First published: Tue Sep 20 2022(Updated: )
A potential attacker can execute an arbitrary code at the time of the PEI phase and influence the subsequent boot stages. This can lead to the mitigations bypassing, physical memory contents disclosure, discovery of any secrets from any Virtual Machines (VMs) and bypassing memory isolation and confidential computing boundaries. Additionally, an attacker can build a payload which can be injected into the SMRAM memory. This issue affects: Module name: S3Resume2Pei SHA256: 7bb29f05534a8a1e010443213451425098faebd45948a4642db969b19d0253fc Module GUID: 89E549B0-7CFE-449D-9BA3-10D8B2312D71
Credit: cret@cert.org
Affected Software | Affected Version | How to fix |
---|---|---|
Ami Aptio V | =5.0 | |
Intel Server Board M10jnp2sb Firmware | ||
Intel Server Board M10jnp2sb |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2022-40262 is high with a severity value of 8.2.
An attacker can execute arbitrary code during the PEI phase to influence the subsequent boot stages and bypass mitigations, disclose physical memory contents, discover secrets from virtual machines, and bypass memory isolation and configuration.
The Ami Aptio V version 5.0 and Intel Server Board M10jnp2sb Firmware are affected by CVE-2022-40262.
Yes, an attacker can bypass memory isolation and configuration with CVE-2022-40262.
To mitigate CVE-2022-40262, it is recommended to apply the latest security updates and patches provided by the affected software vendors.