mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-31 10:41:19 +00:00
115 lines
3.4 KiB
JSON
115 lines
3.4 KiB
JSON
{
|
|
"id": "CVE-2023-22614",
|
|
"sourceIdentifier": "cve@mitre.org",
|
|
"published": "2023-04-11T21:15:17.680",
|
|
"lastModified": "2023-05-08T20:15:48.637",
|
|
"vulnStatus": "Analyzed",
|
|
"descriptions": [
|
|
{
|
|
"lang": "en",
|
|
"value": "An issue was discovered in ChipsetSvcSmm in Insyde InsydeH2O with kernel 5.0 through 5.5. There is insufficient input validation in BIOS Guard updates. An attacker can induce memory corruption in SMM by supplying malformed inputs to the BIOS Guard SMI handler."
|
|
}
|
|
],
|
|
"metrics": {
|
|
"cvssMetricV31": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"cvssData": {
|
|
"version": "3.1",
|
|
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H",
|
|
"attackVector": "LOCAL",
|
|
"attackComplexity": "LOW",
|
|
"privilegesRequired": "LOW",
|
|
"userInteraction": "NONE",
|
|
"scope": "CHANGED",
|
|
"confidentialityImpact": "HIGH",
|
|
"integrityImpact": "HIGH",
|
|
"availabilityImpact": "HIGH",
|
|
"baseScore": 8.8,
|
|
"baseSeverity": "HIGH"
|
|
},
|
|
"exploitabilityScore": 2.0,
|
|
"impactScore": 6.0
|
|
}
|
|
]
|
|
},
|
|
"weaknesses": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"description": [
|
|
{
|
|
"lang": "en",
|
|
"value": "CWE-787"
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"configurations": [
|
|
{
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:insyde:insydeh20:05.42.52.0026:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "30B97B7F-4FB9-47E1-BCB1-5DB1FFDD3F22"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:insyde:insydeh20:05.43.01.0026:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "5EDB9938-4B3A-4580-899A-AC27D3BD7198"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:insyde:insydeh20:05.43.12.0056:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "5E340332-91BA-46F0-8324-7FA2D377C435"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:insyde:insydeh20:05.44.34.0054:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "B5EFB485-7205-4788-92D5-F340B5F95798"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:insyde:insydeh20:05.44.45.0015:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "20767831-07B6-4D1C-B5EF-67680C720559"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:insyde:insydeh20:05.44.45.0028:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "E2900B6D-77E7-490F-886B-52CC89D90AFD"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"references": [
|
|
{
|
|
"url": "https://research.nccgroup.com/2023/04/11/stepping-insyde-system-management-mode/",
|
|
"source": "cve@mitre.org",
|
|
"tags": [
|
|
"Exploit",
|
|
"Third Party Advisory"
|
|
]
|
|
},
|
|
{
|
|
"url": "https://www.insyde.com/security-pledge",
|
|
"source": "cve@mitre.org",
|
|
"tags": [
|
|
"Vendor Advisory"
|
|
]
|
|
},
|
|
{
|
|
"url": "https://www.insyde.com/security-pledge/SA-2023020",
|
|
"source": "cve@mitre.org",
|
|
"tags": [
|
|
"Vendor Advisory"
|
|
]
|
|
}
|
|
]
|
|
} |