CVE-2022-32955
CVSS V2 None
CVSS V3 None
Description
An issue was discovered in Insyde InsydeH2O with kernel 5.0 through 5.5. DMA attacks on the NvmExpressDxe buffer used by SMM and non-SMM code could cause TOCTOU race-condition issues that could lead to corruption of SMRAM and escalation of privileges. This attack can be mitigated by using IOMMU protection for the ACPI runtime memory used for the command buffer. This attack can be mitigated by copying the link data to SMRAM before checking it and verifying that all pointers are within the buffer.
Overview
- CVE ID
- CVE-2022-32955
- Assigner
- cve@mitre.org
- Vulnerability Status
- Analyzed
- Published Version
- 2023-02-15T02:15:09
- Last Modified Date
- 2023-02-23T18:19:00
Weakness Enumerations
CPE Configuration (Product)
CPE | Vulnerable | Operator | Version Start | Version End |
---|---|---|---|---|
cpe:2.3:a:insyde:insydeh2o:*:*:*:*:*:*:*:* | 1 | OR | 5.0 | 5.2.05.27.27 |
cpe:2.3:a:insyde:insydeh2o:*:*:*:*:*:*:*:* | 1 | OR | 5.3 | 5.3.05.36.27 |
cpe:2.3:a:insyde:insydeh2o:*:*:*:*:*:*:*:* | 1 | OR | 5.4 | 5.4.05.44.27 |
cpe:2.3:a:insyde:insydeh2o:*:*:*:*:*:*:*:* | 1 | OR | 5.5 | 5.5.05.52.27 |
References
Reference URL | Reference Tags |
---|---|
https://www.insyde.com/security-pledge | Vendor Advisory |
https://www.insyde.com/security-pledge/SA-2023015 | Vendor Advisory |
Sources
Source Name | Source URL |
---|---|
NIST | https://nvd.nist.gov/vuln/detail/CVE-2022-32955 |
MITRE | https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32955 |
History
Created | Old Value | New Value | Data Type | Notes |
---|---|---|---|---|
2023-04-17 07:46:49 | Added to TrackCVE | |||
2023-04-17 07:46:51 | Weakness Enumeration | new |