3.6 Low
CVSS2
Attack Vector
LOCAL
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
NONE
Availability Impact
PARTIAL
AV:L/AC:L/Au:N/C:P/I:N/A:P
7.1 High
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
6.7 Medium
AI Score
Confidence
High
0.0004 Low
EPSS
Percentile
5.1%
Improper Input Validation vulnerability in synaTEE.signed.dll of Synaptics Fingerprint Driver allows a local authorized attacker to overwrite a heap tag, with potential loss of confidentiality. This issue affects: Synaptics Synaptics Fingerprint Driver 5.1.xxx.26 versions prior to xxx=340 on x86/64; 5.2.xxxx.26 versions prior to xxxx=3541 on x86/64; 5.2.2xx.26 versions prior to xx=29 on x86/64; 5.2.3xx.26 versions prior to xx=25 on x86/64; 5.3.xxxx.26 versions prior to xxxx=3543 on x86/64; 5.5.xx.1058 versions prior to xx=44 on x86/64; 5.5.xx.1102 versions prior to xx=34 on x86/64; 5.5.xx.1116 versions prior to xx=14 on x86/64; 6.0.xx.1104 versions prior to xx=50 on x86/64; 6.0.xx.1108 versions prior to xx=31 on x86/64; 6.0.xx.1111 versions prior to xx=58 on x86/64.
[
{
"platforms": [
"x86/64"
],
"product": "Synaptics Fingerprint Driver",
"vendor": "Synaptics",
"versions": [
{
"lessThan": "xxx=340",
"status": "affected",
"version": "5.1.xxx.26",
"versionType": "custom"
},
{
"lessThan": "xxxx=3541",
"status": "affected",
"version": "5.2.xxxx.26",
"versionType": "custom"
},
{
"lessThan": "xx=29",
"status": "affected",
"version": "5.2.2xx.26",
"versionType": "custom"
},
{
"lessThan": "xx=25",
"status": "affected",
"version": "5.2.3xx.26",
"versionType": "custom"
},
{
"lessThan": "xxxx=3543",
"status": "affected",
"version": "5.3.xxxx.26",
"versionType": "custom"
},
{
"lessThan": "xx=44",
"status": "affected",
"version": "5.5.xx.1058",
"versionType": "custom"
},
{
"lessThan": "xx=34",
"status": "affected",
"version": "5.5.xx.1102",
"versionType": "custom"
},
{
"lessThan": "xx=14",
"status": "affected",
"version": "5.5.xx.1116",
"versionType": "custom"
},
{
"lessThan": "xx=50",
"status": "affected",
"version": "6.0.xx.1104",
"versionType": "custom"
},
{
"lessThan": "xx=31",
"status": "affected",
"version": "6.0.xx.1108",
"versionType": "custom"
},
{
"lessThan": "xx=58",
"status": "affected",
"version": "6.0.xx.1111",
"versionType": "custom"
}
]
}
]
More
3.6 Low
CVSS2
Attack Vector
LOCAL
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
NONE
Availability Impact
PARTIAL
AV:L/AC:L/Au:N/C:P/I:N/A:P
7.1 High
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
6.7 Medium
AI Score
Confidence
High
0.0004 Low
EPSS
Percentile
5.1%