Lucene search

K
cveMitreCVE-2022-30774
HistoryNov 15, 2022 - 12:15 a.m.

CVE-2022-30774

2022-11-1500:15:09
CWE-367
mitre
web.nvd.nist.gov
42
2
cve-2022-30774
dma attacks
pnpsmm driver
parameter buffer
toctou attack
kernel 5.2
kernel 5.3
kernel 5.4
kernel 5.5
cwe-367
nvd
insyde engineering

CVSS3

6.4

Attack Vector

LOCAL

Attack Complexity

HIGH

Privileges Required

HIGH

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H

AI Score

6.5

Confidence

High

EPSS

0

Percentile

12.6%

DMA attacks on the parameter buffer used by the PnpSmm driver could change the contents after parameter values have been checked but before they are used (a TOCTOU attack) DMA attacks on the parameter buffer used by the PnpSmm driver could change the contents after parameter values have been checked but before they are used (a TOCTOU attack) . This issue was discovered by Insyde engineering during a security review. This iss was fixed in Kernel 5.2: 05.27.29, Kernel 5.3: 05.36.25, Kernel 5.4: 05.44.25, Kernel 5.5: 05.52.25. CWE-367 https://www.insyde.com/security-pledge/SA-2022043

Affected configurations

Nvd
Node
insydekernelRange5.25.2.05.27.29
OR
insydekernelRange5.35.3.05.36.25
OR
insydekernelRange5.45.4.05.44.25
OR
insydekernelRange5.55.5.05.52.25
VendorProductVersionCPE
insydekernel*cpe:2.3:a:insyde:kernel:*:*:*:*:*:*:*:*

Social References

More

CVSS3

6.4

Attack Vector

LOCAL

Attack Complexity

HIGH

Privileges Required

HIGH

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H

AI Score

6.5

Confidence

High

EPSS

0

Percentile

12.6%

Related for CVE-2022-30774