All the vulnerabilites related to intel - mehlow
Vulnerability from fkie_nvd
Published
2021-11-03 01:15
Modified
2024-11-21 05:34
Severity ?
Summary
An issue was discovered in Int15MicrocodeSmm in Insyde InsydeH2O before 2021-10-14 on Intel client chipsets. A caller may be able to escalate privileges.
References
▼ | URL | Tags | |
---|---|---|---|
cve@mitre.org | https://security.netapp.com/advisory/ntap-20220223-0003/ | Third Party Advisory | |
cve@mitre.org | https://www.insyde.com/products | Product, Vendor Advisory | |
cve@mitre.org | https://www.insyde.com/security-pledge/SA-2021002 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://security.netapp.com/advisory/ntap-20220223-0003/ | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.insyde.com/products | Product, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.insyde.com/security-pledge/SA-2021002 | Vendor Advisory |
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:insyde:insydeh2o_uefi_bios:*:*:*:*:*:*:*:*", "matchCriteriaId": "49B10F08-8822-419B-BE72-9B0F0FDBA89C", "versionEndExcluding": "05.32.30.0001", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:ice_lake:-:*:*:*:*:*:*:*", "matchCriteriaId": "B9827649-F3DA-4197-8641-05B12431D434", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:insyde:insydeh2o_uefi_bios:*:*:*:*:*:*:*:*", "matchCriteriaId": "8440F3DC-D7AE-4EAE-9112-A01A762F46E0", "versionEndExcluding": "05.41.35.0001", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:tiger_lake:-:*:*:*:*:*:*:*", "matchCriteriaId": "986A1A76-AA3C-4397-BFAE-29A3103CD412", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:insyde:insydeh2o_uefi_bios:*:*:*:*:*:*:*:*", "matchCriteriaId": "6E1C4703-C877-472C-954F-119D8EB7866F", "versionEndExcluding": "05.42.11.0026", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:whitley-sp:-:*:*:*:*:*:*:*", "matchCriteriaId": "84B00972-4647-4DB3-BA0E-F58C9ADD1DB9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:insyde:insydeh2o_uefi_bios:*:*:*:*:*:*:*:*", "matchCriteriaId": "830C9C4E-5CF4-4F84-A92B-2176AE509C88", "versionEndExcluding": "05.04.21.0068", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:grantley-ep:-:*:*:*:*:*:*:*", "matchCriteriaId": "07CF50C6-6DC2-4058-8F5B-3E33C734B86A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:insyde:insydeh2o_uefi_bios:*:*:*:*:*:*:*:*", "matchCriteriaId": "45F8BEBA-0C8B-4699-ADCB-56885B6F0B44", "versionEndExcluding": "05.42.09.0003", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:elkhart_lake:-:*:*:*:*:*:*:*", "matchCriteriaId": "3B58C169-F3F2-4B41-962A-0FB92B207E05", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:insyde:insydeh2o_uefi_bios:*:*:*:*:*:*:*:*", "matchCriteriaId": "610A6535-8169-4CAB-B022-14368CFBB2A0", "versionEndExcluding": "05.21.51.0040", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:purley-ep_refresh_neon_city:-:*:*:*:*:*:*:*", "matchCriteriaId": "88C7EDAC-EBE0-48FC-9950-0B32709B9CE7", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:insyde:insydeh2o_uefi_bios:*:*:*:*:*:*:*:*", "matchCriteriaId": "AFD6BD59-D5C8-4213-BE9D-75EB9BBFA805", "versionEndExcluding": "05.34.09.0030", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:comet_lake_rvp:-:*:*:*:embedded:*:*:*", "matchCriteriaId": "8CE71A90-4BEE-4069-A833-AB48F90B8D4C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:insyde:insydeh2o_uefi_bios:*:*:*:*:*:*:*:*", "matchCriteriaId": "AFD6BD59-D5C8-4213-BE9D-75EB9BBFA805", "versionEndExcluding": "05.34.09.0030", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:comet_lake_rvp:-:*:*:*:server:*:*:*", "matchCriteriaId": "1C719D29-A53A-4306-BBFD-DD9593690FEE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:insyde:insydeh2o_uefi_bios:*:*:*:*:*:*:*:*", "matchCriteriaId": "01B35D63-9DBA-4BAE-97E0-853571AC058F", "versionEndExcluding": "05.32.47.0001", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:comet_lake:-:*:*:*:client:*:*:*", "matchCriteriaId": "F39F745E-46B0-4218-9D70-9E5F0B0FE712", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:insyde:insydeh2o_uefi_bios:*:*:*:*:*:*:*:*", "matchCriteriaId": "280A6232-C93A-4412-A064-D452AE893195", "versionEndExcluding": "05.23.45.0023", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:whiskey_lake_rvp:-:*:*:*:embedded:*:*:*", "matchCriteriaId": "C750C54A-FF27-4E5D-948E-EC45CB3E173D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:insyde:insydeh2o_uefi_bios:*:*:*:*:*:*:*:*", "matchCriteriaId": "280A6232-C93A-4412-A064-D452AE893195", "versionEndExcluding": "05.23.45.0023", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:whiskey_lake_rvp:-:*:*:*:server:*:*:*", "matchCriteriaId": "17A03701-8970-4EBE-B558-11D1A7D78BD1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:insyde:insydeh2o_uefi_bios:*:*:*:*:*:*:*:*", "matchCriteriaId": "3FFD82F7-0C18-4C74-B11A-95C15E4257C9", "versionEndExcluding": "05.21.43.0001", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:whiskey_lake:-:*:*:*:client:*:*:*", "matchCriteriaId": "F8A01C84-AE70-494A-A66D-61BD219A0AA3", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:insyde:insydeh2o_uefi_bios:*:*:*:*:*:*:*:*", "matchCriteriaId": "62789BFF-C9FF-44DB-945C-99589420A1D2", "versionEndExcluding": "05.23.04.0045", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:mehlow:-:*:*:*:embedded:*:*:*", "matchCriteriaId": "5087D8BD-9C5D-4B90-94B1-0EF734AD81E4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:insyde:insydeh2o_uefi_bios:*:*:*:*:*:*:*:*", "matchCriteriaId": "62789BFF-C9FF-44DB-945C-99589420A1D2", "versionEndExcluding": "05.23.04.0045", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:mehlow-r:-:*:*:*:embedded:*:*:*", "matchCriteriaId": "354D0BAE-82FB-4E64-B206-D7420E8856D7", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:insyde:insydeh2o_uefi_bios:*:*:*:*:*:*:*:*", "matchCriteriaId": "62789BFF-C9FF-44DB-945C-99589420A1D2", "versionEndExcluding": "05.23.04.0045", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:mehlow-r:-:*:*:*:server:*:*:*", "matchCriteriaId": "B8F5C48C-7F5B-4992-8152-49728D6DB995", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:insyde:insydeh2o_uefi_bios:*:*:*:*:*:*:*:*", "matchCriteriaId": "62789BFF-C9FF-44DB-945C-99589420A1D2", "versionEndExcluding": "05.23.04.0045", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:mehlow:-:*:*:*:server:*:*:*", "matchCriteriaId": "69B8125F-E78E-4074-BA32-14460F55B5C7", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:insyde:insydeh2o_uefi_bios:*:*:*:*:*:*:*:*", "matchCriteriaId": "3FFD82F7-0C18-4C74-B11A-95C15E4257C9", "versionEndExcluding": "05.21.43.0001", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:coffee_lake:-:*:*:*:client:*:*:*", "matchCriteriaId": "04621E54-7E61-4706-B97D-EDC5669C0C55", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:insyde:insydeh2o_uefi_bios:*:*:*:*:*:*:*:*", "matchCriteriaId": "3FFD82F7-0C18-4C74-B11A-95C15E4257C9", "versionEndExcluding": "05.21.43.0001", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:cannon_lake:-:*:*:*:*:*:*:*", "matchCriteriaId": "9F825206-FB87-4DC2-B37A-9CCD1FEE4E96", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:insyde:insydeh2o_uefi_bios:*:*:*:*:*:*:*:*", "matchCriteriaId": "09456E7A-46AA-43D7-ABF5-651472387BE5", "versionEndExcluding": "05.11.26.0015", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:kaby_lake_mrd:-:*:*:*:*:*:*:*", "matchCriteriaId": "47F89003-B752-4D2C-A403-92D0BB5BAFA5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:insyde:insydeh2o_uefi_bios:*:*:*:*:*:*:*:*", "matchCriteriaId": "D4E6AFF2-0CA3-4361-9EDE-78C1786452CA", "versionEndExcluding": "05.12.09.0075", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:greenlow:-:*:*:*:embedded:*:*:*", "matchCriteriaId": "9926BF3D-78E2-457D-A428-CC7907B28D8B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:insyde:insydeh2o_uefi_bios:*:*:*:*:*:*:*:*", "matchCriteriaId": "D4E6AFF2-0CA3-4361-9EDE-78C1786452CA", "versionEndExcluding": "05.12.09.0075", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:greenlow-r:-:*:*:*:*:*:*:*", "matchCriteriaId": "401E968C-3B59-4200-953F-0050DBA90E46", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:insyde:insydeh2o_uefi_bios:*:*:*:*:*:*:*:*", "matchCriteriaId": "D4E6AFF2-0CA3-4361-9EDE-78C1786452CA", "versionEndExcluding": "05.12.09.0075", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:greenlow:-:*:*:*:server:*:*:*", "matchCriteriaId": "7217CA4C-2C31-40B5-9BDF-74ECC241CC0D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:insyde:insydeh2o_uefi_bios:*:*:*:*:*:*:*:*", "matchCriteriaId": "D4E6AFF2-0CA3-4361-9EDE-78C1786452CA", "versionEndExcluding": "05.12.09.0075", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:greenlow-r:-:*:*:*:embedded:*:*:*", "matchCriteriaId": "EC92BE81-62A8-4732-B73F-A29CA1B36B12", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:insyde:insydeh2o_uefi_bios:*:*:*:*:*:*:*:*", "matchCriteriaId": "69A69D67-E130-4602-BC13-35A73263A6FC", "versionEndExcluding": "05.10.48.0001", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:kaby_lake:-:*:*:*:client:*:*:*", "matchCriteriaId": "48A18996-C8E8-48D4-A176-9C912F46C8DD", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:insyde:insydeh2o_uefi_bios:*:*:*:*:*:*:*:*", "matchCriteriaId": "517F7ACF-C762-44F9-ACAC-A2204CEB5C42", "versionEndExcluding": "05.05.39.0001", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:skylake_mrd:-:*:*:*:*:*:*:*", "matchCriteriaId": "463588A2-53C5-45B6-B07B-9D261F43AEDA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:insyde:insydeh2o_uefi_bios:*:*:*:*:*:*:*:*", "matchCriteriaId": "74DC7C5E-921F-4BEA-B0B7-86463C782669", "versionEndExcluding": "05.04.15.0001", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:skylake:-:*:*:*:*:*:*:*", "matchCriteriaId": "4607961C-25DF-499E-A713-D101FE995F1B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:insyde:insydeh2o_uefi_bios:*:*:*:*:*:*:*:*", "matchCriteriaId": "17BF510F-2795-434C-B0A4-B80539D415B2", "versionEndExcluding": "05.23.27.0001", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:coffee_lake:-:*:*:*:*:*:*:*", "matchCriteriaId": "26FB314D-1062-4CA8-A5E9-6EFB612D8DB3", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:insyde:insydeh2o_uefi_bios:*:*:*:*:*:*:*:*", "matchCriteriaId": "17BF510F-2795-434C-B0A4-B80539D415B2", "versionEndExcluding": "05.23.27.0001", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:whiskey_lake:-:*:*:*:*:*:*:*", "matchCriteriaId": "66A81E2D-E1A6-4B0F-B7F3-C76927598E1C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "An issue was discovered in Int15MicrocodeSmm in Insyde InsydeH2O before 2021-10-14 on Intel client chipsets. A caller may be able to escalate privileges." }, { "lang": "es", "value": "Se ha detectado un problema en Int15MicrocodeSmm en Insyde InsydeH2O versiones anteriores al 14-10-2021 en los chipsets de cliente de Intel. Un llamador puede ser capaz de escalar privilegios" } ], "id": "CVE-2020-5955", "lastModified": "2024-11-21T05:34:53.753", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2021-11-03T01:15:06.930", "references": [ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20220223-0003/" }, { "source": "cve@mitre.org", "tags": [ "Product", "Vendor Advisory" ], "url": "https://www.insyde.com/products" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "https://www.insyde.com/security-pledge/SA-2021002" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20220223-0003/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Product", "Vendor Advisory" ], "url": "https://www.insyde.com/products" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.insyde.com/security-pledge/SA-2021002" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2022-11-15 22:15
Modified
2024-11-21 06:58
Severity ?
Summary
Incorrect pointer checks within the the FwBlockServiceSmm driver can allow arbitrary RAM modifications During review of the FwBlockServiceSmm driver, certain instances of SpiAccessLib could be tricked into writing 0xff to arbitrary system and SMRAM addresses. Fixed in: INTEL Purley-R: 05.21.51.0048 Whitley: 05.42.23.0066 Cedar Island: 05.42.11.0021 Eagle Stream: 05.44.25.0052 Greenlow/Greenlow-R(skylake/kabylake): Trunk Mehlow/Mehlow-R (CoffeeLake-S): Trunk Tatlow (RKL-S): Trunk Denverton: 05.10.12.0042 Snow Ridge: Trunk Graneville DE: 05.05.15.0038 Grangeville DE NS: 05.27.26.0023 Bakerville: 05.21.51.0026 Idaville: 05.44.27.0030 Whiskey Lake: Trunk Comet Lake-S: Trunk Tiger Lake H/UP3: 05.43.12.0052 Alder Lake: 05.44.23.0047 Gemini Lake: Not Affected Apollo Lake: Not Affected Elkhart Lake: 05.44.30.0018 AMD ROME: trunk MILAN: 05.36.10.0017 GENOA: 05.52.25.0006 Snowy Owl: Trunk R1000: 05.32.50.0018 R2000: 05.44.30.0005 V2000: Trunk V3000: 05.44.30.0007 Ryzen 5000: 05.44.30.0004 Embedded ROME: Trunk Embedded MILAN: Trunk Hygon Hygon #1/#2: 05.36.26.0016 Hygon #3: 05.44.26.0007 https://www.insyde.com/security-pledge/SA-2022060
References
▼ | URL | Tags | |
---|---|---|---|
cve@mitre.org | https://www.insyde.com/security-pledge | Vendor Advisory | |
cve@mitre.org | https://www.insyde.com/security-pledge/SA-2022060 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.insyde.com/security-pledge | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.insyde.com/security-pledge/SA-2022060 | Vendor Advisory |
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:genoa_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "FCC60EFA-7174-4E91-A33F-794935B12334", "versionEndExcluding": "05.52.25.0006", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:genoa:-:*:*:*:*:*:*:*", "matchCriteriaId": "90592BBD-A547-41D5-9696-D93392467417", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:hygon_1_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "05922CE9-07BA-43C8-9B7E-344F9AACEC8E", "versionEndExcluding": "05.36.26.0016", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:hygon_1:-:*:*:*:*:*:*:*", "matchCriteriaId": "B1E855A2-4673-41C3-8966-8BE1225B4117", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:hygon_2_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B9BFD1DF-1C4A-44D6-8E34-AA357AD99C0C", "versionEndExcluding": "05.36.26.0016", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:hygon_2:-:*:*:*:*:*:*:*", "matchCriteriaId": "ED45EDED-9C4E-4D94-9101-AC52AAC3DA88", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:hygon_3_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A4879580-095C-4503-8D81-5CCE09B6CEB4", "versionEndExcluding": "05.44.26.0007", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:hygon_3:-:*:*:*:*:*:*:*", "matchCriteriaId": "B569C92C-0C16-4F5E-92F4-CF6502131A3A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:milan_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B638FCDF-0ADD-4815-BD0A-3157D212A130", "versionEndExcluding": "05.36.10.0017", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:milan:-:*:*:*:*:*:*:*", "matchCriteriaId": "89C2BBB6-469A-48A4-85EB-A6BBD21AA27F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:milan_firmware:*:*:*:*:embedded:*:*:*", "matchCriteriaId": "29F98F52-0086-4F25-8CBB-909DD79A2D71", "versionEndExcluding": "05.36.26.0016", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:milan:-:*:*:*:embedded:*:*:*", "matchCriteriaId": "59B0388D-7B0E-439F-896B-A4E08F657606", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:rome_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E55655FF-21B7-4602-9C4D-3CC0320CEF99", "versionEndExcluding": "05.36.10.0017", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:rome:-:*:*:*:*:*:*:*", "matchCriteriaId": "39415311-BEFC-4507-8964-75C393381633", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:rome_firmware:*:*:*:*:embedded:*:*:*", "matchCriteriaId": "2F29A768-8EF1-4F50-A78D-56BC9BE41484", "versionEndExcluding": "05.36.26.0016", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:rome:-:*:*:*:embedded:*:*:*", "matchCriteriaId": "95D58B14-392D-4F65-8FF0-199867D3D2BB", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5300g_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "96C827CD-61BA-4FA8-886C-08815FA83D4A", "versionEndExcluding": "05.44.30.0004", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5300g:-:*:*:*:*:*:*:*", "matchCriteriaId": "3D857EFE-B24E-4228-BB1E-34F9BC763A11", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5300ge_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C252F160-6CBE-42EC-A6AC-82F932348A55", "versionEndExcluding": "05.44.30.0004", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5300ge:-:*:*:*:*:*:*:*", "matchCriteriaId": "F6CC472B-1502-402D-B2AC-8A63A69F2A27", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5600g_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "73443456-6425-46B1-A602-A326B410FE7A", "versionEndExcluding": "05.44.30.0004", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5600g:-:*:*:*:*:*:*:*", "matchCriteriaId": "8937FABB-B60E-4780-BB6D-B1B99DD69219", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5600ge_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "4D29447B-3FF9-4B29-AA00-5179E54A2991", "versionEndExcluding": "05.44.30.0004", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5600ge:-:*:*:*:*:*:*:*", "matchCriteriaId": "3B83F1F6-64B1-40D3-817A-E27CEB2E93EC", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5600x_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "07E151CD-DED7-4900-8346-7CC60447A3D5", "versionEndExcluding": "05.44.30.0004", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5600x:-:*:*:*:*:*:*:*", "matchCriteriaId": "A6CE435D-B9E9-43D6-AFBC-74E258DC4DFA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5700g_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C14D153C-8CC3-40B2-B694-08C4FBB67A8C", "versionEndExcluding": "05.44.30.0004", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5700g:-:*:*:*:*:*:*:*", "matchCriteriaId": "20F5FCF8-FDDA-43F6-AFFD-1874DB2BB806", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5700ge_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "47E4A102-1306-481F-96D5-3F677FE54152", "versionEndExcluding": "05.44.30.0004", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5700ge:-:*:*:*:*:*:*:*", "matchCriteriaId": "CA1A9BEC-27AB-40AD-BBED-4420451D3793", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5800x_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D1FF208E-2271-440D-9398-2807CBF87233", "versionEndExcluding": "05.44.30.0004", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5800x:-:*:*:*:*:*:*:*", "matchCriteriaId": "48F6B331-4C0F-49FF-A39F-381B9ADE3483", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5800x3d_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "CA8CD6DB-42C5-4584-8E22-090614949DF3", "versionEndExcluding": "05.44.30.0004", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5800x3d:-:*:*:*:*:*:*:*", "matchCriteriaId": "238EA54F-4809-4D8F-9F18-71135FED9D05", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5900x_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "7872EB6C-5C3D-4804-9934-53BD91A0B88E", "versionEndExcluding": "05.44.30.0004", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5900x:-:*:*:*:*:*:*:*", "matchCriteriaId": "050C802C-D8C7-4D58-BA6E-AC48EEF25215", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5950x_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "48018BD4-08DF-4D87-A6AD-251236FD673E", "versionEndExcluding": "05.44.30.0004", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5950x:-:*:*:*:*:*:*:*", "matchCriteriaId": "BD9478CC-DF88-4833-BBB2-2D82D9BBFA63", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:snowy_owl_r1000_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "5E840A2C-A5BA-4054-A932-07B1AED61C3E", "versionEndExcluding": "05.32.50.0018", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:snowy_owl_r1000:-:*:*:*:*:*:*:*", "matchCriteriaId": "7AA109B5-E052-4944-AA5C-96B6E8842902", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:snowy_owl_r2000_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "2CFD31CB-623F-46E9-B181-AC5D96349A47", "versionEndExcluding": "05.44.30.0005", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:snowy_owl_r2000:-:*:*:*:*:*:*:*", "matchCriteriaId": "1963FD6B-57F6-4CDC-A92B-20079526ACB0", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:snowy_owl_v2000_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "4A998C25-E37C-4987-AFBE-91AA6F324A0E", "versionEndExcluding": "05.44.30.0007", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:snowy_owl_v2000:-:*:*:*:*:*:*:*", "matchCriteriaId": "5EACEBA7-F35C-4FCD-B146-4E1A274B8E3B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:snowy_owl_v3000_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "669E1226-DA98-4A6B-BF79-602258AAFC80", "versionEndExcluding": "05.44.30.0007", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:snowy_owl_v3000:-:*:*:*:*:*:*:*", "matchCriteriaId": "61FA4046-4CD6-4592-B972-1C2ADD4978D1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:alder_lake_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "5A94F47D-AC22-44FF-A9F9-B3709D5A0897", "versionEndExcluding": "05.44.23.0047", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:alder_lake:-:*:*:*:*:*:*:*", "matchCriteriaId": "E39D7884-8579-4B0C-BC50-66DFE48583A5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:bakerville_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "9238729D-BE76-4DDE-B3BC-04AA0E96EDF7", "versionEndExcluding": "05.21.51.0026", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:bakerville:-:*:*:*:*:*:*:*", "matchCriteriaId": "6DBB308D-E36F-4ECD-8DFF-3784FCECDBEC", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:cedar_island_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C9165049-02FB-436E-84CD-0F1C9376CF5D", "versionEndExcluding": "05.42.11.0021", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:cedar_island:-:*:*:*:*:*:*:*", "matchCriteriaId": "3EEA11CC-5BB3-41FF-AAC5-2A74C3E862F2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:idaville_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "01F0F8C2-28B8-4670-A47F-999B98A2F6CB", "versionEndExcluding": "05.43.12.0052", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:idaville:-:*:*:*:*:*:*:*", "matchCriteriaId": "25C6C611-A06F-4855-B224-C05CD6EBA88F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:comet_lake-s_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "CB35619B-30AB-4F2F-BBE9-B382AB2A20A2", "versionEndExcluding": "05.43.12.0052", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:comet_lake-s:-:*:*:*:*:*:*:*", "matchCriteriaId": "20A2F526-3B6E-433A-9CCC-471686292193", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:tiger_lake_h\\/up3_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "5984089E-3004-476E-A0EA-8B745EDB5D8C", "versionEndExcluding": "05.43.12.0052", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:tiger_lake_h\\/up3:-:*:*:*:*:*:*:*", "matchCriteriaId": "D856B7FC-16F1-490E-AB0C-14FFB14718A7", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:whiskey_lake_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "489E0210-427F-4D52-B184-B908EC13325F", "versionEndExcluding": "05.43.12.0052", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:whiskey_lake:-:*:*:*:*:*:*:*", "matchCriteriaId": "66A81E2D-E1A6-4B0F-B7F3-C76927598E1C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:denverton_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E1978C90-172F-49AE-8F2C-C5FEDAFF9F30", "versionEndExcluding": "05.10.12.0042", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:denverton:-:*:*:*:*:*:*:*", "matchCriteriaId": "A70CCE3F-ED5E-4186-84C7-69B58839E386", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:eagle_stream_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B2FB3A30-921A-45AF-AE16-9C3BCECB1125", "versionEndExcluding": "05.44.25.0052", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:eagle_stream:-:*:*:*:*:*:*:*", "matchCriteriaId": "9F85CBD5-5CE0-4A52-8996-4674CF17D5CC", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:grangeville_de_ns_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C665AF80-C500-4A94-BD6C-8A4ECB8FB64E", "versionEndExcluding": "05.27.26.0023", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:grangeville_de_ns:-:*:*:*:*:*:*:*", "matchCriteriaId": "64D791A1-0735-4C4C-A0BB-D2D96790C3F9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:granville_de_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "EF2F487C-0A2C-4828-88D1-04C5C98AD56A", "versionEndExcluding": "05.05.15.0038", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:granville_de:-:*:*:*:*:*:*:*", "matchCriteriaId": "F4270D4E-9FC2-475B-93BD-A5CB6D565B28", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:greenlow_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "17DFAFE0-1E3E-408C-9FD6-7174C07CF909", "versionEndExcluding": "05.10.12.0042", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:greenlow:-:*:*:*:*:*:*:*", "matchCriteriaId": "44431D1A-D10F-414D-A400-0C5C4F06F99C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:greenlow-r_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C5B3B4F7-A7D4-4BC1-9A18-B71298FF4C52", "versionEndExcluding": "05.10.12.0042", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:greenlow-r:-:*:*:*:*:*:*:*", "matchCriteriaId": "401E968C-3B59-4200-953F-0050DBA90E46", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:mehlow_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "7B7BD8DE-932E-4EA7-A010-E1B18AA8E982", "versionEndExcluding": "05.10.12.0042", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:mehlow:-:*:*:*:*:*:*:*", "matchCriteriaId": "9DBE1F12-551F-4AEF-81A1-E6A588C1C45F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:mehlow-r_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "41AFCB8E-A4D9-4A0C-9088-57BA643E05A5", "versionEndExcluding": "05.10.12.0042", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:mehlow-r:-:*:*:*:*:*:*:*", "matchCriteriaId": "C701B92D-AF94-459B-BC6A-612111555231", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:tatlow_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "97883F64-02E6-46C8-A70B-A01E120A0FF3", "versionEndExcluding": "05.10.12.0042", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:tatlow:-:*:*:*:*:*:*:*", "matchCriteriaId": "84719A8D-75B1-42F7-A568-F7FD501F8B1F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:purley-r_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "7EDB05C1-3989-4E5F-A560-0E3A8449124D", "versionEndExcluding": "05.21.51.0048", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:purley-r:-:*:*:*:*:*:*:*", "matchCriteriaId": "43D86D5A-334F-418F-88BE-2A24B06E80A6", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:whitley_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "354D107D-B11F-4A10-A50B-8C22E5B93C16", "versionEndExcluding": "05.42.23.0066", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:whitley:-:*:*:*:*:*:*:*", "matchCriteriaId": "F449054E-C729-485F-B5FA-AA49FF0D0294", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Incorrect pointer checks within the the FwBlockServiceSmm driver can allow arbitrary RAM modifications During review of the FwBlockServiceSmm driver, certain instances of SpiAccessLib could be tricked into writing 0xff to arbitrary system and SMRAM addresses. Fixed in: INTEL Purley-R: 05.21.51.0048 Whitley: 05.42.23.0066 Cedar Island: 05.42.11.0021 Eagle Stream: 05.44.25.0052 Greenlow/Greenlow-R(skylake/kabylake): Trunk Mehlow/Mehlow-R (CoffeeLake-S): Trunk Tatlow (RKL-S): Trunk Denverton: 05.10.12.0042 Snow Ridge: Trunk Graneville DE: 05.05.15.0038 Grangeville DE NS: 05.27.26.0023 Bakerville: 05.21.51.0026 Idaville: 05.44.27.0030 Whiskey Lake: Trunk Comet Lake-S: Trunk Tiger Lake H/UP3: 05.43.12.0052 Alder Lake: 05.44.23.0047 Gemini Lake: Not Affected Apollo Lake: Not Affected Elkhart Lake: 05.44.30.0018 AMD ROME: trunk MILAN: 05.36.10.0017 GENOA: 05.52.25.0006 Snowy Owl: Trunk R1000: 05.32.50.0018 R2000: 05.44.30.0005 V2000: Trunk V3000: 05.44.30.0007 Ryzen 5000: 05.44.30.0004 Embedded ROME: Trunk Embedded MILAN: Trunk Hygon Hygon #1/#2: 05.36.26.0016 Hygon #3: 05.44.26.0007 https://www.insyde.com/security-pledge/SA-2022060" }, { "lang": "es", "value": "Las comprobaciones incorrectas del puntero dentro del controlador FwBlockServiceSmm pueden permitir modificaciones arbitrarias de la RAM. Durante la revisi\u00f3n del controlador FwBlockServiceSmm, se podr\u00eda enga\u00f1ar a ciertas instancias de SpiAccessLib para que escriban 0xff en direcciones SMRAM y del sistema arbitrarias. Solucionado en: \nINTEL Purley-R: 05.21.51.0048 \nWhitley: 05.42.23.0066 \nCedar Island: 05.42.11.0021 \nEagle Stream: 05.44.25.0052 \nGreenlow/Greenlow-R(skylake/kabylake): Trunk \nMehlow/Mehlow-R (CoffeeLake-S) : Trunk \nTatlow (RKL-S): Trunk \nDenverton: 05.10.12.0042 \nSnow Ridge: Trunk \nGraneville DE: 05.05.15.0038 \nGrangeville DE NS: 05.27.26.0023 \nBakerville: 05.21.51.0026 \nIdaville: 05.44.27.0030 \nWhiskey Lake: Trunk \nComet Lake-S : Trunk \nTiger Lake H/UP3: 05.43.12.0052 \nAlder Lake: 05.44.23.0047 \nGemini Lake: No afectado \nApollo Lake: No afectado \nElkhart Lake: 05.44.30.0018 \nAMD ROMA: Trunk \nMILAN: 05.36.10.0017 \nG\u00c9NOVA: 05.52.25.0006 \nNival: Trunk \nR1000: 05.32.50.0018 \nR2000: 05.44.30.0005 \nV2000: Trunk \nV3000: 05.44.30.0007 \nRyzen 5000: 05.44.30.0004 Embedded \nROME: Trunk Embedded \nMILAN: Trunk \nHygon Hygon #1/#2: 05.36.2 6.0016 \nHygon #3: 05.44. 26.0007 \nhttps://www.insyde.com/security-pledge/SA-2022060" } ], "id": "CVE-2022-29277", "lastModified": "2024-11-21T06:58:51.380", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.0, "impactScore": 6.0, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2022-11-15T22:15:10.933", "references": [ { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "https://www.insyde.com/security-pledge" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "https://www.insyde.com/security-pledge/SA-2022060" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.insyde.com/security-pledge" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.insyde.com/security-pledge/SA-2022060" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-787" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
cve-2020-5955
Vulnerability from cvelistv5
Published
2021-11-03 00:19
Modified
2024-08-04 08:47
Severity ?
EPSS score ?
Summary
An issue was discovered in Int15MicrocodeSmm in Insyde InsydeH2O before 2021-10-14 on Intel client chipsets. A caller may be able to escalate privileges.
References
▼ | URL | Tags |
---|---|---|
https://www.insyde.com/products | x_refsource_MISC | |
https://www.insyde.com/security-pledge/SA-2021002 | x_refsource_CONFIRM | |
https://security.netapp.com/advisory/ntap-20220223-0003/ | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T08:47:40.942Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.insyde.com/products" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.insyde.com/security-pledge/SA-2021002" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://security.netapp.com/advisory/ntap-20220223-0003/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "An issue was discovered in Int15MicrocodeSmm in Insyde InsydeH2O before 2021-10-14 on Intel client chipsets. A caller may be able to escalate privileges." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-02-23T17:06:25", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://www.insyde.com/products" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.insyde.com/security-pledge/SA-2021002" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://security.netapp.com/advisory/ntap-20220223-0003/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2020-5955", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "An issue was discovered in Int15MicrocodeSmm in Insyde InsydeH2O before 2021-10-14 on Intel client chipsets. A caller may be able to escalate privileges." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.insyde.com/products", "refsource": "MISC", "url": "https://www.insyde.com/products" }, { "name": "https://www.insyde.com/security-pledge/SA-2021002", "refsource": "CONFIRM", "url": "https://www.insyde.com/security-pledge/SA-2021002" }, { "name": "https://security.netapp.com/advisory/ntap-20220223-0003/", "refsource": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20220223-0003/" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2020-5955", "datePublished": "2021-11-03T00:19:13", "dateReserved": "2020-01-06T00:00:00", "dateUpdated": "2024-08-04T08:47:40.942Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-29277
Vulnerability from cvelistv5
Published
2022-11-15 00:00
Modified
2024-08-03 06:17
Severity ?
EPSS score ?
Summary
Incorrect pointer checks within the the FwBlockServiceSmm driver can allow arbitrary RAM modifications During review of the FwBlockServiceSmm driver, certain instances of SpiAccessLib could be tricked into writing 0xff to arbitrary system and SMRAM addresses. Fixed in: INTEL Purley-R: 05.21.51.0048 Whitley: 05.42.23.0066 Cedar Island: 05.42.11.0021 Eagle Stream: 05.44.25.0052 Greenlow/Greenlow-R(skylake/kabylake): Trunk Mehlow/Mehlow-R (CoffeeLake-S): Trunk Tatlow (RKL-S): Trunk Denverton: 05.10.12.0042 Snow Ridge: Trunk Graneville DE: 05.05.15.0038 Grangeville DE NS: 05.27.26.0023 Bakerville: 05.21.51.0026 Idaville: 05.44.27.0030 Whiskey Lake: Trunk Comet Lake-S: Trunk Tiger Lake H/UP3: 05.43.12.0052 Alder Lake: 05.44.23.0047 Gemini Lake: Not Affected Apollo Lake: Not Affected Elkhart Lake: 05.44.30.0018 AMD ROME: trunk MILAN: 05.36.10.0017 GENOA: 05.52.25.0006 Snowy Owl: Trunk R1000: 05.32.50.0018 R2000: 05.44.30.0005 V2000: Trunk V3000: 05.44.30.0007 Ryzen 5000: 05.44.30.0004 Embedded ROME: Trunk Embedded MILAN: Trunk Hygon Hygon #1/#2: 05.36.26.0016 Hygon #3: 05.44.26.0007 https://www.insyde.com/security-pledge/SA-2022060
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T06:17:54.724Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://www.insyde.com/security-pledge" }, { "tags": [ "x_transferred" ], "url": "https://www.insyde.com/security-pledge/SA-2022060" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "Incorrect pointer checks within the the FwBlockServiceSmm driver can allow arbitrary RAM modifications During review of the FwBlockServiceSmm driver, certain instances of SpiAccessLib could be tricked into writing 0xff to arbitrary system and SMRAM addresses. Fixed in: INTEL Purley-R: 05.21.51.0048 Whitley: 05.42.23.0066 Cedar Island: 05.42.11.0021 Eagle Stream: 05.44.25.0052 Greenlow/Greenlow-R(skylake/kabylake): Trunk Mehlow/Mehlow-R (CoffeeLake-S): Trunk Tatlow (RKL-S): Trunk Denverton: 05.10.12.0042 Snow Ridge: Trunk Graneville DE: 05.05.15.0038 Grangeville DE NS: 05.27.26.0023 Bakerville: 05.21.51.0026 Idaville: 05.44.27.0030 Whiskey Lake: Trunk Comet Lake-S: Trunk Tiger Lake H/UP3: 05.43.12.0052 Alder Lake: 05.44.23.0047 Gemini Lake: Not Affected Apollo Lake: Not Affected Elkhart Lake: 05.44.30.0018 AMD ROME: trunk MILAN: 05.36.10.0017 GENOA: 05.52.25.0006 Snowy Owl: Trunk R1000: 05.32.50.0018 R2000: 05.44.30.0005 V2000: Trunk V3000: 05.44.30.0007 Ryzen 5000: 05.44.30.0004 Embedded ROME: Trunk Embedded MILAN: Trunk Hygon Hygon #1/#2: 05.36.26.0016 Hygon #3: 05.44.26.0007 https://www.insyde.com/security-pledge/SA-2022060" } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-11-15T00:00:00", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "url": "https://www.insyde.com/security-pledge" }, { "url": "https://www.insyde.com/security-pledge/SA-2022060" } ], "source": { "discovery": "INTERNAL" } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2022-29277", "datePublished": "2022-11-15T00:00:00", "dateReserved": "2022-04-15T00:00:00", "dateUpdated": "2024-08-03T06:17:54.724Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }