CVE-2021-41841

An issue was discovered in AhciBusDxe in the kernel 5.0 through 5.5 in Insyde InsydeH2O. There is an SMM callout that allows an attacker to access the System Management Mode and execute arbitrary code. This occurs because of Inclusion of Functionality from an Untrusted Control Sphere.
Configurations

Configuration 1 (hide)

cpe:2.3:a:insyde:insydeh2o:*:*:*:*:*:*:*:*

Configuration 2 (hide)

cpe:2.3:a:insyde:insydeh2o:*:*:*:*:*:*:*:*

Configuration 3 (hide)

cpe:2.3:a:insyde:insydeh2o:*:*:*:*:*:*:*:*

Configuration 4 (hide)

cpe:2.3:a:insyde:insydeh2o:*:*:*:*:*:*:*:*

Configuration 5 (hide)

cpe:2.3:a:insyde:insydeh2o:*:*:*:*:*:*:*:*

Configuration 6 (hide)

cpe:2.3:a:insyde:insydeh2o:*:*:*:*:*:*:*:*

History

29 Mar 2022, 16:04

Type Values Removed Values Added
References (CONFIRM) https://cert-portal.siemens.com/productcert/pdf/ssa-306654.pdf - (CONFIRM) https://cert-portal.siemens.com/productcert/pdf/ssa-306654.pdf - Third Party Advisory
References (CONFIRM) https://security.netapp.com/advisory/ntap-20220217-0012/ - (CONFIRM) https://security.netapp.com/advisory/ntap-20220217-0012/ - Third Party Advisory

24 Feb 2022, 15:15

Type Values Removed Values Added
References
  • (CONFIRM) https://cert-portal.siemens.com/productcert/pdf/ssa-306654.pdf -

18 Feb 2022, 00:15

Type Values Removed Values Added
References
  • (CONFIRM) https://security.netapp.com/advisory/ntap-20220217-0012/ -

09 Feb 2022, 20:25

Type Values Removed Values Added
CPE cpe:2.3:a:insyde:insydeh2o:*:*:*:*:*:*:*:*
CWE CWE-829
References (MISC) https://www.insyde.com/security-pledge - (MISC) https://www.insyde.com/security-pledge - Vendor Advisory
References (MISC) https://www.insyde.com/security-pledge/SA-2022019 - (MISC) https://www.insyde.com/security-pledge/SA-2022019 - Vendor Advisory
First Time Insyde
Insyde insydeh2o
CVSS v2 : unknown
v3 : unknown
v2 : 7.2
v3 : 8.2

09 Feb 2022, 03:15

Type Values Removed Values Added
References
  • (MISC) https://www.insyde.com/security-pledge/SA-2022019 -
Summary A vulnerability exists in SMM (System Management Mode) branch that registers a SWSMI handler that does not sufficiently check or validate the allocated table variables EFI_BOOT_SERVICES and EFI_RUNTIME_SERVICES. This can be used by an attacker to overwrite address location of the function (LocateHandleBuffer) to the address location of arbitrary code controlled by the attacker. On system call to SWSMI handler, the arbitrary code can be triggered to execute. An issue was discovered in AhciBusDxe in the kernel 5.0 through 5.5 in Insyde InsydeH2O. There is an SMM callout that allows an attacker to access the System Management Mode and execute arbitrary code. This occurs because of Inclusion of Functionality from an Untrusted Control Sphere.

03 Feb 2022, 02:15

Type Values Removed Values Added
New CVE

Information

Published : 2022-02-03 02:15

Updated : 2023-12-10 14:09


NVD link : CVE-2021-41841

Mitre link : CVE-2021-41841

CVE.ORG link : CVE-2021-41841


JSON object : View

Products Affected

insyde

  • insydeh2o
CWE
CWE-829

Inclusion of Functionality from Untrusted Control Sphere