Lucene search

K
cveMitreCVE-2022-33986
HistoryNov 15, 2022 - 12:15 a.m.

CVE-2022-33986

2022-11-1500:15:12
CWE-367
mitre
web.nvd.nist.gov
42
7
cve-2022-33986
dma attacks
variableruntimedxe
smi handler
toctou attack
kernel 5.4
kernel 5.5
insyde
cwe-367
nvd
security advisory

CVSS3

6.4

Attack Vector

LOCAL

Attack Complexity

HIGH

Privileges Required

HIGH

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H

AI Score

6.4

Confidence

High

EPSS

0

Percentile

12.6%

DMA attacks on the parameter buffer used by the VariableRuntimeDxe software SMI handler could lead to a TOCTOU attack. DMA attacks on the parameter buffer used by the software SMI handler used by the driver VariableRuntimeDxe could lead to a TOCTOU attack on the SMI handler and lead to corruption of SMRAM. This issue was discovered by Insyde engineering during a security review. This issue is fixed in Kernel 5.4: 05.44.23 and Kernel 5.5: 05.52.23. CWE-367 CWE-367 Report at: https://www.insyde.com/security-pledge/SA-2022056

Affected configurations

Nvd
Node
insydekernelRange5.45.4.05.44.23
OR
insydekernelRange5.55.5.05.52.23
VendorProductVersionCPE
insydekernel*cpe:2.3:a:insyde:kernel:*:*:*:*:*:*:*:*

Social References

More

CVSS3

6.4

Attack Vector

LOCAL

Attack Complexity

HIGH

Privileges Required

HIGH

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H

AI Score

6.4

Confidence

High

EPSS

0

Percentile

12.6%

Related for CVE-2022-33986