An issue was discovered in Insyde InsydeH2O with kernel 5.0 through 5.5. An SMM callout vulnerability in the SMM driver in UsbLegacyControlSmm leads to possible arbitrary code execution in SMM and escalation of privileges. An attacker could overwrite the function pointers in the EFI_BOOT_SERVICES table before the USB SMI handler triggers. (This is not exploitable from code running in the operating system.)
References
Link | Resource |
---|---|
https://binarly.io/advisories/BRLY-2022-022/index.html | Exploit Third Party Advisory |
https://www.insyde.com/security-pledge | Vendor Advisory |
https://www.insyde.com/security-pledge/SA-2022031 | Vendor Advisory |
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
Configuration 4 (hide)
|
Configuration 5 (hide)
|
Configuration 6 (hide)
|
History
No history.
Information
Published : 2022-09-22 16:15
Updated : 2024-02-28 19:29
NVD link : CVE-2022-35408
Mitre link : CVE-2022-35408
CVE.ORG link : CVE-2022-35408
JSON object : View
Products Affected
insyde
- insydeh2o
CWE