Lucene search

K
cveMitreCVE-2022-35897
HistoryNov 21, 2022 - 5:15 p.m.

CVE-2022-35897

2022-11-2117:15:25
CWE-787
mitre
web.nvd.nist.gov
29
3
cve
2022
35897
stack buffer overflow
insydeh2o
arbitrary code execution
vulnerability
uefi
spi modification

CVSS3

6.8

Attack Vector

PHYSICAL

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

AI Score

7.2

Confidence

High

EPSS

0.001

Percentile

32.7%

An stack buffer overflow vulnerability leads to arbitrary code execution issue was discovered in Insyde InsydeH2O with kernel 5.0 through 5.5. If the attacker modifies specific UEFI variables, it can cause a stack overflow, leading to arbitrary code execution. The specific variables are normally locked (read-only) at the OS level and therefore an attack would require direct SPI modification. If an attacker can change the values of at least two variables out of three (SecureBootEnforce, SecureBoot, RestoreBootSettings), it is possible to execute arbitrary code.

Affected configurations

Nvd
Node
insydekernelRange5.05.5
VendorProductVersionCPE
insydekernel*cpe:2.3:o:insyde:kernel:*:*:*:*:*:*:*:*

Social References

More

CVSS3

6.8

Attack Vector

PHYSICAL

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

AI Score

7.2

Confidence

High

EPSS

0.001

Percentile

32.7%

Related for CVE-2022-35897