cvelist/2022/40xxx/CVE-2022-40246.json

81 lines
2.2 KiB
JSON
Raw Normal View History

2022-09-08 20:00:45 +00:00
{
2022-09-20 13:30:49 -04:00
"CVE_data_meta": {
"ASSIGNER": "cert@cert.org",
"DATE_PUBLIC": "2022-08-11T01:03:00.000Z",
"ID": "CVE-2022-40246",
"STATE": "PUBLIC",
"TITLE": "Arbitrary write vulnerability in SbPei module leads to arbitrary code execution during PEI phase."
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "Aptio",
"version": {
"version_data": [
{
"version_name": "5.x",
"version_value": "5.x"
}
]
}
}
]
},
"vendor_name": "AMI"
}
]
}
},
"credit": [
{
"lang": "eng",
"value": "Binarly efiXplorer team"
2022-09-08 20:00:45 +00:00
}
2022-09-20 13:30:49 -04:00
],
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "A potential attacker can write one byte by arbitrary address at the time of the PEI phase (only during S3 resume boot mode) and influence the subsequent boot stages. This can lead to the mitigations bypassing, physical memory contents disclosure, discovery of any secrets from any Virtual Machines (VMs) and bypassing memory isolation and confidential computing boundaries. Additionally, an attacker can build a payload which can be injected into the SMRAM memory.\nThis issue affects:\n \nModule name: SbPei\nSHA256: d827182e5f9b7a9ff0b9d3e232f7cfac43b5237e2681e11f005be627a49283a9\nModule GUID: c1fbd624-27ea-40d1-aa48-94c3dc5c7e0d"
}
]
},
"generator": {
"engine": "Vulnogram 0.0.9"
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-123 Write-what-where Condition"
}
]
}
]
},
"references": {
"reference_data": [
{
"refsource": "CONFIRM",
"url": "https://www.binarly.io/advisories/BRLY-2022-014"
},
{
"refsource": "CONFIRM",
"url": "https://www.ami.com/security-center/"
}
]
},
"source": {
"discovery": "EXTERNAL"
}
}