First published: Tue May 28 2024(Updated: )
Various Issues Due To Exposed SMI Handler in AmdPspP2CmboxV2. The first issue can be leveraged to bypass the protections that have been put in place by previous UEFI phases to prevent direct access to the SPI flash. The second issue can be used to both leak and corrupt SMM memory thus potentially leading code execution in SMM
Credit: psirt@huawei.com
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
Huawei Curiem-wfg9b | =curiem-wfg9b_bios_2.28 | |
Huawei Curiem-wfg9b Firmware |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-52711 has been assessed with a critical severity due to the potential for SMI handler exposure and memory corruption.
To mitigate CVE-2023-52711, it is essential to update the affected Huawei Curiem-wfg9b BIOS to version 2.28 or apply relevant security patches.
Exploitation of CVE-2023-52711 can lead to unauthorized access to SPI flash and potential leakage or corruption of SMM memory.
The vulnerable device associated with CVE-2023-52711 is the Huawei Curiem-wfg9b with BIOS version 2.28.
As of now, there are no reported instances of active exploitation for CVE-2023-52711, but caution is advised.