First published: Thu Sep 22 2022(Updated: )
An issue was discovered in Insyde InsydeH2O with kernel 5.0 through 5.5. An SMM callout vulnerability in the SMM driver in UsbLegacyControlSmm leads to possible arbitrary code execution in SMM and escalation of privileges. An attacker could overwrite the function pointers in the EFI_BOOT_SERVICES table before the USB SMI handler triggers. (This is not exploitable from code running in the operating system.)
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Insyde InsydeH2O | >=5.1<5.17.38 | |
Insyde InsydeH2O | >=5.2<05.27.28 | |
Insyde InsydeH2O | >=5.3<05.36.28 | |
Insyde InsydeH2O | >=5.4<05.44.28 | |
Insyde InsydeH2O | >=5.5<05.52.28 | |
Insyde InsydeH2O | >=5.0<05.09.38 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-35408 is a vulnerability in Insyde InsydeH2O with kernel 5.0 through 5.5 that allows for possible arbitrary code execution and privilege escalation.
CVE-2022-35408 occurs due to an SMM callout vulnerability in the SMM driver in UsbLegacyControlSmm, which can be exploited by overwriting the function pointers in the EFI_BOOT_SERVICES table.
CVE-2022-35408 has a severity score of 8.2, indicating a high severity level.
CVE-2022-35408 affects Insyde InsydeH2O versions 5.0 through 5.5.
To fix CVE-2022-35408, it is recommended to apply the necessary patches and updates provided by InsydeH2O.