CVE-2022-30426

CVSS V2 None CVSS V3 High 7.8
Description
There is a stack buffer overflow vulnerability, which could lead to arbitrary code execution in UEFI DXE driver on some Acer products. An attack could exploit this vulnerability to escalate privilege from ring 3 to ring 0, and hijack control flow during UEFI DXE execution. This affects Altos T110 F3 firmware version <= P13 (latest) and AP130 F2 firmware version <= P04 (latest) and Aspire 1600X firmware version <= P11.A3L (latest) and Aspire 1602M firmware version <= P11.A3L (latest) and Aspire 7600U firmware version <= P11.A4 (latest) and Aspire MC605 firmware version <= P11.A4L (latest) and Aspire TC-105 firmware version <= P12.B0L (latest) and Aspire TC-120 firmware version <= P11-A4 (latest) and Aspire U5-620 firmware version <= P11.A1 (latest) and Aspire X1935 firmware version <= P11.A3L (latest) and Aspire X3475 firmware version <= P11.A3L (latest) and Aspire X3995 firmware version <= P11.A3L (latest) and Aspire XC100 firmware version <= P11.B3 (latest) and Aspire XC600 firmware version <= P11.A4 (latest) and Aspire Z3-615 firmware version <= P11.A2L (latest) and Veriton E430G firmware version <= P21.A1 (latest) and Veriton B630_49 firmware version <= AAP02SR (latest) and Veriton E430 firmware version <= P11.A4 (latest) and Veriton M2110G firmware version <= P21.A3 (latest) and Veriton M2120G fir.
Overview
  • CVE ID
  • CVE-2022-30426
  • Assigner
  • cve@mitre.org
  • Vulnerability Status
  • Analyzed
  • Published Version
  • 2022-09-23T00:15:09
  • Last Modified Date
  • 2022-09-26T14:35:09
CPE Configuration (Product)
CPE Vulnerable Operator Version Start Version End
AND
cpe:2.3:o:acer:altos_t110_f3_firmware:*:*:*:*:*:*:*:* 1 OR p13
cpe:2.3:h:acer:altos_t110_f3:-:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:acer:ap130_f2_firmware:*:*:*:*:*:*:*:* 1 OR p04
cpe:2.3:h:acer:ap130_f2:-:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:acer:aspire_1600x_firmware:*:*:*:*:*:*:*:* 1 OR p11.a3l
cpe:2.3:h:acer:aspire_1600x:-:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:acer:aspire_1602m_firmware:*:*:*:*:*:*:*:* 1 OR p11.a3l
cpe:2.3:h:acer:aspire_1602m:-:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:acer:aspire_7600u_firmware:*:*:*:*:*:*:*:* 1 OR p11.a4
cpe:2.3:h:acer:aspire_7600u:-:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:acer:aspire_mc605_firmware:*:*:*:*:*:*:*:* 1 OR p11.a4l
cpe:2.3:h:acer:aspire_mc605:-:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:acer:aspire_tc-105_firmware:*:*:*:*:*:*:*:* 1 OR p12.b0l
cpe:2.3:h:acer:aspire_tc-105:-:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:acer:aspire_tc-120_firmware:*:*:*:*:*:*:*:* 1 OR p11-a4
cpe:2.3:h:acer:aspire_tc-120:-:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:acer:aspire_u5-620_firmware:*:*:*:*:*:*:*:* 1 OR p11.a1
cpe:2.3:h:acer:aspire_u5-620:-:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:acer:aspire_x1935_firmware:*:*:*:*:*:*:*:* 1 OR p11.a3l
cpe:2.3:h:acer:aspire_x1935:-:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:acer:aspire_x3475_firmware:*:*:*:*:*:*:*:* 1 OR p11.a3l
cpe:2.3:h:acer:aspire_x3475:-:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:acer:aspire_x3995_firmware:*:*:*:*:*:*:*:* 1 OR p11.a3l
cpe:2.3:h:acer:aspire_x3995:-:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:acer:aspire_xc100_firmware:*:*:*:*:*:*:*:* 1 OR p11.b3
cpe:2.3:h:acer:aspire_xc100:-:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:acer:aspire_xc600_firmware:*:*:*:*:*:*:*:* 1 OR p11.a4
cpe:2.3:h:acer:aspire_xc600:-:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:acer:aspire_z3-615_firmware:*:*:*:*:*:*:*:* 1 OR p11.a2l
cpe:2.3:h:acer:aspire_z3-615:-:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:acer:veriton_b630_49_firmware:*:*:*:*:*:*:*:* 1 OR aap02sr
cpe:2.3:h:acer:veriton_b630_49:-:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:acer:veriton_e430g_firmware:*:*:*:*:*:*:*:* 1 OR p21.a1
cpe:2.3:h:acer:veriton_e430g:-:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:acer:veriton_e430_firmware:*:*:*:*:*:*:*:* 1 OR p11.a4
cpe:2.3:h:acer:veriton_e430:-:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:acer:veriton_m2110g_firmware:*:*:*:*:*:*:*:* 1 OR p21.a3
cpe:2.3:h:acer:veriton_m2110g:-:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:acer:veriton_m2120g_firmware:*:*:*:*:*:*:*:* 1 OR p11-a3
cpe:2.3:h:acer:veriton_m2120g:-:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:acer:veriton_m2611g_firmware:*:*:*:*:*:*:*:* 1 OR p11-b0l
cpe:2.3:h:acer:veriton_m2611g:-:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:acer:veriton_m2611_firmware:*:*:*:*:*:*:*:* 1 OR p11.b0
cpe:2.3:h:acer:veriton_m2611:-:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:acer:veriton_m4620_firmware:*:*:*:*:*:*:*:* 1 OR p21.a3
cpe:2.3:h:acer:veriton_m4620:-:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:acer:veriton_m4620g_firmware:*:*:*:*:*:*:*:* 1 OR p21.a3
cpe:2.3:h:acer:veriton_m4620g:-:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:acer:veriton_m6620g_firmware:*:*:*:*:*:*:*:* 1 OR p21.a0
cpe:2.3:h:acer:veriton_m6620g:-:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:acer:veriton_n2620g_firmware:*:*:*:*:*:*:*:* 1 OR p21.b0
cpe:2.3:h:acer:veriton_n2620g:-:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:acer:veriton_n4620g_firmware:*:*:*:*:*:*:*:* 1 OR p11.a2l
cpe:2.3:h:acer:veriton_n4620g:-:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:acer:veriton_n4630g_firmware:*:*:*:*:*:*:*:* 1 OR p21.b0
cpe:2.3:h:acer:veriton_n4630g:-:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:acer:veriton_s6620g_firmware:*:*:*:*:*:*:*:* 1 OR p11.a1
cpe:2.3:h:acer:veriton_s6620g:-:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:acer:veriton_x2611g_firmware:*:*:*:*:*:*:*:* 1 OR p11.a4
cpe:2.3:h:acer:veriton_x2611g:-:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:acer:veriton_x2611_firmware:*:*:*:*:*:*:*:* 1 OR p11.a4
cpe:2.3:h:acer:veriton_x2611:-:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:acer:veriton_x4620g_firmware:*:*:*:*:*:*:*:* 1 OR p11.a3
cpe:2.3:h:acer:veriton_x4620g:-:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:acer:veriton_x6620g_firmware:*:*:*:*:*:*:*:* 1 OR p11.a3
cpe:2.3:h:acer:veriton_x6620g:-:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:acer:veriton_z2650g_firmware:*:*:*:*:*:*:*:* 1 OR p21.a1
cpe:2.3:h:acer:veriton_z2650g:-:*:*:*:*:*:*:* 0 OR
CVSS Version 3
  • Version
  • 3.1
  • Vector String
  • CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  • Attack Vector
  • LOCAL
  • Attack Compatibility
  • LOW
  • Privileges Required
  • LOW
  • User Interaction
  • NONE
  • Scope
  • UNCHANGED
  • Confidentiality Impact
  • HIGH
  • Availability Impact
  • HIGH
  • Base Score
  • 7.8
  • Base Severity
  • HIGH
  • Exploitability Score
  • 1.8
  • Impact Score
  • 5.9
History
Created Old Value New Value Data Type Notes
2022-09-23 01:00:15 Added to TrackCVE
2022-12-07 04:31:46 2022-09-23T00:15Z 2022-09-23T00:15:09 CVE Published Date updated
2022-12-07 04:31:46 2022-09-26T14:35:09 CVE Modified Date updated
2022-12-07 04:31:46 Analyzed Vulnerability Status updated