami Search vendor "Ami" | Aptio V Search vendor "Ami" for product "Aptio V" | 5.0 Search vendor "Ami" for product "Aptio V" and version "5.0" | - |
Affected
|