Lucene search

K
cvelistSynapticsCVELIST:CVE-2021-3675
HistoryJun 14, 2022 - 12:00 a.m.

CVE-2021-3675 synaTEE.signed.dll Out-Of-Bounds Heap Write

2022-06-1400:00:00
CWE-20
Synaptics
www.cve.org

5.5 Medium

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N

6.9 Medium

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

5.1%

Improper Input Validation vulnerability in synaTEE.signed.dll of Synaptics Fingerprint Driver allows a local authorized attacker to overwrite a heap tag, with potential loss of confidentiality. This issue affects: Synaptics Synaptics Fingerprint Driver 5.1.xxx.26 versions prior to xxx=340 on x86/64; 5.2.xxxx.26 versions prior to xxxx=3541 on x86/64; 5.2.2xx.26 versions prior to xx=29 on x86/64; 5.2.3xx.26 versions prior to xx=25 on x86/64; 5.3.xxxx.26 versions prior to xxxx=3543 on x86/64; 5.5.xx.1058 versions prior to xx=44 on x86/64; 5.5.xx.1102 versions prior to xx=34 on x86/64; 5.5.xx.1116 versions prior to xx=14 on x86/64; 6.0.xx.1104 versions prior to xx=50 on x86/64; 6.0.xx.1108 versions prior to xx=31 on x86/64; 6.0.xx.1111 versions prior to xx=58 on x86/64.

CNA Affected

[
  {
    "platforms": [
      "x86/64"
    ],
    "product": "Synaptics Fingerprint Driver",
    "vendor": "Synaptics",
    "versions": [
      {
        "lessThan": "xxx=340",
        "status": "affected",
        "version": "5.1.xxx.26",
        "versionType": "custom"
      },
      {
        "lessThan": "xxxx=3541",
        "status": "affected",
        "version": "5.2.xxxx.26",
        "versionType": "custom"
      },
      {
        "lessThan": "xx=29",
        "status": "affected",
        "version": "5.2.2xx.26",
        "versionType": "custom"
      },
      {
        "lessThan": "xx=25",
        "status": "affected",
        "version": "5.2.3xx.26",
        "versionType": "custom"
      },
      {
        "lessThan": "xxxx=3543",
        "status": "affected",
        "version": "5.3.xxxx.26",
        "versionType": "custom"
      },
      {
        "lessThan": "xx=44",
        "status": "affected",
        "version": "5.5.xx.1058",
        "versionType": "custom"
      },
      {
        "lessThan": "xx=34",
        "status": "affected",
        "version": "5.5.xx.1102",
        "versionType": "custom"
      },
      {
        "lessThan": "xx=14",
        "status": "affected",
        "version": "5.5.xx.1116",
        "versionType": "custom"
      },
      {
        "lessThan": "xx=50",
        "status": "affected",
        "version": "6.0.xx.1104",
        "versionType": "custom"
      },
      {
        "lessThan": "xx=31",
        "status": "affected",
        "version": "6.0.xx.1108",
        "versionType": "custom"
      },
      {
        "lessThan": "xx=58",
        "status": "affected",
        "version": "6.0.xx.1111",
        "versionType": "custom"
      }
    ]
  }
]

5.5 Medium

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N

6.9 Medium

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

5.1%

Related for CVELIST:CVE-2021-3675