Lucene search

K
cveMitreCVE-2021-33626
HistoryOct 01, 2021 - 3:15 a.m.

CVE-2021-33626

2021-10-0103:15:06
CWE-829
mitre
web.nvd.nist.gov
63
cve-2021-33626
vulnerability
smm
system management mode
swsmi
buffer pointer
commbuffer
smram
arbitrary code execution
nvd

CVSS2

4.6

Attack Vector

LOCAL

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:L/AC:L/Au:N/C:P/I:P/A:P

CVSS3

7.8

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

AI Score

8

Confidence

High

EPSS

0.001

Percentile

20.4%

A vulnerability exists in SMM (System Management Mode) branch that registers a SWSMI handler that does not sufficiently check or validate the allocated buffer pointer(QWORD values for CommBuffer). This can be used by an attacker to corrupt data in SMRAM memory and even lead to arbitrary code execution.

Affected configurations

Nvd
Node
insydeinsydeh2oRange5.35.34.44
Node
insydeinsydeh2oRange5.25.25.44
Node
insydeinsydeh2oRange5.15.16.25
Node
insydeinsydeh2oRange5.45.42.44
Node
insydeinsydeh2oRange5.35.35.25
Node
insydeinsydeh2oRange5.25.26.25
Node
insydeinsydeh2oRange5.45.43.25
Node
siemensruggedcom_apr1808Match-
AND
siemensruggedcom_apr1808_firmwareMatch-
Node
siemenssimatic_field_pg_m5Match-
AND
siemenssimatic_field_pg_m5_firmwareMatch-
Node
siemenssimatic_field_pg_m6Match-
AND
siemenssimatic_field_pg_m6_firmwareMatch-
Node
siemenssimatic_ipc127eMatch-
AND
siemenssimatic_ipc127e_firmwareMatch-
Node
siemenssimatic_ipc227gMatch-
AND
siemenssimatic_ipc227g_firmwareMatch-
Node
siemenssimatic_ipc277gMatch-
AND
siemenssimatic_ipc277g_firmwareMatch-
Node
siemenssimatic_ipc327g_firmwareMatch-
AND
siemenssimatic_ipc327gMatch-
Node
siemenssimatic_ipc377g_firmwareMatch-
AND
siemenssimatic_ipc377gMatch-
Node
siemenssimatic_ipc427e_firmwareMatch-
AND
siemenssimatic_ipc427eMatch-
Node
siemenssimatic_ipc477e_firmwareMatch-
AND
siemenssimatic_ipc477eMatch-
Node
siemenssimatic_ipc477e_pro_firmwareMatch-
AND
siemenssimatic_ipc477e_proMatch-
Node
siemenssimatic_ipc627e_firmwareMatch-
AND
siemenssimatic_ipc627eMatch-
Node
siemenssimatic_ipc647e_firmwareMatch-
AND
siemenssimatic_ipc647eMatch-
Node
siemenssimatic_ipc677e_firmwareMatch-
AND
siemenssimatic_ipc677eMatch-
Node
siemenssimatic_ipc847e_firmwareMatch-
AND
siemenssimatic_ipc847eMatch-
Node
siemenssimatic_itp1000_firmwareMatch-
AND
siemenssimatic_itp1000Match-
VendorProductVersionCPE
insydeinsydeh2o*cpe:2.3:o:insyde:insydeh2o:*:*:*:*:*:*:*:*
siemensruggedcom_apr1808-cpe:2.3:h:siemens:ruggedcom_apr1808:-:*:*:*:*:*:*:*
siemensruggedcom_apr1808_firmware-cpe:2.3:o:siemens:ruggedcom_apr1808_firmware:-:*:*:*:*:*:*:*
siemenssimatic_field_pg_m5-cpe:2.3:h:siemens:simatic_field_pg_m5:-:*:*:*:*:*:*:*
siemenssimatic_field_pg_m5_firmware-cpe:2.3:o:siemens:simatic_field_pg_m5_firmware:-:*:*:*:*:*:*:*
siemenssimatic_field_pg_m6-cpe:2.3:h:siemens:simatic_field_pg_m6:-:*:*:*:*:*:*:*
siemenssimatic_field_pg_m6_firmware-cpe:2.3:o:siemens:simatic_field_pg_m6_firmware:-:*:*:*:*:*:*:*
siemenssimatic_ipc127e-cpe:2.3:h:siemens:simatic_ipc127e:-:*:*:*:*:*:*:*
siemenssimatic_ipc127e_firmware-cpe:2.3:o:siemens:simatic_ipc127e_firmware:-:*:*:*:*:*:*:*
siemenssimatic_ipc227g-cpe:2.3:h:siemens:simatic_ipc227g:-:*:*:*:*:*:*:*
Rows per page:
1-10 of 331

CVSS2

4.6

Attack Vector

LOCAL

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:L/AC:L/Au:N/C:P/I:P/A:P

CVSS3

7.8

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

AI Score

8

Confidence

High

EPSS

0.001

Percentile

20.4%

Related for CVE-2021-33626