CVE-2022-35897

An stack buffer overflow vulnerability leads to arbitrary code execution issue was discovered in Insyde InsydeH2O with kernel 5.0 through 5.5. If the attacker modifies specific UEFI variables, it can cause a stack overflow, leading to arbitrary code execution. The specific variables are normally locked (read-only) at the OS level and therefore an attack would require direct SPI modification. If an attacker can change the values of at least two variables out of three (SecureBootEnforce, SecureBoot, RestoreBootSettings), it is possible to execute arbitrary code.
References
Configurations

Configuration 1 (hide)

cpe:2.3:o:insyde:kernel:*:*:*:*:*:*:*:*

History

30 Nov 2022, 18:49

Type Values Removed Values Added
CPE cpe:2.3:o:insyde:kernel:*:*:*:*:*:*:*:*
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 6.8
References (MISC) https://www.insyde.com/security-pledge - (MISC) https://www.insyde.com/security-pledge - Vendor Advisory
References (MISC) https://www.insyde.com/security-pledge/SA-2022041 - (MISC) https://www.insyde.com/security-pledge/SA-2022041 - Vendor Advisory
CWE CWE-787

21 Nov 2022, 18:29

Type Values Removed Values Added
New CVE

Information

Published : 2022-11-21 17:15

Updated : 2024-02-04 23:14


NVD link : CVE-2022-35897

Mitre link : CVE-2022-35897

CVE.ORG link : CVE-2022-35897


JSON object : View

Products Affected

insyde

  • kernel
CWE
CWE-787

Out-of-bounds Write