All the vulnerabilites related to amd - snowy_owl_r2000_firmware
Vulnerability from fkie_nvd
Published
2022-11-15 22:15
Modified
2024-11-21 06:58
Summary
Incorrect pointer checks within the the FwBlockServiceSmm driver can allow arbitrary RAM modifications During review of the FwBlockServiceSmm driver, certain instances of SpiAccessLib could be tricked into writing 0xff to arbitrary system and SMRAM addresses. Fixed in: INTEL Purley-R: 05.21.51.0048 Whitley: 05.42.23.0066 Cedar Island: 05.42.11.0021 Eagle Stream: 05.44.25.0052 Greenlow/Greenlow-R(skylake/kabylake): Trunk Mehlow/Mehlow-R (CoffeeLake-S): Trunk Tatlow (RKL-S): Trunk Denverton: 05.10.12.0042 Snow Ridge: Trunk Graneville DE: 05.05.15.0038 Grangeville DE NS: 05.27.26.0023 Bakerville: 05.21.51.0026 Idaville: 05.44.27.0030 Whiskey Lake: Trunk Comet Lake-S: Trunk Tiger Lake H/UP3: 05.43.12.0052 Alder Lake: 05.44.23.0047 Gemini Lake: Not Affected Apollo Lake: Not Affected Elkhart Lake: 05.44.30.0018 AMD ROME: trunk MILAN: 05.36.10.0017 GENOA: 05.52.25.0006 Snowy Owl: Trunk R1000: 05.32.50.0018 R2000: 05.44.30.0005 V2000: Trunk V3000: 05.44.30.0007 Ryzen 5000: 05.44.30.0004 Embedded ROME: Trunk Embedded MILAN: Trunk Hygon Hygon #1/#2: 05.36.26.0016 Hygon #3: 05.44.26.0007 https://www.insyde.com/security-pledge/SA-2022060
Impacted products
Vendor Product Version
amd genoa_firmware *
amd genoa -
amd hygon_1_firmware *
amd hygon_1 -
amd hygon_2_firmware *
amd hygon_2 -
amd hygon_3_firmware *
amd hygon_3 -
amd milan_firmware *
amd milan -
amd milan_firmware *
amd milan -
amd rome_firmware *
amd rome -
amd rome_firmware *
amd rome -
amd ryzen_5300g_firmware *
amd ryzen_5300g -
amd ryzen_5300ge_firmware *
amd ryzen_5300ge -
amd ryzen_5600g_firmware *
amd ryzen_5600g -
amd ryzen_5600ge_firmware *
amd ryzen_5600ge -
amd ryzen_5600x_firmware *
amd ryzen_5600x -
amd ryzen_5700g_firmware *
amd ryzen_5700g -
amd ryzen_5700ge_firmware *
amd ryzen_5700ge -
amd ryzen_5800x_firmware *
amd ryzen_5800x -
amd ryzen_5800x3d_firmware *
amd ryzen_5800x3d -
amd ryzen_5900x_firmware *
amd ryzen_5900x -
amd ryzen_5950x_firmware *
amd ryzen_5950x -
amd snowy_owl_r1000_firmware *
amd snowy_owl_r1000 -
amd snowy_owl_r2000_firmware *
amd snowy_owl_r2000 -
amd snowy_owl_v2000_firmware *
amd snowy_owl_v2000 -
amd snowy_owl_v3000_firmware *
amd snowy_owl_v3000 -
intel alder_lake_firmware *
intel alder_lake -
intel bakerville_firmware *
intel bakerville -
intel cedar_island_firmware *
intel cedar_island -
intel idaville_firmware *
intel idaville -
intel comet_lake-s_firmware *
intel comet_lake-s -
intel tiger_lake_h\/up3_firmware *
intel tiger_lake_h\/up3 -
intel whiskey_lake_firmware *
intel whiskey_lake -
intel denverton_firmware *
intel denverton -
intel eagle_stream_firmware *
intel eagle_stream -
intel grangeville_de_ns_firmware *
intel grangeville_de_ns -
intel granville_de_firmware *
intel granville_de -
intel greenlow_firmware *
intel greenlow -
intel greenlow-r_firmware *
intel greenlow-r -
intel mehlow_firmware *
intel mehlow -
intel mehlow-r_firmware *
intel mehlow-r -
intel tatlow_firmware *
intel tatlow -
intel purley-r_firmware *
intel purley-r -
intel whitley_firmware *
intel whitley -



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:genoa_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "FCC60EFA-7174-4E91-A33F-794935B12334",
              "versionEndExcluding": "05.52.25.0006",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:genoa:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "90592BBD-A547-41D5-9696-D93392467417",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:hygon_1_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "05922CE9-07BA-43C8-9B7E-344F9AACEC8E",
              "versionEndExcluding": "05.36.26.0016",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:hygon_1:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B1E855A2-4673-41C3-8966-8BE1225B4117",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:hygon_2_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "B9BFD1DF-1C4A-44D6-8E34-AA357AD99C0C",
              "versionEndExcluding": "05.36.26.0016",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:hygon_2:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "ED45EDED-9C4E-4D94-9101-AC52AAC3DA88",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:hygon_3_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "A4879580-095C-4503-8D81-5CCE09B6CEB4",
              "versionEndExcluding": "05.44.26.0007",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:hygon_3:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B569C92C-0C16-4F5E-92F4-CF6502131A3A",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:milan_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "B638FCDF-0ADD-4815-BD0A-3157D212A130",
              "versionEndExcluding": "05.36.10.0017",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:milan:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "89C2BBB6-469A-48A4-85EB-A6BBD21AA27F",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:milan_firmware:*:*:*:*:embedded:*:*:*",
              "matchCriteriaId": "29F98F52-0086-4F25-8CBB-909DD79A2D71",
              "versionEndExcluding": "05.36.26.0016",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:milan:-:*:*:*:embedded:*:*:*",
              "matchCriteriaId": "59B0388D-7B0E-439F-896B-A4E08F657606",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:rome_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "E55655FF-21B7-4602-9C4D-3CC0320CEF99",
              "versionEndExcluding": "05.36.10.0017",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:rome:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "39415311-BEFC-4507-8964-75C393381633",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:rome_firmware:*:*:*:*:embedded:*:*:*",
              "matchCriteriaId": "2F29A768-8EF1-4F50-A78D-56BC9BE41484",
              "versionEndExcluding": "05.36.26.0016",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:rome:-:*:*:*:embedded:*:*:*",
              "matchCriteriaId": "95D58B14-392D-4F65-8FF0-199867D3D2BB",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_5300g_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "96C827CD-61BA-4FA8-886C-08815FA83D4A",
              "versionEndExcluding": "05.44.30.0004",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_5300g:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3D857EFE-B24E-4228-BB1E-34F9BC763A11",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_5300ge_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "C252F160-6CBE-42EC-A6AC-82F932348A55",
              "versionEndExcluding": "05.44.30.0004",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_5300ge:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F6CC472B-1502-402D-B2AC-8A63A69F2A27",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_5600g_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "73443456-6425-46B1-A602-A326B410FE7A",
              "versionEndExcluding": "05.44.30.0004",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_5600g:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8937FABB-B60E-4780-BB6D-B1B99DD69219",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_5600ge_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "4D29447B-3FF9-4B29-AA00-5179E54A2991",
              "versionEndExcluding": "05.44.30.0004",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_5600ge:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3B83F1F6-64B1-40D3-817A-E27CEB2E93EC",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_5600x_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "07E151CD-DED7-4900-8346-7CC60447A3D5",
              "versionEndExcluding": "05.44.30.0004",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_5600x:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A6CE435D-B9E9-43D6-AFBC-74E258DC4DFA",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_5700g_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "C14D153C-8CC3-40B2-B694-08C4FBB67A8C",
              "versionEndExcluding": "05.44.30.0004",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_5700g:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "20F5FCF8-FDDA-43F6-AFFD-1874DB2BB806",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_5700ge_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "47E4A102-1306-481F-96D5-3F677FE54152",
              "versionEndExcluding": "05.44.30.0004",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_5700ge:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CA1A9BEC-27AB-40AD-BBED-4420451D3793",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_5800x_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "D1FF208E-2271-440D-9398-2807CBF87233",
              "versionEndExcluding": "05.44.30.0004",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_5800x:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "48F6B331-4C0F-49FF-A39F-381B9ADE3483",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_5800x3d_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "CA8CD6DB-42C5-4584-8E22-090614949DF3",
              "versionEndExcluding": "05.44.30.0004",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_5800x3d:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "238EA54F-4809-4D8F-9F18-71135FED9D05",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_5900x_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "7872EB6C-5C3D-4804-9934-53BD91A0B88E",
              "versionEndExcluding": "05.44.30.0004",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_5900x:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "050C802C-D8C7-4D58-BA6E-AC48EEF25215",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_5950x_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "48018BD4-08DF-4D87-A6AD-251236FD673E",
              "versionEndExcluding": "05.44.30.0004",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_5950x:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BD9478CC-DF88-4833-BBB2-2D82D9BBFA63",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:snowy_owl_r1000_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "5E840A2C-A5BA-4054-A932-07B1AED61C3E",
              "versionEndExcluding": "05.32.50.0018",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:snowy_owl_r1000:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7AA109B5-E052-4944-AA5C-96B6E8842902",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:snowy_owl_r2000_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "2CFD31CB-623F-46E9-B181-AC5D96349A47",
              "versionEndExcluding": "05.44.30.0005",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:snowy_owl_r2000:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1963FD6B-57F6-4CDC-A92B-20079526ACB0",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:snowy_owl_v2000_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "4A998C25-E37C-4987-AFBE-91AA6F324A0E",
              "versionEndExcluding": "05.44.30.0007",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:snowy_owl_v2000:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5EACEBA7-F35C-4FCD-B146-4E1A274B8E3B",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:snowy_owl_v3000_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "669E1226-DA98-4A6B-BF79-602258AAFC80",
              "versionEndExcluding": "05.44.30.0007",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:snowy_owl_v3000:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "61FA4046-4CD6-4592-B972-1C2ADD4978D1",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:alder_lake_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "5A94F47D-AC22-44FF-A9F9-B3709D5A0897",
              "versionEndExcluding": "05.44.23.0047",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:alder_lake:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E39D7884-8579-4B0C-BC50-66DFE48583A5",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:bakerville_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "9238729D-BE76-4DDE-B3BC-04AA0E96EDF7",
              "versionEndExcluding": "05.21.51.0026",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:bakerville:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6DBB308D-E36F-4ECD-8DFF-3784FCECDBEC",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:cedar_island_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "C9165049-02FB-436E-84CD-0F1C9376CF5D",
              "versionEndExcluding": "05.42.11.0021",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:cedar_island:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3EEA11CC-5BB3-41FF-AAC5-2A74C3E862F2",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:idaville_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "01F0F8C2-28B8-4670-A47F-999B98A2F6CB",
              "versionEndExcluding": "05.43.12.0052",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:idaville:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "25C6C611-A06F-4855-B224-C05CD6EBA88F",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:comet_lake-s_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "CB35619B-30AB-4F2F-BBE9-B382AB2A20A2",
              "versionEndExcluding": "05.43.12.0052",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:comet_lake-s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "20A2F526-3B6E-433A-9CCC-471686292193",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:tiger_lake_h\\/up3_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "5984089E-3004-476E-A0EA-8B745EDB5D8C",
              "versionEndExcluding": "05.43.12.0052",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:tiger_lake_h\\/up3:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D856B7FC-16F1-490E-AB0C-14FFB14718A7",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:whiskey_lake_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "489E0210-427F-4D52-B184-B908EC13325F",
              "versionEndExcluding": "05.43.12.0052",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:whiskey_lake:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "66A81E2D-E1A6-4B0F-B7F3-C76927598E1C",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:denverton_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "E1978C90-172F-49AE-8F2C-C5FEDAFF9F30",
              "versionEndExcluding": "05.10.12.0042",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:denverton:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A70CCE3F-ED5E-4186-84C7-69B58839E386",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:eagle_stream_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "B2FB3A30-921A-45AF-AE16-9C3BCECB1125",
              "versionEndExcluding": "05.44.25.0052",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:eagle_stream:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9F85CBD5-5CE0-4A52-8996-4674CF17D5CC",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:grangeville_de_ns_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "C665AF80-C500-4A94-BD6C-8A4ECB8FB64E",
              "versionEndExcluding": "05.27.26.0023",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:grangeville_de_ns:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "64D791A1-0735-4C4C-A0BB-D2D96790C3F9",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:granville_de_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "EF2F487C-0A2C-4828-88D1-04C5C98AD56A",
              "versionEndExcluding": "05.05.15.0038",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:granville_de:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F4270D4E-9FC2-475B-93BD-A5CB6D565B28",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:greenlow_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "17DFAFE0-1E3E-408C-9FD6-7174C07CF909",
              "versionEndExcluding": "05.10.12.0042",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:greenlow:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "44431D1A-D10F-414D-A400-0C5C4F06F99C",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:greenlow-r_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "C5B3B4F7-A7D4-4BC1-9A18-B71298FF4C52",
              "versionEndExcluding": "05.10.12.0042",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:greenlow-r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "401E968C-3B59-4200-953F-0050DBA90E46",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:mehlow_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "7B7BD8DE-932E-4EA7-A010-E1B18AA8E982",
              "versionEndExcluding": "05.10.12.0042",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:mehlow:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9DBE1F12-551F-4AEF-81A1-E6A588C1C45F",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:mehlow-r_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "41AFCB8E-A4D9-4A0C-9088-57BA643E05A5",
              "versionEndExcluding": "05.10.12.0042",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:mehlow-r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C701B92D-AF94-459B-BC6A-612111555231",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:tatlow_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "97883F64-02E6-46C8-A70B-A01E120A0FF3",
              "versionEndExcluding": "05.10.12.0042",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:tatlow:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "84719A8D-75B1-42F7-A568-F7FD501F8B1F",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:purley-r_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "7EDB05C1-3989-4E5F-A560-0E3A8449124D",
              "versionEndExcluding": "05.21.51.0048",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:purley-r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "43D86D5A-334F-418F-88BE-2A24B06E80A6",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:whitley_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "354D107D-B11F-4A10-A50B-8C22E5B93C16",
              "versionEndExcluding": "05.42.23.0066",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:whitley:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F449054E-C729-485F-B5FA-AA49FF0D0294",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Incorrect pointer checks within the the FwBlockServiceSmm driver can allow arbitrary RAM modifications During review of the FwBlockServiceSmm driver, certain instances of SpiAccessLib could be tricked into writing 0xff to arbitrary system and SMRAM addresses. Fixed in: INTEL Purley-R: 05.21.51.0048 Whitley: 05.42.23.0066 Cedar Island: 05.42.11.0021 Eagle Stream: 05.44.25.0052 Greenlow/Greenlow-R(skylake/kabylake): Trunk Mehlow/Mehlow-R (CoffeeLake-S): Trunk Tatlow (RKL-S): Trunk Denverton: 05.10.12.0042 Snow Ridge: Trunk Graneville DE: 05.05.15.0038 Grangeville DE NS: 05.27.26.0023 Bakerville: 05.21.51.0026 Idaville: 05.44.27.0030 Whiskey Lake: Trunk Comet Lake-S: Trunk Tiger Lake H/UP3: 05.43.12.0052 Alder Lake: 05.44.23.0047 Gemini Lake: Not Affected Apollo Lake: Not Affected Elkhart Lake: 05.44.30.0018 AMD ROME: trunk MILAN: 05.36.10.0017 GENOA: 05.52.25.0006 Snowy Owl: Trunk R1000: 05.32.50.0018 R2000: 05.44.30.0005 V2000: Trunk V3000: 05.44.30.0007 Ryzen 5000: 05.44.30.0004 Embedded ROME: Trunk Embedded MILAN: Trunk Hygon Hygon #1/#2: 05.36.26.0016 Hygon #3: 05.44.26.0007 https://www.insyde.com/security-pledge/SA-2022060"
    },
    {
      "lang": "es",
      "value": "Las comprobaciones incorrectas del puntero dentro del controlador FwBlockServiceSmm pueden permitir modificaciones arbitrarias de la RAM. Durante la revisi\u00f3n del controlador FwBlockServiceSmm, se podr\u00eda enga\u00f1ar a ciertas instancias de SpiAccessLib para que escriban 0xff en direcciones SMRAM y del sistema arbitrarias. Solucionado en: \nINTEL Purley-R: 05.21.51.0048 \nWhitley: 05.42.23.0066 \nCedar Island: 05.42.11.0021 \nEagle Stream: 05.44.25.0052 \nGreenlow/Greenlow-R(skylake/kabylake): Trunk \nMehlow/Mehlow-R (CoffeeLake-S) : Trunk \nTatlow (RKL-S): Trunk \nDenverton: 05.10.12.0042 \nSnow Ridge: Trunk \nGraneville DE: 05.05.15.0038 \nGrangeville DE NS: 05.27.26.0023 \nBakerville: 05.21.51.0026 \nIdaville: 05.44.27.0030 \nWhiskey Lake: Trunk \nComet Lake-S : Trunk \nTiger Lake H/UP3: 05.43.12.0052 \nAlder Lake: 05.44.23.0047 \nGemini Lake: No afectado \nApollo Lake: No afectado \nElkhart Lake: 05.44.30.0018 \nAMD ROMA: Trunk \nMILAN: 05.36.10.0017 \nG\u00c9NOVA: 05.52.25.0006 \nNival: Trunk \nR1000: 05.32.50.0018 \nR2000: 05.44.30.0005 \nV2000: Trunk \nV3000: 05.44.30.0007 \nRyzen 5000: 05.44.30.0004 Embedded \nROME: Trunk Embedded \nMILAN: Trunk \nHygon Hygon #1/#2: 05.36.2 6.0016 \nHygon #3: 05.44. 26.0007 \nhttps://www.insyde.com/security-pledge/SA-2022060"
    }
  ],
  "id": "CVE-2022-29277",
  "lastModified": "2024-11-21T06:58:51.380",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 8.8,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "LOW",
          "scope": "CHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 2.0,
        "impactScore": 6.0,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2022-11-15T22:15:10.933",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.insyde.com/security-pledge"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.insyde.com/security-pledge/SA-2022060"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.insyde.com/security-pledge"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.insyde.com/security-pledge/SA-2022060"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-787"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

cve-2022-29277
Vulnerability from cvelistv5
Published
2022-11-15 00:00
Modified
2024-08-03 06:17
Severity ?
Summary
Incorrect pointer checks within the the FwBlockServiceSmm driver can allow arbitrary RAM modifications During review of the FwBlockServiceSmm driver, certain instances of SpiAccessLib could be tricked into writing 0xff to arbitrary system and SMRAM addresses. Fixed in: INTEL Purley-R: 05.21.51.0048 Whitley: 05.42.23.0066 Cedar Island: 05.42.11.0021 Eagle Stream: 05.44.25.0052 Greenlow/Greenlow-R(skylake/kabylake): Trunk Mehlow/Mehlow-R (CoffeeLake-S): Trunk Tatlow (RKL-S): Trunk Denverton: 05.10.12.0042 Snow Ridge: Trunk Graneville DE: 05.05.15.0038 Grangeville DE NS: 05.27.26.0023 Bakerville: 05.21.51.0026 Idaville: 05.44.27.0030 Whiskey Lake: Trunk Comet Lake-S: Trunk Tiger Lake H/UP3: 05.43.12.0052 Alder Lake: 05.44.23.0047 Gemini Lake: Not Affected Apollo Lake: Not Affected Elkhart Lake: 05.44.30.0018 AMD ROME: trunk MILAN: 05.36.10.0017 GENOA: 05.52.25.0006 Snowy Owl: Trunk R1000: 05.32.50.0018 R2000: 05.44.30.0005 V2000: Trunk V3000: 05.44.30.0007 Ryzen 5000: 05.44.30.0004 Embedded ROME: Trunk Embedded MILAN: Trunk Hygon Hygon #1/#2: 05.36.26.0016 Hygon #3: 05.44.26.0007 https://www.insyde.com/security-pledge/SA-2022060
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-03T06:17:54.724Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://www.insyde.com/security-pledge"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://www.insyde.com/security-pledge/SA-2022060"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Incorrect pointer checks within the the FwBlockServiceSmm driver can allow arbitrary RAM modifications During review of the FwBlockServiceSmm driver, certain instances of SpiAccessLib could be tricked into writing 0xff to arbitrary system and SMRAM addresses. Fixed in: INTEL Purley-R: 05.21.51.0048 Whitley: 05.42.23.0066 Cedar Island: 05.42.11.0021 Eagle Stream: 05.44.25.0052 Greenlow/Greenlow-R(skylake/kabylake): Trunk Mehlow/Mehlow-R (CoffeeLake-S): Trunk Tatlow (RKL-S): Trunk Denverton: 05.10.12.0042 Snow Ridge: Trunk Graneville DE: 05.05.15.0038 Grangeville DE NS: 05.27.26.0023 Bakerville: 05.21.51.0026 Idaville: 05.44.27.0030 Whiskey Lake: Trunk Comet Lake-S: Trunk Tiger Lake H/UP3: 05.43.12.0052 Alder Lake: 05.44.23.0047 Gemini Lake: Not Affected Apollo Lake: Not Affected Elkhart Lake: 05.44.30.0018 AMD ROME: trunk MILAN: 05.36.10.0017 GENOA: 05.52.25.0006 Snowy Owl: Trunk R1000: 05.32.50.0018 R2000: 05.44.30.0005 V2000: Trunk V3000: 05.44.30.0007 Ryzen 5000: 05.44.30.0004 Embedded ROME: Trunk Embedded MILAN: Trunk Hygon Hygon #1/#2: 05.36.26.0016 Hygon #3: 05.44.26.0007 https://www.insyde.com/security-pledge/SA-2022060"
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2022-11-15T00:00:00",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "url": "https://www.insyde.com/security-pledge"
        },
        {
          "url": "https://www.insyde.com/security-pledge/SA-2022060"
        }
      ],
      "source": {
        "discovery": "INTERNAL"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2022-29277",
    "datePublished": "2022-11-15T00:00:00",
    "dateReserved": "2022-04-15T00:00:00",
    "dateUpdated": "2024-08-03T06:17:54.724Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}