CVE-2022-35897

An stack buffer overflow vulnerability leads to arbitrary code execution issue was discovered in Insyde InsydeH2O with kernel 5.0 through 5.5. If the attacker modifies specific UEFI variables, it can cause a stack overflow, leading to arbitrary code execution. The specific variables are normally locked (read-only) at the OS level and therefore an attack would require direct SPI modification. If an attacker can change the values of at least two variables out of three (SecureBootEnforce, SecureBoot, RestoreBootSettings), it is possible to execute arbitrary code.
References
Configurations

Configuration 1 (hide)

cpe:2.3:o:insyde:kernel:*:*:*:*:*:*:*:*

History

30 Nov 2022, 18:49

Type Values Removed Values Added
References (MISC) https://www.insyde.com/security-pledge - (MISC) https://www.insyde.com/security-pledge - Vendor Advisory
References (MISC) https://www.insyde.com/security-pledge/SA-2022041 - (MISC) https://www.insyde.com/security-pledge/SA-2022041 - Vendor Advisory
First Time Insyde kernel
Insyde
CWE CWE-787
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 6.8
CPE cpe:2.3:o:insyde:kernel:*:*:*:*:*:*:*:*

21 Nov 2022, 18:29

Type Values Removed Values Added
New CVE

Information

Published : 2022-11-21 17:15

Updated : 2023-12-10 14:48


NVD link : CVE-2022-35897

Mitre link : CVE-2022-35897

CVE.ORG link : CVE-2022-35897


JSON object : View

Products Affected

insyde

  • kernel
CWE
CWE-787

Out-of-bounds Write