2024-07-14 02:06:08 +00:00

60 lines
2.1 KiB
JSON

{
"id": "CVE-2023-52711",
"sourceIdentifier": "psirt@huawei.com",
"published": "2024-05-28T07:15:10.490",
"lastModified": "2024-05-28T12:39:28.377",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Various Issues Due To Exposed SMI Handler in AmdPspP2CmboxV2. The first issue can be leveraged to bypass the protections that have been put in place by previous UEFI phases to prevent direct access to the SPI flash. The second issue can be used to both leak and corrupt SMM memory thus potentially leading code execution in SMM"
},
{
"lang": "es",
"value": "Varios problemas debido a la exposici\u00f3n del controlador SMI en AmdPspP2CmboxV2. El primer problema se puede aprovechar para evitar las protecciones implementadas en fases anteriores de UEFI para evitar el acceso directo a la memoria flash SPI. El segundo problema se puede utilizar para filtrar y corromper la memoria de SMM, lo que podr\u00eda provocar la ejecuci\u00f3n de c\u00f3digo en SMM."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "psirt@huawei.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "psirt@huawei.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-284"
}
]
}
],
"references": [
{
"url": "https://www.huawei.com/en/psirt/security-advisories/2024/huawei-sa-voiiaciahpp-6376e0c7-en",
"source": "psirt@huawei.com"
}
]
}