First published: Fri Apr 26 2024(Updated: )
An issue was discovered in PnpSmm in Insyde InsydeH2O with kernel 5.0 through 5.6. There is a possible out-of-bounds access in the SMM communication buffer, leading to tampering. The PNP-related SMI sub-functions do not verify data size before getting it from the communication buffer, which could lead to possible circumstances where the data immediately following the command buffer could be destroyed with a fixed value. This is fixed in kernel 5.2 v05.28.45, kernel 5.3 v05.37.45, kernel 5.4 v05.45.45, kernel 5.5 v05.53.45, and kernel 5.6 v05.60.45.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Insyde H2O | >=5.0<=5.6 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-47252 has a high severity rating due to its potential for out-of-bounds access, leading to data tampering.
To fix CVE-2023-47252, you should update your InsydeH2O firmware to the latest version that resolves this vulnerability.
CVE-2023-47252 affects Insyde InsydeH2O versions from 5.0 to 5.6.
CVE-2023-47252 is an out-of-bounds access vulnerability related to SMM communication buffer handling.
The vendor for CVE-2023-47252 is Insyde Software, responsible for the InsydeH2O UEFI BIOS.