First published: Tue Nov 15 2022(Updated: )
In UsbCoreDxe, untrusted input may allow SMRAM or OS memory tampering Use of untrusted pointers could allow OS or SMRAM memory tampering leading to escalation of privileges. This issue was discovered by Insyde during security review. It was fixed in: Kernel 5.0: version 05.09.21 Kernel 5.1: version 05.17.21 Kernel 5.2: version 05.27.21 Kernel 5.3: version 05.36.21 Kernel 5.4: version 05.44.21 Kernel 5.5: version 05.52.21 https://www.insyde.com/security-pledge/SA-2022058
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Insyde Kernel | >=5.0<=5.0.05.09.21 | |
Insyde Kernel | >=5.1<5.1.05.17.21 | |
Insyde Kernel | >=5.2<5.2.05.27.21 | |
Insyde Kernel | >=5.3<5.3.05.36.21 | |
Insyde Kernel | >=5.4<5.4.05.44.21 | |
Insyde Kernel | >=5.5<5.5.05.52.21 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this issue is CVE-2022-29275.
The severity level of CVE-2022-29275 is high, with a CVSS score of 8.2.
The Insyde Kernel versions between 5.0.05.09.21 to 5.5.05.52.21 are affected by CVE-2022-29275.
CVE-2022-29275 could allow untrusted input to tamper with SMRAM or OS memory, leading to potential escalation of privileges.
More information about CVE-2022-29275 can be found at the Insyde Security Pledge page and SA-2022058 advisory.