cvelist/2022/24xxx/CVE-2022-24069.json

72 lines
2.4 KiB
JSON
Raw Normal View History

2022-01-27 20:01:04 +00:00
{
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
2022-02-03 00:01:05 +00:00
"ID": "CVE-2022-24069",
"STATE": "PUBLIC"
2022-01-27 20:01:04 +00:00
},
2022-02-03 00:01:05 +00:00
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
2022-01-27 20:01:04 +00:00
"description": {
"description_data": [
{
"lang": "eng",
2022-02-03 00:01:05 +00:00
"value": "An issue was discovered in AhciBusDxe in Insyde InsydeH2O with kernel 5.0 before 05.08.41, 5.1 before 05.16.29, 5.2 before 05.26.29, 5.3 before 05.35.29, 5.4 before 05.43.29, and 5.5 before 05.51.29. An SMM callout vulnerability allows an attacker to hijack the execution flow of code running in System Management Mode. Exploiting this issue could lead to escalating privileges to SMM."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"url": "https://www.insyde.com/security-pledge",
"refsource": "MISC",
"name": "https://www.insyde.com/security-pledge"
2022-02-17 01:01:11 +00:00
},
{
"refsource": "CONFIRM",
"name": "https://security.netapp.com/advisory/ntap-20220216-0002/",
"url": "https://security.netapp.com/advisory/ntap-20220216-0002/"
2022-02-24 15:02:06 +00:00
},
{
"refsource": "CONFIRM",
"name": "https://cert-portal.siemens.com/productcert/pdf/ssa-306654.pdf",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-306654.pdf"
2022-01-27 20:01:04 +00:00
}
]
}
}