All the vulnerabilites related to intel - comet_lake-s_firmware
Vulnerability from fkie_nvd
Published
2022-11-15 22:15
Modified
2024-11-21 06:58
Severity ?
Summary
Incorrect pointer checks within the the FwBlockServiceSmm driver can allow arbitrary RAM modifications During review of the FwBlockServiceSmm driver, certain instances of SpiAccessLib could be tricked into writing 0xff to arbitrary system and SMRAM addresses. Fixed in: INTEL Purley-R: 05.21.51.0048 Whitley: 05.42.23.0066 Cedar Island: 05.42.11.0021 Eagle Stream: 05.44.25.0052 Greenlow/Greenlow-R(skylake/kabylake): Trunk Mehlow/Mehlow-R (CoffeeLake-S): Trunk Tatlow (RKL-S): Trunk Denverton: 05.10.12.0042 Snow Ridge: Trunk Graneville DE: 05.05.15.0038 Grangeville DE NS: 05.27.26.0023 Bakerville: 05.21.51.0026 Idaville: 05.44.27.0030 Whiskey Lake: Trunk Comet Lake-S: Trunk Tiger Lake H/UP3: 05.43.12.0052 Alder Lake: 05.44.23.0047 Gemini Lake: Not Affected Apollo Lake: Not Affected Elkhart Lake: 05.44.30.0018 AMD ROME: trunk MILAN: 05.36.10.0017 GENOA: 05.52.25.0006 Snowy Owl: Trunk R1000: 05.32.50.0018 R2000: 05.44.30.0005 V2000: Trunk V3000: 05.44.30.0007 Ryzen 5000: 05.44.30.0004 Embedded ROME: Trunk Embedded MILAN: Trunk Hygon Hygon #1/#2: 05.36.26.0016 Hygon #3: 05.44.26.0007 https://www.insyde.com/security-pledge/SA-2022060
References
▼ | URL | Tags | |
---|---|---|---|
cve@mitre.org | https://www.insyde.com/security-pledge | Vendor Advisory | |
cve@mitre.org | https://www.insyde.com/security-pledge/SA-2022060 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.insyde.com/security-pledge | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.insyde.com/security-pledge/SA-2022060 | Vendor Advisory |
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:genoa_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "FCC60EFA-7174-4E91-A33F-794935B12334", "versionEndExcluding": "05.52.25.0006", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:genoa:-:*:*:*:*:*:*:*", "matchCriteriaId": "90592BBD-A547-41D5-9696-D93392467417", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:hygon_1_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "05922CE9-07BA-43C8-9B7E-344F9AACEC8E", "versionEndExcluding": "05.36.26.0016", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:hygon_1:-:*:*:*:*:*:*:*", "matchCriteriaId": "B1E855A2-4673-41C3-8966-8BE1225B4117", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:hygon_2_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B9BFD1DF-1C4A-44D6-8E34-AA357AD99C0C", "versionEndExcluding": "05.36.26.0016", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:hygon_2:-:*:*:*:*:*:*:*", "matchCriteriaId": "ED45EDED-9C4E-4D94-9101-AC52AAC3DA88", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:hygon_3_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A4879580-095C-4503-8D81-5CCE09B6CEB4", "versionEndExcluding": "05.44.26.0007", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:hygon_3:-:*:*:*:*:*:*:*", "matchCriteriaId": "B569C92C-0C16-4F5E-92F4-CF6502131A3A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:milan_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B638FCDF-0ADD-4815-BD0A-3157D212A130", "versionEndExcluding": "05.36.10.0017", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:milan:-:*:*:*:*:*:*:*", "matchCriteriaId": "89C2BBB6-469A-48A4-85EB-A6BBD21AA27F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:milan_firmware:*:*:*:*:embedded:*:*:*", "matchCriteriaId": "29F98F52-0086-4F25-8CBB-909DD79A2D71", "versionEndExcluding": "05.36.26.0016", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:milan:-:*:*:*:embedded:*:*:*", "matchCriteriaId": "59B0388D-7B0E-439F-896B-A4E08F657606", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:rome_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E55655FF-21B7-4602-9C4D-3CC0320CEF99", "versionEndExcluding": "05.36.10.0017", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:rome:-:*:*:*:*:*:*:*", "matchCriteriaId": "39415311-BEFC-4507-8964-75C393381633", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:rome_firmware:*:*:*:*:embedded:*:*:*", "matchCriteriaId": "2F29A768-8EF1-4F50-A78D-56BC9BE41484", "versionEndExcluding": "05.36.26.0016", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:rome:-:*:*:*:embedded:*:*:*", "matchCriteriaId": "95D58B14-392D-4F65-8FF0-199867D3D2BB", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5300g_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "96C827CD-61BA-4FA8-886C-08815FA83D4A", "versionEndExcluding": "05.44.30.0004", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5300g:-:*:*:*:*:*:*:*", "matchCriteriaId": "3D857EFE-B24E-4228-BB1E-34F9BC763A11", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5300ge_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C252F160-6CBE-42EC-A6AC-82F932348A55", "versionEndExcluding": "05.44.30.0004", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5300ge:-:*:*:*:*:*:*:*", "matchCriteriaId": "F6CC472B-1502-402D-B2AC-8A63A69F2A27", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5600g_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "73443456-6425-46B1-A602-A326B410FE7A", "versionEndExcluding": "05.44.30.0004", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5600g:-:*:*:*:*:*:*:*", "matchCriteriaId": "8937FABB-B60E-4780-BB6D-B1B99DD69219", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5600ge_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "4D29447B-3FF9-4B29-AA00-5179E54A2991", "versionEndExcluding": "05.44.30.0004", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5600ge:-:*:*:*:*:*:*:*", "matchCriteriaId": "3B83F1F6-64B1-40D3-817A-E27CEB2E93EC", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5600x_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "07E151CD-DED7-4900-8346-7CC60447A3D5", "versionEndExcluding": "05.44.30.0004", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5600x:-:*:*:*:*:*:*:*", "matchCriteriaId": "A6CE435D-B9E9-43D6-AFBC-74E258DC4DFA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5700g_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C14D153C-8CC3-40B2-B694-08C4FBB67A8C", "versionEndExcluding": "05.44.30.0004", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5700g:-:*:*:*:*:*:*:*", "matchCriteriaId": "20F5FCF8-FDDA-43F6-AFFD-1874DB2BB806", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5700ge_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "47E4A102-1306-481F-96D5-3F677FE54152", "versionEndExcluding": "05.44.30.0004", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5700ge:-:*:*:*:*:*:*:*", "matchCriteriaId": "CA1A9BEC-27AB-40AD-BBED-4420451D3793", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5800x_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D1FF208E-2271-440D-9398-2807CBF87233", "versionEndExcluding": "05.44.30.0004", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5800x:-:*:*:*:*:*:*:*", "matchCriteriaId": "48F6B331-4C0F-49FF-A39F-381B9ADE3483", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5800x3d_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "CA8CD6DB-42C5-4584-8E22-090614949DF3", "versionEndExcluding": "05.44.30.0004", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5800x3d:-:*:*:*:*:*:*:*", "matchCriteriaId": "238EA54F-4809-4D8F-9F18-71135FED9D05", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5900x_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "7872EB6C-5C3D-4804-9934-53BD91A0B88E", "versionEndExcluding": "05.44.30.0004", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5900x:-:*:*:*:*:*:*:*", "matchCriteriaId": "050C802C-D8C7-4D58-BA6E-AC48EEF25215", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5950x_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "48018BD4-08DF-4D87-A6AD-251236FD673E", "versionEndExcluding": "05.44.30.0004", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5950x:-:*:*:*:*:*:*:*", "matchCriteriaId": "BD9478CC-DF88-4833-BBB2-2D82D9BBFA63", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:snowy_owl_r1000_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "5E840A2C-A5BA-4054-A932-07B1AED61C3E", "versionEndExcluding": "05.32.50.0018", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:snowy_owl_r1000:-:*:*:*:*:*:*:*", "matchCriteriaId": "7AA109B5-E052-4944-AA5C-96B6E8842902", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:snowy_owl_r2000_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "2CFD31CB-623F-46E9-B181-AC5D96349A47", "versionEndExcluding": "05.44.30.0005", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:snowy_owl_r2000:-:*:*:*:*:*:*:*", "matchCriteriaId": "1963FD6B-57F6-4CDC-A92B-20079526ACB0", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:snowy_owl_v2000_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "4A998C25-E37C-4987-AFBE-91AA6F324A0E", "versionEndExcluding": "05.44.30.0007", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:snowy_owl_v2000:-:*:*:*:*:*:*:*", "matchCriteriaId": "5EACEBA7-F35C-4FCD-B146-4E1A274B8E3B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:snowy_owl_v3000_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "669E1226-DA98-4A6B-BF79-602258AAFC80", "versionEndExcluding": "05.44.30.0007", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:snowy_owl_v3000:-:*:*:*:*:*:*:*", "matchCriteriaId": "61FA4046-4CD6-4592-B972-1C2ADD4978D1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:alder_lake_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "5A94F47D-AC22-44FF-A9F9-B3709D5A0897", "versionEndExcluding": "05.44.23.0047", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:alder_lake:-:*:*:*:*:*:*:*", "matchCriteriaId": "E39D7884-8579-4B0C-BC50-66DFE48583A5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:bakerville_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "9238729D-BE76-4DDE-B3BC-04AA0E96EDF7", "versionEndExcluding": "05.21.51.0026", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:bakerville:-:*:*:*:*:*:*:*", "matchCriteriaId": "6DBB308D-E36F-4ECD-8DFF-3784FCECDBEC", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:cedar_island_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C9165049-02FB-436E-84CD-0F1C9376CF5D", "versionEndExcluding": "05.42.11.0021", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:cedar_island:-:*:*:*:*:*:*:*", "matchCriteriaId": "3EEA11CC-5BB3-41FF-AAC5-2A74C3E862F2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:idaville_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "01F0F8C2-28B8-4670-A47F-999B98A2F6CB", "versionEndExcluding": "05.43.12.0052", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:idaville:-:*:*:*:*:*:*:*", "matchCriteriaId": "25C6C611-A06F-4855-B224-C05CD6EBA88F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:comet_lake-s_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "CB35619B-30AB-4F2F-BBE9-B382AB2A20A2", "versionEndExcluding": "05.43.12.0052", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:comet_lake-s:-:*:*:*:*:*:*:*", "matchCriteriaId": "20A2F526-3B6E-433A-9CCC-471686292193", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:tiger_lake_h\\/up3_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "5984089E-3004-476E-A0EA-8B745EDB5D8C", "versionEndExcluding": "05.43.12.0052", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:tiger_lake_h\\/up3:-:*:*:*:*:*:*:*", "matchCriteriaId": "D856B7FC-16F1-490E-AB0C-14FFB14718A7", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:whiskey_lake_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "489E0210-427F-4D52-B184-B908EC13325F", "versionEndExcluding": "05.43.12.0052", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:whiskey_lake:-:*:*:*:*:*:*:*", "matchCriteriaId": "66A81E2D-E1A6-4B0F-B7F3-C76927598E1C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:denverton_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E1978C90-172F-49AE-8F2C-C5FEDAFF9F30", "versionEndExcluding": "05.10.12.0042", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:denverton:-:*:*:*:*:*:*:*", "matchCriteriaId": "A70CCE3F-ED5E-4186-84C7-69B58839E386", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:eagle_stream_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B2FB3A30-921A-45AF-AE16-9C3BCECB1125", "versionEndExcluding": "05.44.25.0052", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:eagle_stream:-:*:*:*:*:*:*:*", "matchCriteriaId": "9F85CBD5-5CE0-4A52-8996-4674CF17D5CC", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:grangeville_de_ns_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C665AF80-C500-4A94-BD6C-8A4ECB8FB64E", "versionEndExcluding": "05.27.26.0023", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:grangeville_de_ns:-:*:*:*:*:*:*:*", "matchCriteriaId": "64D791A1-0735-4C4C-A0BB-D2D96790C3F9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:granville_de_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "EF2F487C-0A2C-4828-88D1-04C5C98AD56A", "versionEndExcluding": "05.05.15.0038", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:granville_de:-:*:*:*:*:*:*:*", "matchCriteriaId": "F4270D4E-9FC2-475B-93BD-A5CB6D565B28", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:greenlow_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "17DFAFE0-1E3E-408C-9FD6-7174C07CF909", "versionEndExcluding": "05.10.12.0042", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:greenlow:-:*:*:*:*:*:*:*", "matchCriteriaId": "44431D1A-D10F-414D-A400-0C5C4F06F99C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:greenlow-r_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C5B3B4F7-A7D4-4BC1-9A18-B71298FF4C52", "versionEndExcluding": "05.10.12.0042", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:greenlow-r:-:*:*:*:*:*:*:*", "matchCriteriaId": "401E968C-3B59-4200-953F-0050DBA90E46", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:mehlow_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "7B7BD8DE-932E-4EA7-A010-E1B18AA8E982", "versionEndExcluding": "05.10.12.0042", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:mehlow:-:*:*:*:*:*:*:*", "matchCriteriaId": "9DBE1F12-551F-4AEF-81A1-E6A588C1C45F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:mehlow-r_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "41AFCB8E-A4D9-4A0C-9088-57BA643E05A5", "versionEndExcluding": "05.10.12.0042", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:mehlow-r:-:*:*:*:*:*:*:*", "matchCriteriaId": "C701B92D-AF94-459B-BC6A-612111555231", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:tatlow_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "97883F64-02E6-46C8-A70B-A01E120A0FF3", "versionEndExcluding": "05.10.12.0042", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:tatlow:-:*:*:*:*:*:*:*", "matchCriteriaId": "84719A8D-75B1-42F7-A568-F7FD501F8B1F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:purley-r_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "7EDB05C1-3989-4E5F-A560-0E3A8449124D", "versionEndExcluding": "05.21.51.0048", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:purley-r:-:*:*:*:*:*:*:*", "matchCriteriaId": "43D86D5A-334F-418F-88BE-2A24B06E80A6", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:whitley_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "354D107D-B11F-4A10-A50B-8C22E5B93C16", "versionEndExcluding": "05.42.23.0066", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:whitley:-:*:*:*:*:*:*:*", "matchCriteriaId": "F449054E-C729-485F-B5FA-AA49FF0D0294", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Incorrect pointer checks within the the FwBlockServiceSmm driver can allow arbitrary RAM modifications During review of the FwBlockServiceSmm driver, certain instances of SpiAccessLib could be tricked into writing 0xff to arbitrary system and SMRAM addresses. Fixed in: INTEL Purley-R: 05.21.51.0048 Whitley: 05.42.23.0066 Cedar Island: 05.42.11.0021 Eagle Stream: 05.44.25.0052 Greenlow/Greenlow-R(skylake/kabylake): Trunk Mehlow/Mehlow-R (CoffeeLake-S): Trunk Tatlow (RKL-S): Trunk Denverton: 05.10.12.0042 Snow Ridge: Trunk Graneville DE: 05.05.15.0038 Grangeville DE NS: 05.27.26.0023 Bakerville: 05.21.51.0026 Idaville: 05.44.27.0030 Whiskey Lake: Trunk Comet Lake-S: Trunk Tiger Lake H/UP3: 05.43.12.0052 Alder Lake: 05.44.23.0047 Gemini Lake: Not Affected Apollo Lake: Not Affected Elkhart Lake: 05.44.30.0018 AMD ROME: trunk MILAN: 05.36.10.0017 GENOA: 05.52.25.0006 Snowy Owl: Trunk R1000: 05.32.50.0018 R2000: 05.44.30.0005 V2000: Trunk V3000: 05.44.30.0007 Ryzen 5000: 05.44.30.0004 Embedded ROME: Trunk Embedded MILAN: Trunk Hygon Hygon #1/#2: 05.36.26.0016 Hygon #3: 05.44.26.0007 https://www.insyde.com/security-pledge/SA-2022060" }, { "lang": "es", "value": "Las comprobaciones incorrectas del puntero dentro del controlador FwBlockServiceSmm pueden permitir modificaciones arbitrarias de la RAM. Durante la revisi\u00f3n del controlador FwBlockServiceSmm, se podr\u00eda enga\u00f1ar a ciertas instancias de SpiAccessLib para que escriban 0xff en direcciones SMRAM y del sistema arbitrarias. Solucionado en: \nINTEL Purley-R: 05.21.51.0048 \nWhitley: 05.42.23.0066 \nCedar Island: 05.42.11.0021 \nEagle Stream: 05.44.25.0052 \nGreenlow/Greenlow-R(skylake/kabylake): Trunk \nMehlow/Mehlow-R (CoffeeLake-S) : Trunk \nTatlow (RKL-S): Trunk \nDenverton: 05.10.12.0042 \nSnow Ridge: Trunk \nGraneville DE: 05.05.15.0038 \nGrangeville DE NS: 05.27.26.0023 \nBakerville: 05.21.51.0026 \nIdaville: 05.44.27.0030 \nWhiskey Lake: Trunk \nComet Lake-S : Trunk \nTiger Lake H/UP3: 05.43.12.0052 \nAlder Lake: 05.44.23.0047 \nGemini Lake: No afectado \nApollo Lake: No afectado \nElkhart Lake: 05.44.30.0018 \nAMD ROMA: Trunk \nMILAN: 05.36.10.0017 \nG\u00c9NOVA: 05.52.25.0006 \nNival: Trunk \nR1000: 05.32.50.0018 \nR2000: 05.44.30.0005 \nV2000: Trunk \nV3000: 05.44.30.0007 \nRyzen 5000: 05.44.30.0004 Embedded \nROME: Trunk Embedded \nMILAN: Trunk \nHygon Hygon #1/#2: 05.36.2 6.0016 \nHygon #3: 05.44. 26.0007 \nhttps://www.insyde.com/security-pledge/SA-2022060" } ], "id": "CVE-2022-29277", "lastModified": "2024-11-21T06:58:51.380", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.0, "impactScore": 6.0, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2022-11-15T22:15:10.933", "references": [ { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "https://www.insyde.com/security-pledge" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "https://www.insyde.com/security-pledge/SA-2022060" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.insyde.com/security-pledge" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.insyde.com/security-pledge/SA-2022060" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-787" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
cve-2022-29277
Vulnerability from cvelistv5
Published
2022-11-15 00:00
Modified
2024-08-03 06:17
Severity ?
EPSS score ?
Summary
Incorrect pointer checks within the the FwBlockServiceSmm driver can allow arbitrary RAM modifications During review of the FwBlockServiceSmm driver, certain instances of SpiAccessLib could be tricked into writing 0xff to arbitrary system and SMRAM addresses. Fixed in: INTEL Purley-R: 05.21.51.0048 Whitley: 05.42.23.0066 Cedar Island: 05.42.11.0021 Eagle Stream: 05.44.25.0052 Greenlow/Greenlow-R(skylake/kabylake): Trunk Mehlow/Mehlow-R (CoffeeLake-S): Trunk Tatlow (RKL-S): Trunk Denverton: 05.10.12.0042 Snow Ridge: Trunk Graneville DE: 05.05.15.0038 Grangeville DE NS: 05.27.26.0023 Bakerville: 05.21.51.0026 Idaville: 05.44.27.0030 Whiskey Lake: Trunk Comet Lake-S: Trunk Tiger Lake H/UP3: 05.43.12.0052 Alder Lake: 05.44.23.0047 Gemini Lake: Not Affected Apollo Lake: Not Affected Elkhart Lake: 05.44.30.0018 AMD ROME: trunk MILAN: 05.36.10.0017 GENOA: 05.52.25.0006 Snowy Owl: Trunk R1000: 05.32.50.0018 R2000: 05.44.30.0005 V2000: Trunk V3000: 05.44.30.0007 Ryzen 5000: 05.44.30.0004 Embedded ROME: Trunk Embedded MILAN: Trunk Hygon Hygon #1/#2: 05.36.26.0016 Hygon #3: 05.44.26.0007 https://www.insyde.com/security-pledge/SA-2022060
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T06:17:54.724Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://www.insyde.com/security-pledge" }, { "tags": [ "x_transferred" ], "url": "https://www.insyde.com/security-pledge/SA-2022060" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "Incorrect pointer checks within the the FwBlockServiceSmm driver can allow arbitrary RAM modifications During review of the FwBlockServiceSmm driver, certain instances of SpiAccessLib could be tricked into writing 0xff to arbitrary system and SMRAM addresses. Fixed in: INTEL Purley-R: 05.21.51.0048 Whitley: 05.42.23.0066 Cedar Island: 05.42.11.0021 Eagle Stream: 05.44.25.0052 Greenlow/Greenlow-R(skylake/kabylake): Trunk Mehlow/Mehlow-R (CoffeeLake-S): Trunk Tatlow (RKL-S): Trunk Denverton: 05.10.12.0042 Snow Ridge: Trunk Graneville DE: 05.05.15.0038 Grangeville DE NS: 05.27.26.0023 Bakerville: 05.21.51.0026 Idaville: 05.44.27.0030 Whiskey Lake: Trunk Comet Lake-S: Trunk Tiger Lake H/UP3: 05.43.12.0052 Alder Lake: 05.44.23.0047 Gemini Lake: Not Affected Apollo Lake: Not Affected Elkhart Lake: 05.44.30.0018 AMD ROME: trunk MILAN: 05.36.10.0017 GENOA: 05.52.25.0006 Snowy Owl: Trunk R1000: 05.32.50.0018 R2000: 05.44.30.0005 V2000: Trunk V3000: 05.44.30.0007 Ryzen 5000: 05.44.30.0004 Embedded ROME: Trunk Embedded MILAN: Trunk Hygon Hygon #1/#2: 05.36.26.0016 Hygon #3: 05.44.26.0007 https://www.insyde.com/security-pledge/SA-2022060" } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-11-15T00:00:00", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "url": "https://www.insyde.com/security-pledge" }, { "url": "https://www.insyde.com/security-pledge/SA-2022060" } ], "source": { "discovery": "INTERNAL" } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2022-29277", "datePublished": "2022-11-15T00:00:00", "dateReserved": "2022-04-15T00:00:00", "dateUpdated": "2024-08-03T06:17:54.724Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }