BDU:2025-09301
Vulnerability from fstec - Published: 15.04.2025
VLAI Severity ?
Title
Уязвимость функции SwSmiInputValue() обработчика System Management Interrupt (SMI) микропрограммного обеспечения материнских плат Gigabyte, позволяющая нарушителю обойти ограничения безопасности, повысить свои привилегии и выполнить произвольный код
Description
Уязвимость функции SwSmiInputValue() обработчика System Management Interrupt (SMI) микропрограммного обеспечения материнских плат Gigabyte связана с разыменованием недоверенного указателя. Эксплуатация уязвимости может позволить нарушителю обойти ограничения безопасности, повысить свои привилегии и выполнить произвольный код
Severity ?
Vendor
Gigabyte Technology Co., Ltd.
Software Name
GA-H110M-S2HP, GA-H110M-S2V, GA-H110M-S2H, GA-B150M-DS3H DDR3, GA-H110M-S2V DDR3, GA-H110M-S2 DDR3, G1.Sniper M7, GA-B150-HD3P, GA-H110M-DS2 DDR3, GA-H110M-D3H, GA-H110M-D3H R2 TPM, GA-H110M-D3H R2, GA-B150-HD3 DDR3, GA-H110-D3A, GA-B150M-Gaming, GA-H110M-DS2 (rev. 1.0/1.1/1.2), GA-H110M-DS2V DDR3, GA-B150M-DS3H, GA-H110M-DS2, GA-B150M-D2V, GA-H110TN-E, GA-B150N-GSM, GA-B150M-D3V DDR3, GA-H110M-S2PV, GA-H110M-S2PT, GA-H110M-S2H DDR3, GA-H110MSTX-HD3-ZK, GA-B150M-D3H, GA-H110TN-M, GA-H110TN-CM, GA-B150-HD3, GA-H110M-A, GA-H110M-H (rev. 1.0/1.1/1.2), GA-H110M-M.2, GA-B150M-D3H DDR3, GA-B150M-D3V, GA-B150M-D2V DDR3, GA-H110M-Gaming 3, GA-X150M-PRO ECC, GA-H110M-S2, GA-H110N, GA-H110M-WW, G1.Sniper B7, GA-H110M-H DDR3, GA-H110-D3, GA-H110M-S2PV DDR3, GA-H110M-S2PH DDR3, GA-B150N Phoenix-WIFI, GA-B150N Phoenix, GA-X170-EXTREME ECC, GA-H110M-DS2V, GA-B150M-DS3P, GA-B150M-HD3, GA-H110M-S2PH, GA-B150M-HD3 DDR3
Software Version
F22f (2024-07-31) (GA-H110M-S2HP), F26a (2024-07-31) (GA-H110M-S2V), F26g (2024-07-31) (GA-H110M-S2H), F21f (2024-07-31) (GA-B150M-DS3H DDR3), F21e (2024-07-31) (GA-H110M-S2V DDR3), F20g (2024-07-31) (GA-H110M-S2 DDR3), F20h (2024-07-31) (G1.Sniper M7), F24h (2024-07-31) (GA-B150-HD3P), F20g (2024-07-31) (GA-H110M-DS2 DDR3), F22f (2024-07-31) (GA-H110M-D3H), F22e (2024-07-31) (GA-H110M-D3H R2 TPM), F24a (2024-07-31) (GA-H110M-D3H R2), F20h (2024-07-31) (GA-B150-HD3 DDR3), F26a (2024-07-31) (GA-H110-D3A), F20h (2024-07-31) (GA-B150M-Gaming), F28b (2024-07-31) (GA-H110M-DS2 (rev. 1.0/1.1/1.2)), F22a (2024-07-31) (GA-H110M-DS2V DDR3), F22h (2024-07-31) (GA-B150M-DS3H), FCa (2024-07-31) (GA-H110M-DS2), F22f (2024-07-31) (GA-B150M-D2V), F23f (2024-07-31) (GA-H110TN-E), F24b (2024-07-31) (GA-B150N-GSM), F20h (2024-07-31) (GA-B150M-D3V DDR3), F26a (2024-07-31) (GA-H110M-S2PV), F25a (2024-07-31) (GA-H110M-S2PT), F21a (2024-07-31) (GA-H110M-S2H DDR3), F26a (2024-07-31) (GA-H110MSTX-HD3-ZK), F25d (2024-07-31) (GA-B150M-D3H), F23f (2024-07-31) (GA-H110TN-M), F26a (2024-07-31) (GA-H110TN-CM), F23f (2024-07-31) (GA-B150-HD3), F25a (2024-07-31) (GA-H110M-A), F28a (2024-07-31) (GA-H110M-H (rev. 1.0/1.1/1.2)), F25a (2024-07-31) (GA-H110M-M.2), F21a (2024-07-31) (GA-B150M-D3H DDR3), F22f (2024-07-31) (GA-B150M-D3V), F20g (2024-07-31) (GA-B150M-D2V DDR3), F26a (2024-07-31) (GA-H110M-Gaming 3), F22i (2024-08-14) (GA-X150M-PRO ECC), F27b (2024-07-31) (GA-H110M-S2), F25a (2024-07-31) (GA-H110N), F25a (2024-07-31) (GA-H110M-WW), F22g (2024-07-31) (G1.Sniper B7), F25a (2024-07-31) (GA-H110M-H DDR3), F25a (2024-07-31) (GA-H110-D3), F20g (2024-07-31) (GA-H110M-S2PV DDR3), F20g (2024-07-31) (GA-H110M-S2PH DDR3), F22f (2024-07-31) (GA-B150N Phoenix-WIFI), F20h (2024-07-31) (GA-B150N Phoenix), F21h (2024-08-01) (GA-X170-EXTREME ECC), F25b (2024-07-31) (GA-H110M-DS2V), F22f (2024-07-31) (GA-B150M-DS3P), F22g (2024-07-31) (GA-B150M-HD3), F28b (2024-07-31) (GA-H110M-S2PH), F20i (2024-07-31) (GA-B150M-HD3 DDR3)
Possible Mitigations
Использование рекомендаций производителя:
https://www.gigabyte.com/Support/Security/2302
Reference
https://www.gigabyte.com/Support/Security/2302
https://vuldb.com/?id.316181
https://www.binarly.io/advisories/brly-dva-2025-011
CWE
CWE-822
{
"CVSS 2.0": "AV:L/AC:L/Au:S/C:C/I:C/A:C",
"CVSS 3.0": "AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H",
"CVSS 4.0": null,
"remediation_\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440": null,
"remediation_\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435": null,
"\u0412\u0435\u043d\u0434\u043e\u0440 \u041f\u041e": "Gigabyte Technology Co., Ltd.",
"\u0412\u0435\u0440\u0441\u0438\u044f \u041f\u041e": "F22f (2024-07-31) (GA-H110M-S2HP), F26a (2024-07-31) (GA-H110M-S2V), F26g (2024-07-31) (GA-H110M-S2H), F21f (2024-07-31) (GA-B150M-DS3H DDR3), F21e (2024-07-31) (GA-H110M-S2V DDR3), F20g (2024-07-31) (GA-H110M-S2 DDR3), F20h (2024-07-31) (G1.Sniper M7), F24h (2024-07-31) (GA-B150-HD3P), F20g (2024-07-31) (GA-H110M-DS2 DDR3), F22f (2024-07-31) (GA-H110M-D3H), F22e (2024-07-31) (GA-H110M-D3H R2 TPM), F24a (2024-07-31) (GA-H110M-D3H R2), F20h (2024-07-31) (GA-B150-HD3 DDR3), F26a (2024-07-31) (GA-H110-D3A), F20h (2024-07-31) (GA-B150M-Gaming), F28b (2024-07-31) (GA-H110M-DS2 (rev. 1.0/1.1/1.2)), F22a (2024-07-31) (GA-H110M-DS2V DDR3), F22h (2024-07-31) (GA-B150M-DS3H), FCa (2024-07-31) (GA-H110M-DS2), F22f (2024-07-31) (GA-B150M-D2V), F23f (2024-07-31) (GA-H110TN-E), F24b (2024-07-31) (GA-B150N-GSM), F20h (2024-07-31) (GA-B150M-D3V DDR3), F26a (2024-07-31) (GA-H110M-S2PV), F25a (2024-07-31) (GA-H110M-S2PT), F21a (2024-07-31) (GA-H110M-S2H DDR3), F26a (2024-07-31) (GA-H110MSTX-HD3-ZK), F25d (2024-07-31) (GA-B150M-D3H), F23f (2024-07-31) (GA-H110TN-M), F26a (2024-07-31) (GA-H110TN-CM), F23f (2024-07-31) (GA-B150-HD3), F25a (2024-07-31) (GA-H110M-A), F28a (2024-07-31) (GA-H110M-H (rev. 1.0/1.1/1.2)), F25a (2024-07-31) (GA-H110M-M.2), F21a (2024-07-31) (GA-B150M-D3H DDR3), F22f (2024-07-31) (GA-B150M-D3V), F20g (2024-07-31) (GA-B150M-D2V DDR3), F26a (2024-07-31) (GA-H110M-Gaming 3), F22i (2024-08-14) (GA-X150M-PRO ECC), F27b (2024-07-31) (GA-H110M-S2), F25a (2024-07-31) (GA-H110N), F25a (2024-07-31) (GA-H110M-WW), F22g (2024-07-31) (G1.Sniper B7), F25a (2024-07-31) (GA-H110M-H DDR3), F25a (2024-07-31) (GA-H110-D3), F20g (2024-07-31) (GA-H110M-S2PV DDR3), F20g (2024-07-31) (GA-H110M-S2PH DDR3), F22f (2024-07-31) (GA-B150N Phoenix-WIFI), F20h (2024-07-31) (GA-B150N Phoenix), F21h (2024-08-01) (GA-X170-EXTREME ECC), F25b (2024-07-31) (GA-H110M-DS2V), F22f (2024-07-31) (GA-B150M-DS3P), F22g (2024-07-31) (GA-B150M-HD3), F28b (2024-07-31) (GA-H110M-S2PH), F20i (2024-07-31) (GA-B150M-HD3 DDR3)",
"\u0412\u043e\u0437\u043c\u043e\u0436\u043d\u044b\u0435 \u043c\u0435\u0440\u044b \u043f\u043e \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u044e": "\u0418\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u0435 \u0440\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0430\u0446\u0438\u0439 \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u0434\u0438\u0442\u0435\u043b\u044f:\nhttps://www.gigabyte.com/Support/Security/2302",
"\u0414\u0430\u0442\u0430 \u0432\u044b\u044f\u0432\u043b\u0435\u043d\u0438\u044f": "15.04.2025",
"\u0414\u0430\u0442\u0430 \u043f\u043e\u0441\u043b\u0435\u0434\u043d\u0435\u0433\u043e \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u044f": "01.08.2025",
"\u0414\u0430\u0442\u0430 \u043f\u0443\u0431\u043b\u0438\u043a\u0430\u0446\u0438\u0438": "01.08.2025",
"\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440": "BDU:2025-09301",
"\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440\u044b \u0434\u0440\u0443\u0433\u0438\u0445 \u0441\u0438\u0441\u0442\u0435\u043c \u043e\u043f\u0438\u0441\u0430\u043d\u0438\u0439 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "CVE-2025-7029",
"\u0418\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u044f \u043e\u0431 \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0430",
"\u041a\u043b\u0430\u0441\u0441 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u043a\u043e\u0434\u0430",
"\u041d\u0430\u0437\u0432\u0430\u043d\u0438\u0435 \u041f\u041e": "GA-H110M-S2HP, GA-H110M-S2V, GA-H110M-S2H, GA-B150M-DS3H DDR3, GA-H110M-S2V DDR3, GA-H110M-S2 DDR3, G1.Sniper M7, GA-B150-HD3P, GA-H110M-DS2 DDR3, GA-H110M-D3H, GA-H110M-D3H R2 TPM, GA-H110M-D3H R2, GA-B150-HD3 DDR3, GA-H110-D3A, GA-B150M-Gaming, GA-H110M-DS2 (rev. 1.0/1.1/1.2), GA-H110M-DS2V DDR3, GA-B150M-DS3H, GA-H110M-DS2, GA-B150M-D2V, GA-H110TN-E, GA-B150N-GSM, GA-B150M-D3V DDR3, GA-H110M-S2PV, GA-H110M-S2PT, GA-H110M-S2H DDR3, GA-H110MSTX-HD3-ZK, GA-B150M-D3H, GA-H110TN-M, GA-H110TN-CM, GA-B150-HD3, GA-H110M-A, GA-H110M-H (rev. 1.0/1.1/1.2), GA-H110M-M.2, GA-B150M-D3H DDR3, GA-B150M-D3V, GA-B150M-D2V DDR3, GA-H110M-Gaming 3, GA-X150M-PRO ECC, GA-H110M-S2, GA-H110N, GA-H110M-WW, G1.Sniper B7, GA-H110M-H DDR3, GA-H110-D3, GA-H110M-S2PV DDR3, GA-H110M-S2PH DDR3, GA-B150N Phoenix-WIFI, GA-B150N Phoenix, GA-X170-EXTREME ECC, GA-H110M-DS2V, GA-B150M-DS3P, GA-B150M-HD3, GA-H110M-S2PH, GA-B150M-HD3 DDR3",
"\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435 \u041e\u0421 \u0438 \u0442\u0438\u043f \u0430\u043f\u043f\u0430\u0440\u0430\u0442\u043d\u043e\u0439 \u043f\u043b\u0430\u0442\u0444\u043e\u0440\u043c\u044b": null,
"\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0444\u0443\u043d\u043a\u0446\u0438\u0438 SwSmiInputValue() \u043e\u0431\u0440\u0430\u0431\u043e\u0442\u0447\u0438\u043a\u0430 System Management Interrupt (SMI) \u043c\u0438\u043a\u0440\u043e\u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f \u043c\u0430\u0442\u0435\u0440\u0438\u043d\u0441\u043a\u0438\u0445 \u043f\u043b\u0430\u0442 Gigabyte, \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u044e\u0449\u0430\u044f \u043d\u0430\u0440\u0443\u0448\u0438\u0442\u0435\u043b\u044e \u043e\u0431\u043e\u0439\u0442\u0438 \u043e\u0433\u0440\u0430\u043d\u0438\u0447\u0435\u043d\u0438\u044f \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438, \u043f\u043e\u0432\u044b\u0441\u0438\u0442\u044c \u0441\u0432\u043e\u0438 \u043f\u0440\u0438\u0432\u0438\u043b\u0435\u0433\u0438\u0438 \u0438 \u0432\u044b\u043f\u043e\u043b\u043d\u0438\u0442\u044c \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u043b\u044c\u043d\u044b\u0439 \u043a\u043e\u0434",
"\u041d\u0430\u043b\u0438\u0447\u0438\u0435 \u044d\u043a\u0441\u043f\u043b\u043e\u0439\u0442\u0430": "\u0421\u0443\u0449\u0435\u0441\u0442\u0432\u0443\u0435\u0442 \u0432 \u043e\u0442\u043a\u0440\u044b\u0442\u043e\u043c \u0434\u043e\u0441\u0442\u0443\u043f\u0435",
"\u041e\u043f\u0438\u0441\u0430\u043d\u0438\u0435 \u043e\u0448\u0438\u0431\u043a\u0438 CWE": "\u041d\u0435\u043d\u0430\u0434\u0435\u0436\u043d\u043e\u0435 \u0440\u0430\u0437\u044b\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435 \u0443\u043a\u0430\u0437\u0430\u0442\u0435\u043b\u044f (CWE-822)",
"\u041e\u043f\u0438\u0441\u0430\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0444\u0443\u043d\u043a\u0446\u0438\u0438 SwSmiInputValue() \u043e\u0431\u0440\u0430\u0431\u043e\u0442\u0447\u0438\u043a\u0430 System Management Interrupt (SMI) \u043c\u0438\u043a\u0440\u043e\u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f \u043c\u0430\u0442\u0435\u0440\u0438\u043d\u0441\u043a\u0438\u0445 \u043f\u043b\u0430\u0442 Gigabyte \u0441\u0432\u044f\u0437\u0430\u043d\u0430 \u0441 \u0440\u0430\u0437\u044b\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435\u043c \u043d\u0435\u0434\u043e\u0432\u0435\u0440\u0435\u043d\u043d\u043e\u0433\u043e \u0443\u043a\u0430\u0437\u0430\u0442\u0435\u043b\u044f. \u042d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u044f \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u043c\u043e\u0436\u0435\u0442 \u043f\u043e\u0437\u0432\u043e\u043b\u0438\u0442\u044c \u043d\u0430\u0440\u0443\u0448\u0438\u0442\u0435\u043b\u044e \u043e\u0431\u043e\u0439\u0442\u0438 \u043e\u0433\u0440\u0430\u043d\u0438\u0447\u0435\u043d\u0438\u044f \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438, \u043f\u043e\u0432\u044b\u0441\u0438\u0442\u044c \u0441\u0432\u043e\u0438 \u043f\u0440\u0438\u0432\u0438\u043b\u0435\u0433\u0438\u0438 \u0438 \u0432\u044b\u043f\u043e\u043b\u043d\u0438\u0442\u044c \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u043b\u044c\u043d\u044b\u0439 \u043a\u043e\u0434",
"\u041f\u043e\u0441\u043b\u0435\u0434\u0441\u0442\u0432\u0438\u044f \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": null,
"\u041f\u0440\u043e\u0447\u0430\u044f \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u044f": null,
"\u0421\u0432\u044f\u0437\u044c \u0441 \u0438\u043d\u0446\u0438\u0434\u0435\u043d\u0442\u0430\u043c\u0438 \u0418\u0411": "\u0414\u0430\u043d\u043d\u044b\u0435 \u0443\u0442\u043e\u0447\u043d\u044f\u044e\u0442\u0441\u044f",
"\u0421\u043e\u0441\u0442\u043e\u044f\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u041e\u043f\u0443\u0431\u043b\u0438\u043a\u043e\u0432\u0430\u043d\u0430",
"\u0421\u043f\u043e\u0441\u043e\u0431 \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u044f": "\u041e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0435 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f",
"\u0421\u043f\u043e\u0441\u043e\u0431 \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438": "\u041c\u0430\u043d\u0438\u043f\u0443\u043b\u0438\u0440\u043e\u0432\u0430\u043d\u0438\u0435 \u0441\u0442\u0440\u0443\u043a\u0442\u0443\u0440\u0430\u043c\u0438 \u0434\u0430\u043d\u043d\u044b\u0445",
"\u0421\u0441\u044b\u043b\u043a\u0438 \u043d\u0430 \u0438\u0441\u0442\u043e\u0447\u043d\u0438\u043a\u0438": "https://www.gigabyte.com/Support/Security/2302\nhttps://vuldb.com/?id.316181\nhttps://www.binarly.io/advisories/brly-dva-2025-011",
"\u0421\u0442\u0430\u0442\u0443\u0441 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u041f\u043e\u0434\u0442\u0432\u0435\u0440\u0436\u0434\u0435\u043d\u0430 \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u0434\u0438\u0442\u0435\u043b\u0435\u043c",
"\u0422\u0438\u043f \u041f\u041e": "\u041c\u0438\u043a\u0440\u043e\u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u044b\u0439 \u043a\u043e\u0434",
"\u0422\u0438\u043f \u043e\u0448\u0438\u0431\u043a\u0438 CWE": "CWE-822",
"\u0423\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0421\u0440\u0435\u0434\u043d\u0438\u0439 \u0443\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 (\u0431\u0430\u0437\u043e\u0432\u0430\u044f \u043e\u0446\u0435\u043d\u043a\u0430 CVSS 2.0 \u0441\u043e\u0441\u0442\u0430\u0432\u043b\u044f\u0435\u0442 6,8)\n\u0412\u044b\u0441\u043e\u043a\u0438\u0439 \u0443\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 (\u0431\u0430\u0437\u043e\u0432\u0430\u044f \u043e\u0446\u0435\u043d\u043a\u0430 CVSS 3.1 \u0441\u043e\u0441\u0442\u0430\u0432\u043b\u044f\u0435\u0442 8,2)"
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…