Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2021-33626 (GCVE-0-2021-33626)
Vulnerability from cvelistv5
- n/a
| URL | Tags | ||
|---|---|---|---|
|
|
|||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2025-11-04T19:12:30.965Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://www.insyde.com/security-pledge"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://www.insyde.com/security-pledge/SA-2021001"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://security.netapp.com/advisory/ntap-20220216-0006/"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-306654.pdf"
},
{
"url": "https://www.kb.cert.org/vuls/id/796611"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability exists in SMM (System Management Mode) branch that registers a SWSMI handler that does not sufficiently check or validate the allocated buffer pointer(QWORD values for CommBuffer). This can be used by an attacker to corrupt data in SMRAM memory and even lead to arbitrary code execution."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2022-02-22T19:07:00.000Z",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"tags": [
"x_refsource_MISC"
],
"url": "https://www.insyde.com/security-pledge"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "https://www.insyde.com/security-pledge/SA-2021001"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://security.netapp.com/advisory/ntap-20220216-0006/"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-306654.pdf"
}
],
"source": {
"discovery": "INTERNAL"
},
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2021-33626",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "A vulnerability exists in SMM (System Management Mode) branch that registers a SWSMI handler that does not sufficiently check or validate the allocated buffer pointer(QWORD values for CommBuffer). This can be used by an attacker to corrupt data in SMRAM memory and even lead to arbitrary code execution."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://www.insyde.com/security-pledge",
"refsource": "MISC",
"url": "https://www.insyde.com/security-pledge"
},
{
"name": "https://www.insyde.com/security-pledge/SA-2021001",
"refsource": "MISC",
"url": "https://www.insyde.com/security-pledge/SA-2021001"
},
{
"name": "https://security.netapp.com/advisory/ntap-20220216-0006/",
"refsource": "CONFIRM",
"url": "https://security.netapp.com/advisory/ntap-20220216-0006/"
},
{
"name": "https://cert-portal.siemens.com/productcert/pdf/ssa-306654.pdf",
"refsource": "CONFIRM",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-306654.pdf"
}
]
},
"source": {
"discovery": "INTERNAL"
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2021-33626",
"datePublished": "2021-10-01T02:21:29.000Z",
"dateReserved": "2021-05-28T00:00:00.000Z",
"dateUpdated": "2025-11-04T19:12:30.965Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.2",
"vulnerability-lookup:meta": {
"nvd": "{\"cve\":{\"id\":\"CVE-2021-33626\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2021-10-01T03:15:06.593\",\"lastModified\":\"2025-11-04T20:16:00.367\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"A vulnerability exists in SMM (System Management Mode) branch that registers a SWSMI handler that does not sufficiently check or validate the allocated buffer pointer(QWORD values for CommBuffer). This can be used by an attacker to corrupt data in SMRAM memory and even lead to arbitrary code execution.\"},{\"lang\":\"es\",\"value\":\"Existe una vulnerabilidad en la rama SMM (System Management Mode) que registra un manejador SWSMI que no comprueba o valida suficientemente el puntero del buffer asignado (valores QWORD para CommBuffer). Esto puede ser utilizado por un atacante para corromper los datos en la memoria SMRAM e incluso llevar a la ejecuci\u00f3n de c\u00f3digo arbitrario\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H\",\"baseScore\":7.8,\"baseSeverity\":\"HIGH\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":1.8,\"impactScore\":5.9}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:L/AC:L/Au:N/C:P/I:P/A:P\",\"baseScore\":4.6,\"accessVector\":\"LOCAL\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"PARTIAL\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":3.9,\"impactScore\":6.4,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-829\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:insyde:insydeh2o:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"5.3\",\"versionEndExcluding\":\"5.34.44\",\"matchCriteriaId\":\"7A8D4515-2E1D-4C69-B561-6F42B54FFD74\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:insyde:insydeh2o:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"5.2\",\"versionEndExcluding\":\"5.25.44\",\"matchCriteriaId\":\"38BBAD45-A06D-41D6-A1CC-5AD560E9DCB8\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:insyde:insydeh2o:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"5.1\",\"versionEndExcluding\":\"5.16.25\",\"matchCriteriaId\":\"816E66FC-0597-4442-9257-69B97D27D815\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:insyde:insydeh2o:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"5.4\",\"versionEndExcluding\":\"5.42.44\",\"matchCriteriaId\":\"A889306B-C22C-4F29-BDBC-08B86252A584\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:insyde:insydeh2o:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"5.3\",\"versionEndExcluding\":\"5.35.25\",\"matchCriteriaId\":\"C47A7464-4682-474D-B094-CB6F2BD3B6B4\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:insyde:insydeh2o:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"5.2\",\"versionEndExcluding\":\"5.26.25\",\"matchCriteriaId\":\"0AECE476-8649-4928-9702-9E9737E1A764\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:insyde:insydeh2o:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"5.4\",\"versionEndExcluding\":\"5.43.25\",\"matchCriteriaId\":\"5C8173E6-4FED-481D-BF5E-3CABDF13CA61\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:siemens:ruggedcom_apr1808_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E08DFAD2-130C-4B75-B7EF-602C4B3324F0\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:siemens:ruggedcom_apr1808:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BD56E8B2-232B-4E1C-BB3F-41B0C1E31D7B\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:siemens:simatic_field_pg_m5_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"75AE72A3-05C6-4564-81CC-67865D03D106\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:siemens:simatic_field_pg_m5:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"506DEE00-30D2-4E29-9645-757EB8778C0F\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:siemens:simatic_field_pg_m6_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"ECC5341D-9982-4F18-9C8D-2912DDB8EF9A\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:siemens:simatic_field_pg_m6:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8F3C3E60-7C36-4F5D-B454-97C9D0FD9459\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:siemens:simatic_ipc127e_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"846EE524-BC53-4DE5-81C5-6B5EB2DD8BEA\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:siemens:simatic_ipc127e:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F63C0B17-60E2-4240-92FD-4B7C7D8F2C8B\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:siemens:simatic_ipc227g_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2ED11E5B-E60C-4359-B87C-E373DED77677\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:siemens:simatic_ipc227g:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0D1E85AC-1305-4C5E-AD8B-39B2654F6057\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:siemens:simatic_ipc277g_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1865061F-CF02-410B-B01B-2088F7104867\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:siemens:simatic_ipc277g:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"320F5752-86B3-4C08-89D0-02272753A6D0\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:siemens:simatic_ipc327g_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"68215EEF-243A-4B02-BEAB-C162A3564D60\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:siemens:simatic_ipc327g:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EC7303D1-CC95-42C7-B843-C3B3B3336669\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:siemens:simatic_ipc377g_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"62751FE8-48D7-4D7B-A7DD-4977DE539660\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:siemens:simatic_ipc377g:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FDD6F034-BC50-4223-AE5D-319F04C866A8\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:siemens:simatic_ipc427e_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4EC3A82C-1380-4B21-BB17-3760A0B6A027\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:siemens:simatic_ipc427e:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A40D0CDB-7BE6-491F-B730-3B4E10CA159A\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:siemens:simatic_ipc477e_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B2558478-44E0-4D42-A6DC-D4262D15A92A\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:siemens:simatic_ipc477e:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FDF9D4C3-1892-48FA-95B4-835B636A4005\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:siemens:simatic_ipc477e_pro_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6AD30972-8CE2-46B4-A4B8-B209F6B616AC\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:siemens:simatic_ipc477e_pro:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3FC5CE20-7D08-4496-A857-C3A4BD0AB1AC\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:siemens:simatic_ipc627e_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EFFA7953-DC4C-489A-B5A4-B832FAF3C143\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:siemens:simatic_ipc627e:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9D9AF082-8345-4BE1-B1FC-6E0316BB833B\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:siemens:simatic_ipc647e_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0AC414E9-5DBD-4D60-B0EA-6FB48207B628\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:siemens:simatic_ipc647e:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E430C4C5-D887-47C6-B50F-66EEE9519151\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:siemens:simatic_ipc677e_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"193BF353-5D85-4F2E-94D0-329ED823FF07\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:siemens:simatic_ipc677e:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5F9FA42D-B2F0-456F-89B7-6A5789787FBA\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:siemens:simatic_ipc847e_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D8CE311F-98F9-4E58-9E52-BAFAF87C0819\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:siemens:simatic_ipc847e:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1157418C-14C4-43C4-B63E-7E98D868A94F\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:siemens:simatic_itp1000_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"64538703-AE66-4D4A-B4A1-C88039B9543D\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:siemens:simatic_itp1000:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"187C6D51-5B86-484D-AE0F-26D1C9465580\"}]}]}],\"references\":[{\"url\":\"https://cert-portal.siemens.com/productcert/pdf/ssa-306654.pdf\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://security.netapp.com/advisory/ntap-20220216-0006/\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.insyde.com/security-pledge\",\"source\":\"cve@mitre.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://www.insyde.com/security-pledge/SA-2021001\",\"source\":\"cve@mitre.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://cert-portal.siemens.com/productcert/pdf/ssa-306654.pdf\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://security.netapp.com/advisory/ntap-20220216-0006/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.insyde.com/security-pledge\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://www.insyde.com/security-pledge/SA-2021001\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://www.kb.cert.org/vuls/id/796611\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}]}}"
}
}
CERTFR-2023-AVI-0559
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans les commutateurs Aruba. Elles permettent à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur, une exécution de code arbitraire et une élévation de privilèges.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
Les commutateurs Aruba séries CX 8400, CX 8325 et CX 8320 avec les systèmes d'exploitation suivants :
- AOS-CX versions 10.12.x antérieures à 10.12.0006
- AOS-CX versions 10.11.x antérieures à 10.11.0001
- AOS-CX versions 10.10.x antérieures à 10.10.1000
- AOS-CX versions 10.06.x antérieures à 10.06.0210
| Vendor | Product | Description |
|---|
| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [],
"affected_systems_content": "\u003cp\u003eLes commutateurs Aruba s\u00e9ries CX 8400, CX 8325 et CX 8320 avec les syst\u00e8mes d\u0027exploitation suivants :\u003c/p\u003e \u003cul\u003e \u003cli\u003eAOS-CX versions 10.12.x ant\u00e9rieures \u00e0 10.12.0006\u003c/li\u003e \u003cli\u003eAOS-CX versions 10.11.x ant\u00e9rieures \u00e0 10.11.0001\u003c/li\u003e \u003cli\u003eAOS-CX versions 10.10.x ant\u00e9rieures \u00e0 10.10.1000\u003c/li\u003e \u003cli\u003eAOS-CX versions 10.06.x ant\u00e9rieures \u00e0 10.06.0210\u003c/li\u003e \u003c/ul\u003e ",
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2021-42113",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-42113"
},
{
"name": "CVE-2021-41838",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-41838"
},
{
"name": "CVE-2021-41840",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-41840"
},
{
"name": "CVE-2021-33627",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33627"
},
{
"name": "CVE-2021-41839",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-41839"
},
{
"name": "CVE-2021-43522",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-43522"
},
{
"name": "CVE-2020-27339",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-27339"
},
{
"name": "CVE-2021-41610",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-41610"
},
{
"name": "CVE-2021-41837",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-41837"
},
{
"name": "CVE-2021-42059",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-42059"
},
{
"name": "CVE-2021-43323",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-43323"
},
{
"name": "CVE-2020-5953",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-5953"
},
{
"name": "CVE-2021-41841",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-41841"
},
{
"name": "CVE-2021-33626",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33626"
},
{
"name": "CVE-2021-33625",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33625"
},
{
"name": "CVE-2021-42554",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-42554"
}
],
"initial_release_date": "2023-07-19T00:00:00",
"last_revision_date": "2023-07-19T00:00:00",
"links": [],
"reference": "CERTFR-2023-AVI-0559",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2023-07-19T00:00:00.000000"
}
],
"risks": [
{
"description": "Ex\u00e9cution de code arbitraire"
},
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les commutateurs\nAruba. Elles permettent \u00e0 un attaquant de provoquer un probl\u00e8me de\ns\u00e9curit\u00e9 non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur, une ex\u00e9cution de code arbitraire et\nune \u00e9l\u00e9vation de privil\u00e8ges.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les commutateurs Aruba",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Aruba ARUBA-PSA-2022-001 du 01 f\u00e9vrier 2023",
"url": "https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2022-001.txt"
}
]
}
CERTFR-2022-AVI-180
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans Siemens . Elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance et une élévation de privilèges.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| Siemens | N/A | SIMATIC IPC327G toutes versions | ||
| Siemens | N/A | SIMATIC IPC847E toutes versions | ||
| Siemens | N/A | SIMATIC ITP1000 toutes versions | ||
| Siemens | N/A | SIMATIC IPC277G toutes versions | ||
| Siemens | N/A | SIMATIC IPC427E toutes versions | ||
| Siemens | N/A | SIMATIC IPC477E toutes versions | ||
| Siemens | N/A | SIMATIC IPC227G toutes versions | ||
| Siemens | N/A | SIMATIC IPC377G toutes versions | ||
| Siemens | N/A | SIMATIC IPC627E toutes versions | ||
| Siemens | N/A | SIMATIC IPC647E toutes versions | ||
| Siemens | N/A | SIMATIC IPC127E toutes versions | ||
| Siemens | N/A | SIMATIC Field PG M6 toutes versions | ||
| Siemens | N/A | SIMATIC Field PG M5 toutes versions | ||
| Siemens | N/A | SIMATIC IPC677E toutes versions |
| Title | Publication Time | Tags | |
|---|---|---|---|
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "SIMATIC IPC327G toutes versions",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC IPC847E toutes versions",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC ITP1000 toutes versions",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC IPC277G toutes versions",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC IPC427E toutes versions",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC IPC477E toutes versions",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC IPC227G toutes versions",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC IPC377G toutes versions",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC IPC627E toutes versions",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC IPC647E toutes versions",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC IPC127E toutes versions",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC Field PG M6 toutes versions",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC Field PG M5 toutes versions",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC IPC677E toutes versions",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2021-43615",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-43615"
},
{
"name": "CVE-2021-42113",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-42113"
},
{
"name": "CVE-2021-41838",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-41838"
},
{
"name": "CVE-2022-24030",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-24030"
},
{
"name": "CVE-2021-41840",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-41840"
},
{
"name": "CVE-2021-45971",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-45971"
},
{
"name": "CVE-2021-33627",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33627"
},
{
"name": "CVE-2021-41839",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-41839"
},
{
"name": "CVE-2021-45970",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-45970"
},
{
"name": "CVE-2021-43522",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-43522"
},
{
"name": "CVE-2020-27339",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-27339"
},
{
"name": "CVE-2021-41837",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-41837"
},
{
"name": "CVE-2021-42059",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-42059"
},
{
"name": "CVE-2022-24069",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-24069"
},
{
"name": "CVE-2021-43323",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-43323"
},
{
"name": "CVE-2020-5953",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-5953"
},
{
"name": "CVE-2021-41841",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-41841"
},
{
"name": "CVE-2021-42060",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-42060"
},
{
"name": "CVE-2022-24031",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-24031"
},
{
"name": "CVE-2021-33626",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33626"
},
{
"name": "CVE-2021-45969",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-45969"
},
{
"name": "CVE-2021-33625",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33625"
},
{
"name": "CVE-2021-42554",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-42554"
}
],
"initial_release_date": "2022-02-23T00:00:00",
"last_revision_date": "2022-02-23T00:00:00",
"links": [
{
"title": "Bulletin de s\u00e9curit\u00e9 Insyde du 01 f\u00e9vrier 2022",
"url": "https://www.insyde.com/security-pledge"
},
{
"title": "Bulletin d\u0027actualit\u00e9 CERT-FR CERTFR-2022-ACT-005 du 07 f\u00e9vrier 2022",
"url": "https://www.cert.ssi.gouv.fr/actualite/CERTFR-2022-ACT-005/"
}
],
"reference": "CERTFR-2022-AVI-180",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2022-02-23T00:00:00.000000"
}
],
"risks": [
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans Siemens . Elles\npermettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire\n\u00e0 distance et une \u00e9l\u00e9vation de privil\u00e8ges.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans Siemens",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-306654 du 22 f\u00e9vrier 2022",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-306654.html"
}
]
}
fkie_cve-2021-33626
Vulnerability from fkie_nvd
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:insyde:insydeh2o:*:*:*:*:*:*:*:*",
"matchCriteriaId": "7A8D4515-2E1D-4C69-B561-6F42B54FFD74",
"versionEndExcluding": "5.34.44",
"versionStartIncluding": "5.3",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:insyde:insydeh2o:*:*:*:*:*:*:*:*",
"matchCriteriaId": "38BBAD45-A06D-41D6-A1CC-5AD560E9DCB8",
"versionEndExcluding": "5.25.44",
"versionStartIncluding": "5.2",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:insyde:insydeh2o:*:*:*:*:*:*:*:*",
"matchCriteriaId": "816E66FC-0597-4442-9257-69B97D27D815",
"versionEndExcluding": "5.16.25",
"versionStartIncluding": "5.1",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:insyde:insydeh2o:*:*:*:*:*:*:*:*",
"matchCriteriaId": "A889306B-C22C-4F29-BDBC-08B86252A584",
"versionEndExcluding": "5.42.44",
"versionStartIncluding": "5.4",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:insyde:insydeh2o:*:*:*:*:*:*:*:*",
"matchCriteriaId": "C47A7464-4682-474D-B094-CB6F2BD3B6B4",
"versionEndExcluding": "5.35.25",
"versionStartIncluding": "5.3",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:insyde:insydeh2o:*:*:*:*:*:*:*:*",
"matchCriteriaId": "0AECE476-8649-4928-9702-9E9737E1A764",
"versionEndExcluding": "5.26.25",
"versionStartIncluding": "5.2",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:insyde:insydeh2o:*:*:*:*:*:*:*:*",
"matchCriteriaId": "5C8173E6-4FED-481D-BF5E-3CABDF13CA61",
"versionEndExcluding": "5.43.25",
"versionStartIncluding": "5.4",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:siemens:ruggedcom_apr1808_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E08DFAD2-130C-4B75-B7EF-602C4B3324F0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:siemens:ruggedcom_apr1808:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BD56E8B2-232B-4E1C-BB3F-41B0C1E31D7B",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:siemens:simatic_field_pg_m5_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "75AE72A3-05C6-4564-81CC-67865D03D106",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:siemens:simatic_field_pg_m5:-:*:*:*:*:*:*:*",
"matchCriteriaId": "506DEE00-30D2-4E29-9645-757EB8778C0F",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:siemens:simatic_field_pg_m6_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "ECC5341D-9982-4F18-9C8D-2912DDB8EF9A",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:siemens:simatic_field_pg_m6:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8F3C3E60-7C36-4F5D-B454-97C9D0FD9459",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:siemens:simatic_ipc127e_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "846EE524-BC53-4DE5-81C5-6B5EB2DD8BEA",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:siemens:simatic_ipc127e:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F63C0B17-60E2-4240-92FD-4B7C7D8F2C8B",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:siemens:simatic_ipc227g_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2ED11E5B-E60C-4359-B87C-E373DED77677",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:siemens:simatic_ipc227g:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0D1E85AC-1305-4C5E-AD8B-39B2654F6057",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:siemens:simatic_ipc277g_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1865061F-CF02-410B-B01B-2088F7104867",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:siemens:simatic_ipc277g:-:*:*:*:*:*:*:*",
"matchCriteriaId": "320F5752-86B3-4C08-89D0-02272753A6D0",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:siemens:simatic_ipc327g_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "68215EEF-243A-4B02-BEAB-C162A3564D60",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:siemens:simatic_ipc327g:-:*:*:*:*:*:*:*",
"matchCriteriaId": "EC7303D1-CC95-42C7-B843-C3B3B3336669",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:siemens:simatic_ipc377g_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "62751FE8-48D7-4D7B-A7DD-4977DE539660",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:siemens:simatic_ipc377g:-:*:*:*:*:*:*:*",
"matchCriteriaId": "FDD6F034-BC50-4223-AE5D-319F04C866A8",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:siemens:simatic_ipc427e_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4EC3A82C-1380-4B21-BB17-3760A0B6A027",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:siemens:simatic_ipc427e:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A40D0CDB-7BE6-491F-B730-3B4E10CA159A",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:siemens:simatic_ipc477e_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B2558478-44E0-4D42-A6DC-D4262D15A92A",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:siemens:simatic_ipc477e:-:*:*:*:*:*:*:*",
"matchCriteriaId": "FDF9D4C3-1892-48FA-95B4-835B636A4005",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:siemens:simatic_ipc477e_pro_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6AD30972-8CE2-46B4-A4B8-B209F6B616AC",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:siemens:simatic_ipc477e_pro:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3FC5CE20-7D08-4496-A857-C3A4BD0AB1AC",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:siemens:simatic_ipc627e_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "EFFA7953-DC4C-489A-B5A4-B832FAF3C143",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:siemens:simatic_ipc627e:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9D9AF082-8345-4BE1-B1FC-6E0316BB833B",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:siemens:simatic_ipc647e_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0AC414E9-5DBD-4D60-B0EA-6FB48207B628",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:siemens:simatic_ipc647e:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E430C4C5-D887-47C6-B50F-66EEE9519151",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:siemens:simatic_ipc677e_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "193BF353-5D85-4F2E-94D0-329ED823FF07",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:siemens:simatic_ipc677e:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5F9FA42D-B2F0-456F-89B7-6A5789787FBA",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:siemens:simatic_ipc847e_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D8CE311F-98F9-4E58-9E52-BAFAF87C0819",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:siemens:simatic_ipc847e:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1157418C-14C4-43C4-B63E-7E98D868A94F",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:siemens:simatic_itp1000_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "64538703-AE66-4D4A-B4A1-C88039B9543D",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:siemens:simatic_itp1000:-:*:*:*:*:*:*:*",
"matchCriteriaId": "187C6D51-5B86-484D-AE0F-26D1C9465580",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability exists in SMM (System Management Mode) branch that registers a SWSMI handler that does not sufficiently check or validate the allocated buffer pointer(QWORD values for CommBuffer). This can be used by an attacker to corrupt data in SMRAM memory and even lead to arbitrary code execution."
},
{
"lang": "es",
"value": "Existe una vulnerabilidad en la rama SMM (System Management Mode) que registra un manejador SWSMI que no comprueba o valida suficientemente el puntero del buffer asignado (valores QWORD para CommBuffer). Esto puede ser utilizado por un atacante para corromper los datos en la memoria SMRAM e incluso llevar a la ejecuci\u00f3n de c\u00f3digo arbitrario"
}
],
"id": "CVE-2021-33626",
"lastModified": "2025-11-04T20:16:00.367",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.6,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 3.9,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2021-10-01T03:15:06.593",
"references": [
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-306654.pdf"
},
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://security.netapp.com/advisory/ntap-20220216-0006/"
},
{
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
],
"url": "https://www.insyde.com/security-pledge"
},
{
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
],
"url": "https://www.insyde.com/security-pledge/SA-2021001"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-306654.pdf"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://security.netapp.com/advisory/ntap-20220216-0006/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "https://www.insyde.com/security-pledge"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "https://www.insyde.com/security-pledge/SA-2021001"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://www.kb.cert.org/vuls/id/796611"
}
],
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-829"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
ssa-306654
Vulnerability from csaf_siemens
Notes
{
"document": {
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Disclosure is not limited. (TLPv2: TLP:CLEAR)",
"tlp": {
"label": "WHITE"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Insyde has published information on vulnerabilities in Insyde BIOS in \nFebruary 2022. This advisory lists the Siemens Industrial products affected by these vulnerabilities.\nSiemens has released new versions for several affected products and recommends to update to the latest versions. Siemens is preparing further fix versions and recommends specific countermeasures for products where fixes are not, or not yet available.",
"title": "Summary"
},
{
"category": "general",
"text": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: \nhttps://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\nAdditional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity",
"title": "General Recommendations"
},
{
"category": "general",
"text": "For further inquiries on security vulnerabilities in Siemens products and solutions, please contact the Siemens ProductCERT: https://www.siemens.com/cert/advisories",
"title": "Additional Resources"
},
{
"category": "legal_disclaimer",
"text": "The use of Siemens Security Advisories is subject to the terms and conditions listed on: https://www.siemens.com/productcert/terms-of-use.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "productcert@siemens.com",
"name": "Siemens ProductCERT",
"namespace": "https://www.siemens.com"
},
"references": [
{
"category": "self",
"summary": "SSA-306654: Insyde BIOS Vulnerabilities in Siemens Industrial Products - HTML Version",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-306654.html"
},
{
"category": "self",
"summary": "SSA-306654: Insyde BIOS Vulnerabilities in Siemens Industrial Products - CSAF Version",
"url": "https://cert-portal.siemens.com/productcert/csaf/ssa-306654.json"
}
],
"title": "SSA-306654: Insyde BIOS Vulnerabilities in Siemens Industrial Products",
"tracking": {
"current_release_date": "2025-04-08T00:00:00Z",
"generator": {
"engine": {
"name": "Siemens ProductCERT CSAF Generator",
"version": "1"
}
},
"id": "SSA-306654",
"initial_release_date": "2022-02-22T00:00:00Z",
"revision_history": [
{
"date": "2022-02-22T00:00:00Z",
"legacy_version": "1.0",
"number": "1",
"summary": "Publication Date"
},
{
"date": "2022-03-08T00:00:00Z",
"legacy_version": "1.1",
"number": "2",
"summary": "Corrected AV:L for all CVEs, added RUGGEDCOM APE1808 and SIMATIC IPC477E PRO"
},
{
"date": "2022-07-12T00:00:00Z",
"legacy_version": "1.2",
"number": "3",
"summary": "Added CVE-2021-43613, CVE-2021-43614 and CVE-2021-38489, add fix for SIMATIC Field PG M6, SIMATIC ITP1000 for all CVEs except CVE-2021-43613"
},
{
"date": "2022-08-09T00:00:00Z",
"legacy_version": "1.3",
"number": "4",
"summary": "Added fix for SIMATIC IPC227G, SIMATIC IPC277G, SIMATIC IPC327G, SIMATIC IPC377G, clarified affected versions for RUGGEDCOM APE1808"
},
{
"date": "2022-10-11T00:00:00Z",
"legacy_version": "1.4",
"number": "5",
"summary": "Added partial fix for SIMATIC IPC427E, SIMATIC IPC477E, SIMATIC IPC477E Pro"
},
{
"date": "2023-02-14T00:00:00Z",
"legacy_version": "1.5",
"number": "6",
"summary": "Added partial fix for SIMATIC IPC627E, SIMATIC IPC677E, SIMATIC IPC677E, and SIMATIC IPC847E"
},
{
"date": "2023-07-11T00:00:00Z",
"legacy_version": "1.6",
"number": "7",
"summary": "Added fix SIMATIC Field PG M5"
},
{
"date": "2023-08-08T00:00:00Z",
"legacy_version": "1.7",
"number": "8",
"summary": "Removed fix for SIMATIC Field PG M6 as fix version was withdrawn"
},
{
"date": "2023-11-14T00:00:00Z",
"legacy_version": "1.8",
"number": "9",
"summary": "Added fix for SIMATIC IPC127E"
},
{
"date": "2025-04-08T00:00:00Z",
"legacy_version": "1.9",
"number": "10",
"summary": "Added fix for all CVE IDs for SIMATIC Field PG M6; Added fix for CVE-2021-43613 for SIMATIC IPC627E / IPC647E / IPC677E / IPC847E; Removed fix for CVE-2021-43613 for SIMATIC Field PG M5 as this CVE was not fixed in version V22.01.11; RUGGEDCOM APE1808 - BIOS: Removed CVE-2020-5953, CVE-2021-41840 and CVE-2021-43614 as not affected; added the link to the APE software upgrade tool to apply a BIOS version that fixes the other CVE IDs"
}
],
"status": "interim",
"version": "10"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "All versions \u003c V1.0.202N",
"product": {
"name": "RUGGEDCOM APE1808 - BIOS",
"product_id": "1"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM APE1808 - BIOS"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV22.01.10",
"product": {
"name": "SIMATIC Field PG M5",
"product_id": "2"
}
},
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "SIMATIC Field PG M5",
"product_id": "3"
}
}
],
"category": "product_name",
"name": "SIMATIC Field PG M5"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV26.01.13",
"product": {
"name": "SIMATIC Field PG M6",
"product_id": "4"
}
}
],
"category": "product_name",
"name": "SIMATIC Field PG M6"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV27.01.09",
"product": {
"name": "SIMATIC IPC127E",
"product_id": "5"
}
}
],
"category": "product_name",
"name": "SIMATIC IPC127E"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV28.01.04",
"product": {
"name": "SIMATIC IPC227G",
"product_id": "6"
}
}
],
"category": "product_name",
"name": "SIMATIC IPC227G"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV28.01.04",
"product": {
"name": "SIMATIC IPC277G",
"product_id": "7"
}
}
],
"category": "product_name",
"name": "SIMATIC IPC277G"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV28.01.04",
"product": {
"name": "SIMATIC IPC327G",
"product_id": "8"
}
}
],
"category": "product_name",
"name": "SIMATIC IPC327G"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV28.01.04",
"product": {
"name": "SIMATIC IPC377G",
"product_id": "9"
}
}
],
"category": "product_name",
"name": "SIMATIC IPC377G"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV21.01.17",
"product": {
"name": "SIMATIC IPC427E",
"product_id": "10"
}
},
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "SIMATIC IPC427E",
"product_id": "11"
}
}
],
"category": "product_name",
"name": "SIMATIC IPC427E"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV21.01.17",
"product": {
"name": "SIMATIC IPC477E",
"product_id": "12"
}
},
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "SIMATIC IPC477E",
"product_id": "13"
}
}
],
"category": "product_name",
"name": "SIMATIC IPC477E"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV21.01.17",
"product": {
"name": "SIMATIC IPC477E PRO",
"product_id": "14"
}
},
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "SIMATIC IPC477E PRO",
"product_id": "15"
}
}
],
"category": "product_name",
"name": "SIMATIC IPC477E PRO"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV25.02.12",
"product": {
"name": "SIMATIC IPC627E",
"product_id": "16"
}
},
{
"category": "product_version_range",
"name": "vers:all/\u003cV25.02.15",
"product": {
"name": "SIMATIC IPC627E",
"product_id": "17"
}
}
],
"category": "product_name",
"name": "SIMATIC IPC627E"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV25.02.12",
"product": {
"name": "SIMATIC IPC647E",
"product_id": "18"
}
},
{
"category": "product_version_range",
"name": "vers:all/\u003cV25.02.15",
"product": {
"name": "SIMATIC IPC647E",
"product_id": "19"
}
}
],
"category": "product_name",
"name": "SIMATIC IPC647E"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV25.02.12",
"product": {
"name": "SIMATIC IPC677E",
"product_id": "20"
}
},
{
"category": "product_version_range",
"name": "vers:all/\u003cV25.02.15",
"product": {
"name": "SIMATIC IPC677E",
"product_id": "21"
}
}
],
"category": "product_name",
"name": "SIMATIC IPC677E"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV25.02.12",
"product": {
"name": "SIMATIC IPC847E",
"product_id": "22"
}
},
{
"category": "product_version_range",
"name": "vers:all/\u003cV25.02.15",
"product": {
"name": "SIMATIC IPC847E",
"product_id": "23"
}
}
],
"category": "product_name",
"name": "SIMATIC IPC847E"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV23.01.10",
"product": {
"name": "SIMATIC ITP1000",
"product_id": "24"
}
},
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "SIMATIC ITP1000",
"product_id": "25"
}
}
],
"category": "product_name",
"name": "SIMATIC ITP1000"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV28.01.04",
"product": {
"name": "SIMATIC\u00a0IPC277G PRO",
"product_id": "26"
}
}
],
"category": "product_name",
"name": "SIMATIC\u00a0IPC277G PRO"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/\u003cV21.01.17",
"product": {
"name": "SIPLUS IPC427E",
"product_id": "27"
}
},
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "SIPLUS IPC427E",
"product_id": "28"
}
}
],
"category": "product_name",
"name": "SIPLUS IPC427E"
}
],
"category": "vendor",
"name": "Siemens"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2020-5953",
"cwe": {
"id": "CWE-822",
"name": "Untrusted Pointer Dereference"
},
"notes": [
{
"category": "summary",
"text": "A vulnerability exists in System Management Interrupt (SWSMI) handler of InsydeH2O UEFI Firmware code located in SWSMI handler that dereferences gRT (EFI_RUNTIME_SERVICES) pointer to call a GetVariable service, which is located outside of SMRAM. This can result in code execution in SMM (escalating privilege from ring 0 to ring -2).",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"2",
"4",
"5",
"6",
"7",
"26",
"8",
"9",
"10",
"12",
"14",
"16",
"18",
"20",
"22",
"24",
"27"
]
},
"remediations": [
{
"category": "mitigation",
"details": "As a prerequisite for an attack, an attacker must be able to run\nuntrusted code on affected systems. Siemens recommends limiting the possibilities to run untrusted code",
"product_ids": [
"2",
"4",
"5",
"6",
"7",
"26",
"8",
"9",
"10",
"12",
"14",
"16",
"18",
"20",
"22",
"24",
"27"
]
},
{
"category": "vendor_fix",
"details": "Update to V21.01.17 or later version",
"product_ids": [
"10",
"12",
"14",
"27"
]
},
{
"category": "vendor_fix",
"details": "Update to V22.01.10 or later version",
"product_ids": [
"2"
]
},
{
"category": "vendor_fix",
"details": "Update to V23.01.10 or later version",
"product_ids": [
"24"
]
},
{
"category": "vendor_fix",
"details": "Update to V25.02.12 or later version",
"product_ids": [
"16",
"18",
"20",
"22"
]
},
{
"category": "vendor_fix",
"details": "Update to V26.01.13 or later version",
"product_ids": [
"4"
]
},
{
"category": "vendor_fix",
"details": "Update to V27.01.09 or later version",
"product_ids": [
"5"
]
},
{
"category": "vendor_fix",
"details": "Update to V28.01.04 or later version",
"product_ids": [
"6",
"7",
"26",
"8",
"9"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"2",
"4",
"5",
"6",
"7",
"26",
"8",
"9",
"10",
"12",
"14",
"16",
"18",
"20",
"22",
"24",
"27"
]
}
],
"title": "CVE-2020-5953"
},
{
"cve": "CVE-2020-27339",
"cwe": {
"id": "CWE-269",
"name": "Improper Privilege Management"
},
"notes": [
{
"category": "summary",
"text": "In the kernel in Insyde InsydeH2O 5.x, certain SMM drivers did not correctly validate the CommBuffer and CommBufferSize parameters, allowing callers to corrupt either the firmware or the OS memory. The fixed versions for this issue in the AhciBusDxe, IdeBusDxe, NvmExpressDxe, SdHostDriverDxe, and SdMmcDeviceDxe drivers are 05.16.25, 05.26.25, 05.35.25, 05.43.25, and 05.51.25 (for Kernel 5.1 through 5.5).",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1",
"2",
"4",
"5",
"6",
"7",
"26",
"8",
"9",
"10",
"12",
"14",
"16",
"18",
"20",
"22",
"24",
"27"
]
},
"remediations": [
{
"category": "mitigation",
"details": "As a prerequisite for an attack, an attacker must be able to run\nuntrusted code on affected systems. Siemens recommends limiting the possibilities to run untrusted code",
"product_ids": [
"1",
"2",
"4",
"5",
"6",
"7",
"26",
"8",
"9",
"10",
"12",
"14",
"16",
"18",
"20",
"22",
"24",
"27"
]
},
{
"category": "vendor_fix",
"details": "Update to V1.0.202N or later version",
"product_ids": [
"1"
]
},
{
"category": "vendor_fix",
"details": "Update to V21.01.17 or later version",
"product_ids": [
"10",
"12",
"14",
"27"
]
},
{
"category": "vendor_fix",
"details": "Update to V22.01.10 or later version",
"product_ids": [
"2"
]
},
{
"category": "vendor_fix",
"details": "Update to V23.01.10 or later version",
"product_ids": [
"24"
]
},
{
"category": "vendor_fix",
"details": "Update to V25.02.12 or later version",
"product_ids": [
"16",
"18",
"20",
"22"
]
},
{
"category": "vendor_fix",
"details": "Update to V26.01.13 or later version",
"product_ids": [
"4"
]
},
{
"category": "vendor_fix",
"details": "Update to V27.01.09 or later version",
"product_ids": [
"5"
]
},
{
"category": "vendor_fix",
"details": "Update to V28.01.04 or later version",
"product_ids": [
"6",
"7",
"26",
"8",
"9"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"1",
"2",
"4",
"5",
"6",
"7",
"26",
"8",
"9",
"10",
"12",
"14",
"16",
"18",
"20",
"22",
"24",
"27"
]
}
],
"title": "CVE-2020-27339"
},
{
"cve": "CVE-2021-33625",
"cwe": {
"id": "CWE-119",
"name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
},
"notes": [
{
"category": "summary",
"text": "An issue was discovered in Kernel 5.x in Insyde InsydeH2O, affecting HddPassword. Software SMI services that use the Communicate() function of the EFI_SMM_COMMUNICATION_PROTOCOL do not check whether the address of the buffer is valid, which allows use of SMRAM, MMIO, or OS kernel addresses.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1",
"2",
"4",
"5",
"6",
"7",
"26",
"8",
"9",
"10",
"12",
"14",
"16",
"18",
"20",
"22",
"24",
"27"
]
},
"remediations": [
{
"category": "mitigation",
"details": "As a prerequisite for an attack, an attacker must be able to run\nuntrusted code on affected systems. Siemens recommends limiting the possibilities to run untrusted code",
"product_ids": [
"1",
"2",
"4",
"5",
"6",
"7",
"26",
"8",
"9",
"10",
"12",
"14",
"16",
"18",
"20",
"22",
"24",
"27"
]
},
{
"category": "vendor_fix",
"details": "Update to V1.0.202N or later version",
"product_ids": [
"1"
]
},
{
"category": "vendor_fix",
"details": "Update to V21.01.17 or later version",
"product_ids": [
"10",
"12",
"14",
"27"
]
},
{
"category": "vendor_fix",
"details": "Update to V22.01.10 or later version",
"product_ids": [
"2"
]
},
{
"category": "vendor_fix",
"details": "Update to V23.01.10 or later version",
"product_ids": [
"24"
]
},
{
"category": "vendor_fix",
"details": "Update to V25.02.12 or later version",
"product_ids": [
"16",
"18",
"20",
"22"
]
},
{
"category": "vendor_fix",
"details": "Update to V26.01.13 or later version",
"product_ids": [
"4"
]
},
{
"category": "vendor_fix",
"details": "Update to V27.01.09 or later version",
"product_ids": [
"5"
]
},
{
"category": "vendor_fix",
"details": "Update to V28.01.04 or later version",
"product_ids": [
"6",
"7",
"26",
"8",
"9"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"1",
"2",
"4",
"5",
"6",
"7",
"26",
"8",
"9",
"10",
"12",
"14",
"16",
"18",
"20",
"22",
"24",
"27"
]
}
],
"title": "CVE-2021-33625"
},
{
"cve": "CVE-2021-33626",
"cwe": {
"id": "CWE-829",
"name": "Inclusion of Functionality from Untrusted Control Sphere"
},
"notes": [
{
"category": "summary",
"text": "In the kernel in Insyde InsydeH2O 5.x, certain SMM drivers did not correctly validate the CommBuffer and CommBufferSize parameters, allowing callers to corrupt either the firmware or the OS memory. The fixed versions for this issue in the PnpSmm, SmmResourceCheckDxe, and BeepStatusCode drivers are 05.08.23, 05.16.23, 05.26.23, 05.35.23, 05.43.23, and 05.51.23 (for Kernel 5.0 through 5.5).",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1",
"2",
"4",
"5",
"6",
"7",
"26",
"8",
"9",
"10",
"12",
"14",
"16",
"18",
"20",
"22",
"24",
"27"
]
},
"remediations": [
{
"category": "mitigation",
"details": "As a prerequisite for an attack, an attacker must be able to run\nuntrusted code on affected systems. Siemens recommends limiting the possibilities to run untrusted code",
"product_ids": [
"1",
"2",
"4",
"5",
"6",
"7",
"26",
"8",
"9",
"10",
"12",
"14",
"16",
"18",
"20",
"22",
"24",
"27"
]
},
{
"category": "vendor_fix",
"details": "Update to V1.0.202N or later version",
"product_ids": [
"1"
]
},
{
"category": "vendor_fix",
"details": "Update to V21.01.17 or later version",
"product_ids": [
"10",
"12",
"14",
"27"
]
},
{
"category": "vendor_fix",
"details": "Update to V22.01.10 or later version",
"product_ids": [
"2"
]
},
{
"category": "vendor_fix",
"details": "Update to V23.01.10 or later version",
"product_ids": [
"24"
]
},
{
"category": "vendor_fix",
"details": "Update to V25.02.12 or later version",
"product_ids": [
"16",
"18",
"20",
"22"
]
},
{
"category": "vendor_fix",
"details": "Update to V26.01.13 or later version",
"product_ids": [
"4"
]
},
{
"category": "vendor_fix",
"details": "Update to V27.01.09 or later version",
"product_ids": [
"5"
]
},
{
"category": "vendor_fix",
"details": "Update to V28.01.04 or later version",
"product_ids": [
"6",
"7",
"26",
"8",
"9"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"1",
"2",
"4",
"5",
"6",
"7",
"26",
"8",
"9",
"10",
"12",
"14",
"16",
"18",
"20",
"22",
"24",
"27"
]
}
],
"title": "CVE-2021-33626"
},
{
"cve": "CVE-2021-33627",
"cwe": {
"id": "CWE-119",
"name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
},
"notes": [
{
"category": "summary",
"text": "An issue was discovered in Insyde InsydeH2O 5.x, affecting FwBlockServiceSmm. Software SMI services that use the Communicate() function of the EFI_SMM_COMMUNICATION_PROTOCOL do not check whether the address of the buffer is valid, which allows use of SMRAM, MMIO, or OS kernel addresses.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1",
"2",
"4",
"5",
"6",
"7",
"26",
"8",
"9",
"10",
"12",
"14",
"16",
"18",
"20",
"22",
"24",
"27"
]
},
"remediations": [
{
"category": "mitigation",
"details": "As a prerequisite for an attack, an attacker must be able to run\nuntrusted code on affected systems. Siemens recommends limiting the possibilities to run untrusted code",
"product_ids": [
"1",
"2",
"4",
"5",
"6",
"7",
"26",
"8",
"9",
"10",
"12",
"14",
"16",
"18",
"20",
"22",
"24",
"27"
]
},
{
"category": "vendor_fix",
"details": "Update to V1.0.202N or later version",
"product_ids": [
"1"
]
},
{
"category": "vendor_fix",
"details": "Update to V21.01.17 or later version",
"product_ids": [
"10",
"12",
"14",
"27"
]
},
{
"category": "vendor_fix",
"details": "Update to V22.01.10 or later version",
"product_ids": [
"2"
]
},
{
"category": "vendor_fix",
"details": "Update to V23.01.10 or later version",
"product_ids": [
"24"
]
},
{
"category": "vendor_fix",
"details": "Update to V25.02.12 or later version",
"product_ids": [
"16",
"18",
"20",
"22"
]
},
{
"category": "vendor_fix",
"details": "Update to V26.01.13 or later version",
"product_ids": [
"4"
]
},
{
"category": "vendor_fix",
"details": "Update to V27.01.09 or later version",
"product_ids": [
"5"
]
},
{
"category": "vendor_fix",
"details": "Update to V28.01.04 or later version",
"product_ids": [
"6",
"7",
"26",
"8",
"9"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.2,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"1",
"2",
"4",
"5",
"6",
"7",
"26",
"8",
"9",
"10",
"12",
"14",
"16",
"18",
"20",
"22",
"24",
"27"
]
}
],
"title": "CVE-2021-33627"
},
{
"cve": "CVE-2021-38489",
"cwe": {
"id": "CWE-256",
"name": "Plaintext Storage of a Password"
},
"notes": [
{
"category": "summary",
"text": "An issue was discovered in the the HddPasswordPei driver of the Insyde InsydeH2O 5.x. HDD password is stored in plaintext.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1",
"2",
"4",
"5",
"6",
"7",
"26",
"8",
"9",
"10",
"12",
"14",
"16",
"18",
"20",
"22",
"24",
"27"
]
},
"remediations": [
{
"category": "mitigation",
"details": "As a prerequisite for an attack, an attacker must be able to run\nuntrusted code on affected systems. Siemens recommends limiting the possibilities to run untrusted code",
"product_ids": [
"1",
"2",
"4",
"5",
"6",
"7",
"26",
"8",
"9",
"10",
"12",
"14",
"16",
"18",
"20",
"22",
"24",
"27"
]
},
{
"category": "vendor_fix",
"details": "Update to V1.0.202N or later version",
"product_ids": [
"1"
]
},
{
"category": "vendor_fix",
"details": "Update to V21.01.17 or later version",
"product_ids": [
"10",
"12",
"14",
"27"
]
},
{
"category": "vendor_fix",
"details": "Update to V22.01.10 or later version",
"product_ids": [
"2"
]
},
{
"category": "vendor_fix",
"details": "Update to V23.01.10 or later version",
"product_ids": [
"24"
]
},
{
"category": "vendor_fix",
"details": "Update to V25.02.12 or later version",
"product_ids": [
"16",
"18",
"20",
"22"
]
},
{
"category": "vendor_fix",
"details": "Update to V26.01.13 or later version",
"product_ids": [
"4"
]
},
{
"category": "vendor_fix",
"details": "Update to V27.01.09 or later version",
"product_ids": [
"5"
]
},
{
"category": "vendor_fix",
"details": "Update to V28.01.04 or later version",
"product_ids": [
"6",
"7",
"26",
"8",
"9"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"1",
"2",
"4",
"5",
"6",
"7",
"26",
"8",
"9",
"10",
"12",
"14",
"16",
"18",
"20",
"22",
"24",
"27"
]
}
],
"title": "CVE-2021-38489"
},
{
"cve": "CVE-2021-41837",
"cwe": {
"id": "CWE-119",
"name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
},
"notes": [
{
"category": "summary",
"text": "An issue was discovered in AhciBusDxe in the kernel 5.0 through 5.5 in Insyde InsydeH2O. Because of an Untrusted Pointer Dereference that causes SMM memory corruption, an attacker may be able to write fixed or predictable data to SMRAM. Exploiting this issue could lead to escalating privileges to SMM.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1",
"2",
"4",
"5",
"6",
"7",
"26",
"8",
"9",
"10",
"12",
"14",
"16",
"18",
"20",
"22",
"24",
"27"
]
},
"remediations": [
{
"category": "mitigation",
"details": "As a prerequisite for an attack, an attacker must be able to run\nuntrusted code on affected systems. Siemens recommends limiting the possibilities to run untrusted code",
"product_ids": [
"1",
"2",
"4",
"5",
"6",
"7",
"26",
"8",
"9",
"10",
"12",
"14",
"16",
"18",
"20",
"22",
"24",
"27"
]
},
{
"category": "vendor_fix",
"details": "Update to V1.0.202N or later version",
"product_ids": [
"1"
]
},
{
"category": "vendor_fix",
"details": "Update to V21.01.17 or later version",
"product_ids": [
"10",
"12",
"14",
"27"
]
},
{
"category": "vendor_fix",
"details": "Update to V22.01.10 or later version",
"product_ids": [
"2"
]
},
{
"category": "vendor_fix",
"details": "Update to V23.01.10 or later version",
"product_ids": [
"24"
]
},
{
"category": "vendor_fix",
"details": "Update to V25.02.12 or later version",
"product_ids": [
"16",
"18",
"20",
"22"
]
},
{
"category": "vendor_fix",
"details": "Update to V26.01.13 or later version",
"product_ids": [
"4"
]
},
{
"category": "vendor_fix",
"details": "Update to V27.01.09 or later version",
"product_ids": [
"5"
]
},
{
"category": "vendor_fix",
"details": "Update to V28.01.04 or later version",
"product_ids": [
"6",
"7",
"26",
"8",
"9"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.2,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"1",
"2",
"4",
"5",
"6",
"7",
"26",
"8",
"9",
"10",
"12",
"14",
"16",
"18",
"20",
"22",
"24",
"27"
]
}
],
"title": "CVE-2021-41837"
},
{
"cve": "CVE-2021-41838",
"cwe": {
"id": "CWE-119",
"name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
},
"notes": [
{
"category": "summary",
"text": "An issue was discovered in SdHostDriver in the kernel 5.0 through 5.5 in Insyde InsydeH2O. There is an SMM callout that allows an attacker to access the System Management Mode and execute arbitrary code. This occurs because of a Numeric Range Comparison Without a Minimum Check.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1",
"2",
"4",
"5",
"6",
"7",
"26",
"8",
"9",
"10",
"12",
"14",
"16",
"18",
"20",
"22",
"24",
"27"
]
},
"remediations": [
{
"category": "mitigation",
"details": "As a prerequisite for an attack, an attacker must be able to run\nuntrusted code on affected systems. Siemens recommends limiting the possibilities to run untrusted code",
"product_ids": [
"1",
"2",
"4",
"5",
"6",
"7",
"26",
"8",
"9",
"10",
"12",
"14",
"16",
"18",
"20",
"22",
"24",
"27"
]
},
{
"category": "vendor_fix",
"details": "Update to V1.0.202N or later version",
"product_ids": [
"1"
]
},
{
"category": "vendor_fix",
"details": "Update to V21.01.17 or later version",
"product_ids": [
"10",
"12",
"14",
"27"
]
},
{
"category": "vendor_fix",
"details": "Update to V22.01.10 or later version",
"product_ids": [
"2"
]
},
{
"category": "vendor_fix",
"details": "Update to V23.01.10 or later version",
"product_ids": [
"24"
]
},
{
"category": "vendor_fix",
"details": "Update to V25.02.12 or later version",
"product_ids": [
"16",
"18",
"20",
"22"
]
},
{
"category": "vendor_fix",
"details": "Update to V26.01.13 or later version",
"product_ids": [
"4"
]
},
{
"category": "vendor_fix",
"details": "Update to V27.01.09 or later version",
"product_ids": [
"5"
]
},
{
"category": "vendor_fix",
"details": "Update to V28.01.04 or later version",
"product_ids": [
"6",
"7",
"26",
"8",
"9"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.2,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"1",
"2",
"4",
"5",
"6",
"7",
"26",
"8",
"9",
"10",
"12",
"14",
"16",
"18",
"20",
"22",
"24",
"27"
]
}
],
"title": "CVE-2021-41838"
},
{
"cve": "CVE-2021-41839",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"notes": [
{
"category": "summary",
"text": "An issue was discovered in NvmExpressDxe in the kernel 5.0 through 5.5 in Insyde InsydeH2O. Because of an Untrusted Pointer Dereference that causes SMM memory corruption, an attacker may be able to write fixed or predictable data to SMRAM. Exploiting this issue could lead to escalating privileges to SMM.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1",
"2",
"4",
"5",
"6",
"7",
"26",
"8",
"9",
"10",
"12",
"14",
"16",
"18",
"20",
"22",
"24",
"27"
]
},
"remediations": [
{
"category": "mitigation",
"details": "As a prerequisite for an attack, an attacker must be able to run\nuntrusted code on affected systems. Siemens recommends limiting the possibilities to run untrusted code",
"product_ids": [
"1",
"2",
"4",
"5",
"6",
"7",
"26",
"8",
"9",
"10",
"12",
"14",
"16",
"18",
"20",
"22",
"24",
"27"
]
},
{
"category": "vendor_fix",
"details": "Update to V1.0.202N or later version",
"product_ids": [
"1"
]
},
{
"category": "vendor_fix",
"details": "Update to V21.01.17 or later version",
"product_ids": [
"10",
"12",
"14",
"27"
]
},
{
"category": "vendor_fix",
"details": "Update to V22.01.10 or later version",
"product_ids": [
"2"
]
},
{
"category": "vendor_fix",
"details": "Update to V23.01.10 or later version",
"product_ids": [
"24"
]
},
{
"category": "vendor_fix",
"details": "Update to V25.02.12 or later version",
"product_ids": [
"16",
"18",
"20",
"22"
]
},
{
"category": "vendor_fix",
"details": "Update to V26.01.13 or later version",
"product_ids": [
"4"
]
},
{
"category": "vendor_fix",
"details": "Update to V27.01.09 or later version",
"product_ids": [
"5"
]
},
{
"category": "vendor_fix",
"details": "Update to V28.01.04 or later version",
"product_ids": [
"6",
"7",
"26",
"8",
"9"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.2,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"1",
"2",
"4",
"5",
"6",
"7",
"26",
"8",
"9",
"10",
"12",
"14",
"16",
"18",
"20",
"22",
"24",
"27"
]
}
],
"title": "CVE-2021-41839"
},
{
"cve": "CVE-2021-41840",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"notes": [
{
"category": "summary",
"text": "An issue was discovered in NvmExpressDxe in the kernel 5.0 through 5.5 in Insyde InsydeH2O. There is an SMM callout that allows an attacker to access the System Management Mode and execute arbitrary code. This occurs because of Inclusion of Functionality from an Untrusted Control Sphere.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"2",
"4",
"5",
"6",
"7",
"26",
"8",
"9",
"10",
"12",
"14",
"16",
"18",
"20",
"22",
"24",
"27"
]
},
"remediations": [
{
"category": "mitigation",
"details": "As a prerequisite for an attack, an attacker must be able to run\nuntrusted code on affected systems. Siemens recommends limiting the possibilities to run untrusted code",
"product_ids": [
"2",
"4",
"5",
"6",
"7",
"26",
"8",
"9",
"10",
"12",
"14",
"16",
"18",
"20",
"22",
"24",
"27"
]
},
{
"category": "vendor_fix",
"details": "Update to V21.01.17 or later version",
"product_ids": [
"10",
"12",
"14",
"27"
]
},
{
"category": "vendor_fix",
"details": "Update to V22.01.10 or later version",
"product_ids": [
"2"
]
},
{
"category": "vendor_fix",
"details": "Update to V23.01.10 or later version",
"product_ids": [
"24"
]
},
{
"category": "vendor_fix",
"details": "Update to V25.02.12 or later version",
"product_ids": [
"16",
"18",
"20",
"22"
]
},
{
"category": "vendor_fix",
"details": "Update to V26.01.13 or later version",
"product_ids": [
"4"
]
},
{
"category": "vendor_fix",
"details": "Update to V27.01.09 or later version",
"product_ids": [
"5"
]
},
{
"category": "vendor_fix",
"details": "Update to V28.01.04 or later version",
"product_ids": [
"6",
"7",
"26",
"8",
"9"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.2,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"2",
"4",
"5",
"6",
"7",
"26",
"8",
"9",
"10",
"12",
"14",
"16",
"18",
"20",
"22",
"24",
"27"
]
}
],
"title": "CVE-2021-41840"
},
{
"cve": "CVE-2021-41841",
"cwe": {
"id": "CWE-829",
"name": "Inclusion of Functionality from Untrusted Control Sphere"
},
"notes": [
{
"category": "summary",
"text": "An issue was discovered in AhciBusDxe in the kernel 5.0 through 5.5 in Insyde InsydeH2O. There is an SMM callout that allows an attacker to access the System Management Mode and execute arbitrary code. This occurs because of Inclusion of Functionality from an Untrusted Control Sphere.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1",
"2",
"4",
"5",
"6",
"7",
"26",
"8",
"9",
"10",
"12",
"14",
"16",
"18",
"20",
"22",
"24",
"27"
]
},
"remediations": [
{
"category": "mitigation",
"details": "As a prerequisite for an attack, an attacker must be able to run\nuntrusted code on affected systems. Siemens recommends limiting the possibilities to run untrusted code",
"product_ids": [
"1",
"2",
"4",
"5",
"6",
"7",
"26",
"8",
"9",
"10",
"12",
"14",
"16",
"18",
"20",
"22",
"24",
"27"
]
},
{
"category": "vendor_fix",
"details": "Update to V1.0.202N or later version",
"product_ids": [
"1"
]
},
{
"category": "vendor_fix",
"details": "Update to V21.01.17 or later version",
"product_ids": [
"10",
"12",
"14",
"27"
]
},
{
"category": "vendor_fix",
"details": "Update to V22.01.10 or later version",
"product_ids": [
"2"
]
},
{
"category": "vendor_fix",
"details": "Update to V23.01.10 or later version",
"product_ids": [
"24"
]
},
{
"category": "vendor_fix",
"details": "Update to V25.02.12 or later version",
"product_ids": [
"16",
"18",
"20",
"22"
]
},
{
"category": "vendor_fix",
"details": "Update to V26.01.13 or later version",
"product_ids": [
"4"
]
},
{
"category": "vendor_fix",
"details": "Update to V27.01.09 or later version",
"product_ids": [
"5"
]
},
{
"category": "vendor_fix",
"details": "Update to V28.01.04 or later version",
"product_ids": [
"6",
"7",
"26",
"8",
"9"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.2,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"1",
"2",
"4",
"5",
"6",
"7",
"26",
"8",
"9",
"10",
"12",
"14",
"16",
"18",
"20",
"22",
"24",
"27"
]
}
],
"title": "CVE-2021-41841"
},
{
"cve": "CVE-2021-42059",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "summary",
"text": "An issue was discovered in Insyde InsydeH2O Kernel 5.0 before 05.08.41, Kernel 5.1 before 05.16.41, Kernel 5.2 before 05.26.41, Kernel 5.3 before 05.35.41, and Kernel 5.4 before 05.42.20. A stack-based buffer overflow leads toarbitrary code execution in UEFI DisplayTypeDxe DXE driver.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1",
"2",
"4",
"5",
"6",
"7",
"26",
"8",
"9",
"10",
"12",
"14",
"16",
"18",
"20",
"22",
"24",
"27"
]
},
"remediations": [
{
"category": "mitigation",
"details": "As a prerequisite for an attack, an attacker must be able to run\nuntrusted code on affected systems. Siemens recommends limiting the possibilities to run untrusted code",
"product_ids": [
"1",
"2",
"4",
"5",
"6",
"7",
"26",
"8",
"9",
"10",
"12",
"14",
"16",
"18",
"20",
"22",
"24",
"27"
]
},
{
"category": "vendor_fix",
"details": "Update to V1.0.202N or later version",
"product_ids": [
"1"
]
},
{
"category": "vendor_fix",
"details": "Update to V21.01.17 or later version",
"product_ids": [
"10",
"12",
"14",
"27"
]
},
{
"category": "vendor_fix",
"details": "Update to V22.01.10 or later version",
"product_ids": [
"2"
]
},
{
"category": "vendor_fix",
"details": "Update to V23.01.10 or later version",
"product_ids": [
"24"
]
},
{
"category": "vendor_fix",
"details": "Update to V25.02.12 or later version",
"product_ids": [
"16",
"18",
"20",
"22"
]
},
{
"category": "vendor_fix",
"details": "Update to V26.01.13 or later version",
"product_ids": [
"4"
]
},
{
"category": "vendor_fix",
"details": "Update to V27.01.09 or later version",
"product_ids": [
"5"
]
},
{
"category": "vendor_fix",
"details": "Update to V28.01.04 or later version",
"product_ids": [
"6",
"7",
"26",
"8",
"9"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"1",
"2",
"4",
"5",
"6",
"7",
"26",
"8",
"9",
"10",
"12",
"14",
"16",
"18",
"20",
"22",
"24",
"27"
]
}
],
"title": "CVE-2021-42059"
},
{
"cve": "CVE-2021-42060",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "An issue was discovered in Insyde InsydeH2O Kernel 5.0 through 05.08.41, Kernel 5.1 through 05.16.41, Kernel 5.2 before 05.23.22, and Kernel 5.3 before 05.32.22. An Int15ServiceSmm SMM callout vulnerability allows an attacker to hijack execution flow of code running in System Management Mode. Exploiting this issue could lead to escalating privileges to SMM.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1",
"2",
"4",
"5",
"6",
"7",
"26",
"8",
"9",
"10",
"12",
"14",
"16",
"18",
"20",
"22",
"24",
"27"
]
},
"remediations": [
{
"category": "mitigation",
"details": "As a prerequisite for an attack, an attacker must be able to run\nuntrusted code on affected systems. Siemens recommends limiting the possibilities to run untrusted code",
"product_ids": [
"1",
"2",
"4",
"5",
"6",
"7",
"26",
"8",
"9",
"10",
"12",
"14",
"16",
"18",
"20",
"22",
"24",
"27"
]
},
{
"category": "vendor_fix",
"details": "Update to V1.0.202N or later version",
"product_ids": [
"1"
]
},
{
"category": "vendor_fix",
"details": "Update to V21.01.17 or later version",
"product_ids": [
"10",
"12",
"14",
"27"
]
},
{
"category": "vendor_fix",
"details": "Update to V22.01.10 or later version",
"product_ids": [
"2"
]
},
{
"category": "vendor_fix",
"details": "Update to V23.01.10 or later version",
"product_ids": [
"24"
]
},
{
"category": "vendor_fix",
"details": "Update to V25.02.12 or later version",
"product_ids": [
"16",
"18",
"20",
"22"
]
},
{
"category": "vendor_fix",
"details": "Update to V26.01.13 or later version",
"product_ids": [
"4"
]
},
{
"category": "vendor_fix",
"details": "Update to V27.01.09 or later version",
"product_ids": [
"5"
]
},
{
"category": "vendor_fix",
"details": "Update to V28.01.04 or later version",
"product_ids": [
"6",
"7",
"26",
"8",
"9"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.2,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"1",
"2",
"4",
"5",
"6",
"7",
"26",
"8",
"9",
"10",
"12",
"14",
"16",
"18",
"20",
"22",
"24",
"27"
]
}
],
"title": "CVE-2021-42060"
},
{
"cve": "CVE-2021-42113",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "An issue was discovered in StorageSecurityCommandDxe in Insyde InsydeH2O with Kernel 5.1 before 05.14.28, Kernel 5.2 before 05.24.28, and Kernel 5.3 before 05.32.25. An SMM callout vulnerability allows an attacker to hijack execution flow of code running in System Management Mode. Exploiting this issue could lead to escalating privileges to SMM.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1",
"2",
"4",
"5",
"6",
"7",
"26",
"8",
"9",
"10",
"12",
"14",
"16",
"18",
"20",
"22",
"24",
"27"
]
},
"remediations": [
{
"category": "mitigation",
"details": "As a prerequisite for an attack, an attacker must be able to run\nuntrusted code on affected systems. Siemens recommends limiting the possibilities to run untrusted code",
"product_ids": [
"1",
"2",
"4",
"5",
"6",
"7",
"26",
"8",
"9",
"10",
"12",
"14",
"16",
"18",
"20",
"22",
"24",
"27"
]
},
{
"category": "vendor_fix",
"details": "Update to V1.0.202N or later version",
"product_ids": [
"1"
]
},
{
"category": "vendor_fix",
"details": "Update to V21.01.17 or later version",
"product_ids": [
"10",
"12",
"14",
"27"
]
},
{
"category": "vendor_fix",
"details": "Update to V22.01.10 or later version",
"product_ids": [
"2"
]
},
{
"category": "vendor_fix",
"details": "Update to V23.01.10 or later version",
"product_ids": [
"24"
]
},
{
"category": "vendor_fix",
"details": "Update to V25.02.12 or later version",
"product_ids": [
"16",
"18",
"20",
"22"
]
},
{
"category": "vendor_fix",
"details": "Update to V26.01.13 or later version",
"product_ids": [
"4"
]
},
{
"category": "vendor_fix",
"details": "Update to V27.01.09 or later version",
"product_ids": [
"5"
]
},
{
"category": "vendor_fix",
"details": "Update to V28.01.04 or later version",
"product_ids": [
"6",
"7",
"26",
"8",
"9"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.2,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"1",
"2",
"4",
"5",
"6",
"7",
"26",
"8",
"9",
"10",
"12",
"14",
"16",
"18",
"20",
"22",
"24",
"27"
]
}
],
"title": "CVE-2021-42113"
},
{
"cve": "CVE-2021-42554",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "summary",
"text": "An issue was discovered in Insyde InsydeH2O with Kernel 5.0 before 05.08.42, Kernel 5.1 before 05.16.42, Kernel 5.2 before 05.26.42, Kernel 5.3 before 05.35.42, Kernel 5.4 before 05.42.51, and Kernel 5.5 before 05.50.51. An SMM memory corruption vulnerability in FvbServicesRuntimeDxe allows a possible attacker to write fixed or predictable data to SMRAM. Exploiting this issue could lead to escalating privileges to SMM.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1",
"2",
"4",
"5",
"6",
"7",
"26",
"8",
"9",
"10",
"12",
"14",
"16",
"18",
"20",
"22",
"24",
"27"
]
},
"remediations": [
{
"category": "mitigation",
"details": "As a prerequisite for an attack, an attacker must be able to run\nuntrusted code on affected systems. Siemens recommends limiting the possibilities to run untrusted code",
"product_ids": [
"1",
"2",
"4",
"5",
"6",
"7",
"26",
"8",
"9",
"10",
"12",
"14",
"16",
"18",
"20",
"22",
"24",
"27"
]
},
{
"category": "vendor_fix",
"details": "Update to V1.0.202N or later version",
"product_ids": [
"1"
]
},
{
"category": "vendor_fix",
"details": "Update to V21.01.17 or later version",
"product_ids": [
"10",
"12",
"14",
"27"
]
},
{
"category": "vendor_fix",
"details": "Update to V22.01.10 or later version",
"product_ids": [
"2"
]
},
{
"category": "vendor_fix",
"details": "Update to V23.01.10 or later version",
"product_ids": [
"24"
]
},
{
"category": "vendor_fix",
"details": "Update to V25.02.12 or later version",
"product_ids": [
"16",
"18",
"20",
"22"
]
},
{
"category": "vendor_fix",
"details": "Update to V26.01.13 or later version",
"product_ids": [
"4"
]
},
{
"category": "vendor_fix",
"details": "Update to V27.01.09 or later version",
"product_ids": [
"5"
]
},
{
"category": "vendor_fix",
"details": "Update to V28.01.04 or later version",
"product_ids": [
"6",
"7",
"26",
"8",
"9"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"1",
"2",
"4",
"5",
"6",
"7",
"26",
"8",
"9",
"10",
"12",
"14",
"16",
"18",
"20",
"22",
"24",
"27"
]
}
],
"title": "CVE-2021-42554"
},
{
"cve": "CVE-2021-43323",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "An issue was discovered in UsbCoreDxe in Insyde InsydeH2O with kernel 5.5 before 05.51.45, 5.4 before 05.43.45, 5.3 before 05.35.45, 5.2 before 05.26.45, 5.1 before 05.16.45, and 5.0 before 05.08.45. An SMM callout vulnerability allows an attacker to hijack execution flow of code running in System Management Mode. Exploiting this issue could lead to escalating privileges to SMM.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1",
"2",
"4",
"5",
"6",
"7",
"26",
"8",
"9",
"10",
"12",
"14",
"16",
"18",
"20",
"22",
"24",
"27"
]
},
"remediations": [
{
"category": "mitigation",
"details": "As a prerequisite for an attack, an attacker must be able to run\nuntrusted code on affected systems. Siemens recommends limiting the possibilities to run untrusted code",
"product_ids": [
"1",
"2",
"4",
"5",
"6",
"7",
"26",
"8",
"9",
"10",
"12",
"14",
"16",
"18",
"20",
"22",
"24",
"27"
]
},
{
"category": "vendor_fix",
"details": "Update to V1.0.202N or later version",
"product_ids": [
"1"
]
},
{
"category": "vendor_fix",
"details": "Update to V21.01.17 or later version",
"product_ids": [
"10",
"12",
"14",
"27"
]
},
{
"category": "vendor_fix",
"details": "Update to V22.01.10 or later version",
"product_ids": [
"2"
]
},
{
"category": "vendor_fix",
"details": "Update to V23.01.10 or later version",
"product_ids": [
"24"
]
},
{
"category": "vendor_fix",
"details": "Update to V25.02.12 or later version",
"product_ids": [
"16",
"18",
"20",
"22"
]
},
{
"category": "vendor_fix",
"details": "Update to V26.01.13 or later version",
"product_ids": [
"4"
]
},
{
"category": "vendor_fix",
"details": "Update to V27.01.09 or later version",
"product_ids": [
"5"
]
},
{
"category": "vendor_fix",
"details": "Update to V28.01.04 or later version",
"product_ids": [
"6",
"7",
"26",
"8",
"9"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.2,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"1",
"2",
"4",
"5",
"6",
"7",
"26",
"8",
"9",
"10",
"12",
"14",
"16",
"18",
"20",
"22",
"24",
"27"
]
}
],
"title": "CVE-2021-43323"
},
{
"cve": "CVE-2021-43522",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "summary",
"text": "An issue was discovered in Insyde InsydeH2O with kernel 5.1 through 2021-11-08, 5.2 through 2021-11-08, and 5.3 through 2021-11-08. A StorageSecurityCommandDxe SMM memory corruption vulnerability allows an attacker to write fixed or predictable data to SMRAM. Exploiting this issue could lead to escalating privileges to SMM.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1",
"2",
"4",
"5",
"6",
"7",
"26",
"8",
"9",
"10",
"12",
"14",
"16",
"18",
"20",
"22",
"24",
"27"
]
},
"remediations": [
{
"category": "mitigation",
"details": "As a prerequisite for an attack, an attacker must be able to run\nuntrusted code on affected systems. Siemens recommends limiting the possibilities to run untrusted code",
"product_ids": [
"1",
"2",
"4",
"5",
"6",
"7",
"26",
"8",
"9",
"10",
"12",
"14",
"16",
"18",
"20",
"22",
"24",
"27"
]
},
{
"category": "vendor_fix",
"details": "Update to V1.0.202N or later version",
"product_ids": [
"1"
]
},
{
"category": "vendor_fix",
"details": "Update to V21.01.17 or later version",
"product_ids": [
"10",
"12",
"14",
"27"
]
},
{
"category": "vendor_fix",
"details": "Update to V22.01.10 or later version",
"product_ids": [
"2"
]
},
{
"category": "vendor_fix",
"details": "Update to V23.01.10 or later version",
"product_ids": [
"24"
]
},
{
"category": "vendor_fix",
"details": "Update to V25.02.12 or later version",
"product_ids": [
"16",
"18",
"20",
"22"
]
},
{
"category": "vendor_fix",
"details": "Update to V26.01.13 or later version",
"product_ids": [
"4"
]
},
{
"category": "vendor_fix",
"details": "Update to V27.01.09 or later version",
"product_ids": [
"5"
]
},
{
"category": "vendor_fix",
"details": "Update to V28.01.04 or later version",
"product_ids": [
"6",
"7",
"26",
"8",
"9"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"1",
"2",
"4",
"5",
"6",
"7",
"26",
"8",
"9",
"10",
"12",
"14",
"16",
"18",
"20",
"22",
"24",
"27"
]
}
],
"title": "CVE-2021-43522"
},
{
"cve": "CVE-2021-43613",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"notes": [
{
"category": "summary",
"text": "An issue was discovered in Insyde InsydeH2O 5.x, affecting SysPasswordDxe that exposes user and administrator password hashes in runtime UEFI variables, leading to escalation of privilege.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1",
"3",
"4",
"5",
"6",
"7",
"26",
"8",
"9",
"11",
"13",
"15",
"17",
"19",
"21",
"23",
"25",
"28"
]
},
"remediations": [
{
"category": "mitigation",
"details": "As a prerequisite for an attack, an attacker must be able to run\nuntrusted code on affected systems. Siemens recommends limiting the possibilities to run untrusted code",
"product_ids": [
"1",
"3",
"4",
"5",
"6",
"7",
"26",
"8",
"9",
"11",
"13",
"15",
"17",
"19",
"21",
"23",
"25",
"28"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"3",
"11",
"13",
"15",
"25",
"28"
]
},
{
"category": "vendor_fix",
"details": "Update to V1.0.202N or later version",
"product_ids": [
"1"
]
},
{
"category": "vendor_fix",
"details": "Update to V25.02.15 or later version",
"product_ids": [
"17",
"19",
"21",
"23"
]
},
{
"category": "vendor_fix",
"details": "Update to V26.01.13 or later version",
"product_ids": [
"4"
]
},
{
"category": "vendor_fix",
"details": "Update to V27.01.09 or later version",
"product_ids": [
"5"
]
},
{
"category": "vendor_fix",
"details": "Update to V28.01.04 or later version",
"product_ids": [
"6",
"7",
"26",
"8",
"9"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:C/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"1",
"3",
"4",
"5",
"6",
"7",
"26",
"8",
"9",
"11",
"13",
"15",
"17",
"19",
"21",
"23",
"25",
"28"
]
}
],
"title": "CVE-2021-43613"
},
{
"cve": "CVE-2021-43614",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"notes": [
{
"category": "summary",
"text": "Error in handling the PlatformLangCodes UEFI variable in the VariableEditSmm driver could cause a buffer overflow, leading to resource exhaustion and failure.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"2",
"4",
"5",
"6",
"7",
"26",
"8",
"9",
"10",
"12",
"14",
"16",
"18",
"20",
"22",
"24",
"27"
]
},
"remediations": [
{
"category": "mitigation",
"details": "As a prerequisite for an attack, an attacker must be able to run\nuntrusted code on affected systems. Siemens recommends limiting the possibilities to run untrusted code",
"product_ids": [
"2",
"4",
"5",
"6",
"7",
"26",
"8",
"9",
"10",
"12",
"14",
"16",
"18",
"20",
"22",
"24",
"27"
]
},
{
"category": "vendor_fix",
"details": "Update to V21.01.17 or later version",
"product_ids": [
"10",
"12",
"14",
"27"
]
},
{
"category": "vendor_fix",
"details": "Update to V22.01.10 or later version",
"product_ids": [
"2"
]
},
{
"category": "vendor_fix",
"details": "Update to V23.01.10 or later version",
"product_ids": [
"24"
]
},
{
"category": "vendor_fix",
"details": "Update to V25.02.12 or later version",
"product_ids": [
"16",
"18",
"20",
"22"
]
},
{
"category": "vendor_fix",
"details": "Update to V26.01.13 or later version",
"product_ids": [
"4"
]
},
{
"category": "vendor_fix",
"details": "Update to V27.01.09 or later version",
"product_ids": [
"5"
]
},
{
"category": "vendor_fix",
"details": "Update to V28.01.04 or later version",
"product_ids": [
"6",
"7",
"26",
"8",
"9"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:P/AC:H/PR:H/UI:R/S:C/C:H/I:H/A:L",
"version": "3.1"
},
"products": [
"2",
"4",
"5",
"6",
"7",
"26",
"8",
"9",
"10",
"12",
"14",
"16",
"18",
"20",
"22",
"24",
"27"
]
}
],
"title": "CVE-2021-43614"
},
{
"cve": "CVE-2021-43615",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "summary",
"text": "An issue was discovered in HddPassword in Insyde InsydeH2O with kernel 5.1 before 05.16.23, 5.2 before 05.26.23, 5.3 before 05.35.23, 5.4 before 05.43.22, and 5.5 before 05.51.22. An SMM memory corruption vulnerability allows an attacker to write fixed or predictable data to SMRAM. Exploiting this issue could lead to escalating privileges to SMM.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1",
"2",
"4",
"5",
"6",
"7",
"26",
"8",
"9",
"10",
"12",
"14",
"16",
"18",
"20",
"22",
"24",
"27"
]
},
"remediations": [
{
"category": "mitigation",
"details": "As a prerequisite for an attack, an attacker must be able to run\nuntrusted code on affected systems. Siemens recommends limiting the possibilities to run untrusted code",
"product_ids": [
"1",
"2",
"4",
"5",
"6",
"7",
"26",
"8",
"9",
"10",
"12",
"14",
"16",
"18",
"20",
"22",
"24",
"27"
]
},
{
"category": "vendor_fix",
"details": "Update to V1.0.202N or later version",
"product_ids": [
"1"
]
},
{
"category": "vendor_fix",
"details": "Update to V21.01.17 or later version",
"product_ids": [
"10",
"12",
"14",
"27"
]
},
{
"category": "vendor_fix",
"details": "Update to V22.01.10 or later version",
"product_ids": [
"2"
]
},
{
"category": "vendor_fix",
"details": "Update to V23.01.10 or later version",
"product_ids": [
"24"
]
},
{
"category": "vendor_fix",
"details": "Update to V25.02.12 or later version",
"product_ids": [
"16",
"18",
"20",
"22"
]
},
{
"category": "vendor_fix",
"details": "Update to V26.01.13 or later version",
"product_ids": [
"4"
]
},
{
"category": "vendor_fix",
"details": "Update to V27.01.09 or later version",
"product_ids": [
"5"
]
},
{
"category": "vendor_fix",
"details": "Update to V28.01.04 or later version",
"product_ids": [
"6",
"7",
"26",
"8",
"9"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.2,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"1",
"2",
"4",
"5",
"6",
"7",
"26",
"8",
"9",
"10",
"12",
"14",
"16",
"18",
"20",
"22",
"24",
"27"
]
}
],
"title": "CVE-2021-43615"
},
{
"cve": "CVE-2021-45969",
"cwe": {
"id": "CWE-120",
"name": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)"
},
"notes": [
{
"category": "summary",
"text": "An issue was discovered in AhciBusDxe in Insyde InsydeH2O with kernel 5.1 before 05.16.25, 5.2 before 05.26.25, 5.3 before 05.35.25, 5.4 before 05.43.25, and 5.5 before 05.51.25. A vulnerability exists in the SMM (System Management Mode) branch that registers a SWSMI handler that does not sufficiently check or validate the allocated buffer pointer (the CommBuffer+8 location).",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1",
"2",
"4",
"5",
"6",
"7",
"26",
"8",
"9",
"10",
"12",
"14",
"16",
"18",
"20",
"22",
"24",
"27"
]
},
"remediations": [
{
"category": "mitigation",
"details": "As a prerequisite for an attack, an attacker must be able to run\nuntrusted code on affected systems. Siemens recommends limiting the possibilities to run untrusted code",
"product_ids": [
"1",
"2",
"4",
"5",
"6",
"7",
"26",
"8",
"9",
"10",
"12",
"14",
"16",
"18",
"20",
"22",
"24",
"27"
]
},
{
"category": "vendor_fix",
"details": "Update to V1.0.202N or later version",
"product_ids": [
"1"
]
},
{
"category": "vendor_fix",
"details": "Update to V21.01.17 or later version",
"product_ids": [
"10",
"12",
"14",
"27"
]
},
{
"category": "vendor_fix",
"details": "Update to V22.01.10 or later version",
"product_ids": [
"2"
]
},
{
"category": "vendor_fix",
"details": "Update to V23.01.10 or later version",
"product_ids": [
"24"
]
},
{
"category": "vendor_fix",
"details": "Update to V25.02.12 or later version",
"product_ids": [
"16",
"18",
"20",
"22"
]
},
{
"category": "vendor_fix",
"details": "Update to V26.01.13 or later version",
"product_ids": [
"4"
]
},
{
"category": "vendor_fix",
"details": "Update to V27.01.09 or later version",
"product_ids": [
"5"
]
},
{
"category": "vendor_fix",
"details": "Update to V28.01.04 or later version",
"product_ids": [
"6",
"7",
"26",
"8",
"9"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"1",
"2",
"4",
"5",
"6",
"7",
"26",
"8",
"9",
"10",
"12",
"14",
"16",
"18",
"20",
"22",
"24",
"27"
]
}
],
"title": "CVE-2021-45969"
},
{
"cve": "CVE-2021-45970",
"cwe": {
"id": "CWE-120",
"name": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)"
},
"notes": [
{
"category": "summary",
"text": "An issue was discovered in IdeBusDxe in Insyde InsydeH2O with kernel 5.1 before 05.16.25, 5.2 before 05.26.25, 5.3 before 05.35.25, 5.4 before 05.43.25, and 5.5 before 05.51.25. A vulnerability exists in the SMM (System Management Mode) branch that registers a SWSMI handler that does not sufficiently check or validate the allocated buffer pointer (the status code saved at the CommBuffer+4 location).",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1",
"2",
"4",
"5",
"6",
"7",
"26",
"8",
"9",
"10",
"12",
"14",
"16",
"18",
"20",
"22",
"24",
"27"
]
},
"remediations": [
{
"category": "mitigation",
"details": "As a prerequisite for an attack, an attacker must be able to run\nuntrusted code on affected systems. Siemens recommends limiting the possibilities to run untrusted code",
"product_ids": [
"1",
"2",
"4",
"5",
"6",
"7",
"26",
"8",
"9",
"10",
"12",
"14",
"16",
"18",
"20",
"22",
"24",
"27"
]
},
{
"category": "vendor_fix",
"details": "Update to V1.0.202N or later version",
"product_ids": [
"1"
]
},
{
"category": "vendor_fix",
"details": "Update to V21.01.17 or later version",
"product_ids": [
"10",
"12",
"14",
"27"
]
},
{
"category": "vendor_fix",
"details": "Update to V22.01.10 or later version",
"product_ids": [
"2"
]
},
{
"category": "vendor_fix",
"details": "Update to V23.01.10 or later version",
"product_ids": [
"24"
]
},
{
"category": "vendor_fix",
"details": "Update to V25.02.12 or later version",
"product_ids": [
"16",
"18",
"20",
"22"
]
},
{
"category": "vendor_fix",
"details": "Update to V26.01.13 or later version",
"product_ids": [
"4"
]
},
{
"category": "vendor_fix",
"details": "Update to V27.01.09 or later version",
"product_ids": [
"5"
]
},
{
"category": "vendor_fix",
"details": "Update to V28.01.04 or later version",
"product_ids": [
"6",
"7",
"26",
"8",
"9"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"1",
"2",
"4",
"5",
"6",
"7",
"26",
"8",
"9",
"10",
"12",
"14",
"16",
"18",
"20",
"22",
"24",
"27"
]
}
],
"title": "CVE-2021-45970"
},
{
"cve": "CVE-2021-45971",
"cwe": {
"id": "CWE-120",
"name": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)"
},
"notes": [
{
"category": "summary",
"text": "An issue was discovered in SdHostDriver in Insyde InsydeH2O with kernel 5.1 before 05.16.25, 5.2 before 05.26.25, 5.3 before 05.35.25, 5.4 before 05.43.25, and 5.5 before 05.51.25. A vulnerability exists in the SMM (System Management Mode) branch that registers a SWSMI handler that does not sufficiently check or validate the allocated buffer pointer (CommBufferData).",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1",
"2",
"4",
"5",
"6",
"7",
"26",
"8",
"9",
"10",
"12",
"14",
"16",
"18",
"20",
"22",
"24",
"27"
]
},
"remediations": [
{
"category": "mitigation",
"details": "As a prerequisite for an attack, an attacker must be able to run\nuntrusted code on affected systems. Siemens recommends limiting the possibilities to run untrusted code",
"product_ids": [
"1",
"2",
"4",
"5",
"6",
"7",
"26",
"8",
"9",
"10",
"12",
"14",
"16",
"18",
"20",
"22",
"24",
"27"
]
},
{
"category": "vendor_fix",
"details": "Update to V1.0.202N or later version",
"product_ids": [
"1"
]
},
{
"category": "vendor_fix",
"details": "Update to V21.01.17 or later version",
"product_ids": [
"10",
"12",
"14",
"27"
]
},
{
"category": "vendor_fix",
"details": "Update to V22.01.10 or later version",
"product_ids": [
"2"
]
},
{
"category": "vendor_fix",
"details": "Update to V23.01.10 or later version",
"product_ids": [
"24"
]
},
{
"category": "vendor_fix",
"details": "Update to V25.02.12 or later version",
"product_ids": [
"16",
"18",
"20",
"22"
]
},
{
"category": "vendor_fix",
"details": "Update to V26.01.13 or later version",
"product_ids": [
"4"
]
},
{
"category": "vendor_fix",
"details": "Update to V27.01.09 or later version",
"product_ids": [
"5"
]
},
{
"category": "vendor_fix",
"details": "Update to V28.01.04 or later version",
"product_ids": [
"6",
"7",
"26",
"8",
"9"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"1",
"2",
"4",
"5",
"6",
"7",
"26",
"8",
"9",
"10",
"12",
"14",
"16",
"18",
"20",
"22",
"24",
"27"
]
}
],
"title": "CVE-2021-45971"
},
{
"cve": "CVE-2022-24030",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "summary",
"text": "An issue was discovered in AhciBusDxe in Insyde InsydeH2O with kernel 5.1 through 5.5. An SMM memory corruption vulnerability allows an attacker to write fixed or predictable data to SMRAM. Exploiting this issue could lead to escalating privileges to SMM.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1",
"2",
"4",
"5",
"6",
"7",
"26",
"8",
"9",
"10",
"12",
"14",
"16",
"18",
"20",
"22",
"24",
"27"
]
},
"remediations": [
{
"category": "mitigation",
"details": "As a prerequisite for an attack, an attacker must be able to run\nuntrusted code on affected systems. Siemens recommends limiting the possibilities to run untrusted code",
"product_ids": [
"1",
"2",
"4",
"5",
"6",
"7",
"26",
"8",
"9",
"10",
"12",
"14",
"16",
"18",
"20",
"22",
"24",
"27"
]
},
{
"category": "vendor_fix",
"details": "Update to V1.0.202N or later version",
"product_ids": [
"1"
]
},
{
"category": "vendor_fix",
"details": "Update to V21.01.17 or later version",
"product_ids": [
"10",
"12",
"14",
"27"
]
},
{
"category": "vendor_fix",
"details": "Update to V22.01.10 or later version",
"product_ids": [
"2"
]
},
{
"category": "vendor_fix",
"details": "Update to V23.01.10 or later version",
"product_ids": [
"24"
]
},
{
"category": "vendor_fix",
"details": "Update to V25.02.12 or later version",
"product_ids": [
"16",
"18",
"20",
"22"
]
},
{
"category": "vendor_fix",
"details": "Update to V26.01.13 or later version",
"product_ids": [
"4"
]
},
{
"category": "vendor_fix",
"details": "Update to V27.01.09 or later version",
"product_ids": [
"5"
]
},
{
"category": "vendor_fix",
"details": "Update to V28.01.04 or later version",
"product_ids": [
"6",
"7",
"26",
"8",
"9"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"1",
"2",
"4",
"5",
"6",
"7",
"26",
"8",
"9",
"10",
"12",
"14",
"16",
"18",
"20",
"22",
"24",
"27"
]
}
],
"title": "CVE-2022-24030"
},
{
"cve": "CVE-2022-24031",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "summary",
"text": "An issue was discovered in NvmExpressDxe in Insyde InsydeH2O with kernel 5.1 through 5.5. An SMM memory corruption vulnerability allows an attacker to write fixed or predictable data to SMRAM. Exploiting this issue could lead to escalating privileges to SMM.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1",
"2",
"4",
"5",
"6",
"7",
"26",
"8",
"9",
"10",
"12",
"14",
"16",
"18",
"20",
"22",
"24",
"27"
]
},
"remediations": [
{
"category": "mitigation",
"details": "As a prerequisite for an attack, an attacker must be able to run\nuntrusted code on affected systems. Siemens recommends limiting the possibilities to run untrusted code",
"product_ids": [
"1",
"2",
"4",
"5",
"6",
"7",
"26",
"8",
"9",
"10",
"12",
"14",
"16",
"18",
"20",
"22",
"24",
"27"
]
},
{
"category": "vendor_fix",
"details": "Update to V1.0.202N or later version",
"product_ids": [
"1"
]
},
{
"category": "vendor_fix",
"details": "Update to V21.01.17 or later version",
"product_ids": [
"10",
"12",
"14",
"27"
]
},
{
"category": "vendor_fix",
"details": "Update to V22.01.10 or later version",
"product_ids": [
"2"
]
},
{
"category": "vendor_fix",
"details": "Update to V23.01.10 or later version",
"product_ids": [
"24"
]
},
{
"category": "vendor_fix",
"details": "Update to V25.02.12 or later version",
"product_ids": [
"16",
"18",
"20",
"22"
]
},
{
"category": "vendor_fix",
"details": "Update to V26.01.13 or later version",
"product_ids": [
"4"
]
},
{
"category": "vendor_fix",
"details": "Update to V27.01.09 or later version",
"product_ids": [
"5"
]
},
{
"category": "vendor_fix",
"details": "Update to V28.01.04 or later version",
"product_ids": [
"6",
"7",
"26",
"8",
"9"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.2,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"1",
"2",
"4",
"5",
"6",
"7",
"26",
"8",
"9",
"10",
"12",
"14",
"16",
"18",
"20",
"22",
"24",
"27"
]
}
],
"title": "CVE-2022-24031"
},
{
"cve": "CVE-2022-24069",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "An issue was discovered in AhciBusDxe in Insyde InsydeH2O with kernel 5.0 before 05.08.41, 5.1 before 05.16.29, 5.2 before 05.26.29, 5.3 before 05.35.29, 5.4 before 05.43.29, and 5.5 before 05.51.29. An SMM callout vulnerability allows an attacker to hijack the execution flow of code running in System Management Mode. Exploiting this issue could lead to escalating privileges to SMM.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1",
"2",
"4",
"5",
"6",
"7",
"26",
"8",
"9",
"10",
"12",
"14",
"16",
"18",
"20",
"22",
"24",
"27"
]
},
"remediations": [
{
"category": "mitigation",
"details": "As a prerequisite for an attack, an attacker must be able to run\nuntrusted code on affected systems. Siemens recommends limiting the possibilities to run untrusted code",
"product_ids": [
"1",
"2",
"4",
"5",
"6",
"7",
"26",
"8",
"9",
"10",
"12",
"14",
"16",
"18",
"20",
"22",
"24",
"27"
]
},
{
"category": "vendor_fix",
"details": "Update to V1.0.202N or later version",
"product_ids": [
"1"
]
},
{
"category": "vendor_fix",
"details": "Update to V21.01.17 or later version",
"product_ids": [
"10",
"12",
"14",
"27"
]
},
{
"category": "vendor_fix",
"details": "Update to V22.01.10 or later version",
"product_ids": [
"2"
]
},
{
"category": "vendor_fix",
"details": "Update to V23.01.10 or later version",
"product_ids": [
"24"
]
},
{
"category": "vendor_fix",
"details": "Update to V25.02.12 or later version",
"product_ids": [
"16",
"18",
"20",
"22"
]
},
{
"category": "vendor_fix",
"details": "Update to V26.01.13 or later version",
"product_ids": [
"4"
]
},
{
"category": "vendor_fix",
"details": "Update to V27.01.09 or later version",
"product_ids": [
"5"
]
},
{
"category": "vendor_fix",
"details": "Update to V28.01.04 or later version",
"product_ids": [
"6",
"7",
"26",
"8",
"9"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.2,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"1",
"2",
"4",
"5",
"6",
"7",
"26",
"8",
"9",
"10",
"12",
"14",
"16",
"18",
"20",
"22",
"24",
"27"
]
}
],
"title": "CVE-2022-24069"
}
]
}
ghsa-9g63-gv45-4242
Vulnerability from github
In the kernel in Insyde InsydeH2O 5.x, certain SMM drivers did not correctly validate the CommBuffer and CommBufferSize parameters, allowing callers to corrupt either the firmware or the OS memory. The fixed versions for this issue in the PnpSmm, SmmResourceCheckDxe, and BeepStatusCode drivers are 05.08.23, 05.16.23, 05.26.23, 05.35.23, 05.43.23, and 05.51.23 (for Kernel 5.0 through 5.5).
{
"affected": [],
"aliases": [
"CVE-2021-33626"
],
"database_specific": {
"cwe_ids": [
"CWE-829"
],
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2021-10-01T03:15:00Z",
"severity": "HIGH"
},
"details": "In the kernel in Insyde InsydeH2O 5.x, certain SMM drivers did not correctly validate the CommBuffer and CommBufferSize parameters, allowing callers to corrupt either the firmware or the OS memory. The fixed versions for this issue in the PnpSmm, SmmResourceCheckDxe, and BeepStatusCode drivers are 05.08.23, 05.16.23, 05.26.23, 05.35.23, 05.43.23, and 05.51.23 (for Kernel 5.0 through 5.5).",
"id": "GHSA-9g63-gv45-4242",
"modified": "2025-11-04T21:30:25Z",
"published": "2022-05-24T19:16:22Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-33626"
},
{
"type": "WEB",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-306654.pdf"
},
{
"type": "WEB",
"url": "https://security.netapp.com/advisory/ntap-20220216-0006"
},
{
"type": "WEB",
"url": "https://www.insyde.com/security-pledge"
},
{
"type": "WEB",
"url": "https://www.insyde.com/security-pledge/SA-2021001"
},
{
"type": "WEB",
"url": "https://www.kb.cert.org/vuls/id/796611"
}
],
"schema_version": "1.4.0",
"severity": [
{
"score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"type": "CVSS_V3"
}
]
}
gsd-2021-33626
Vulnerability from gsd
{
"GSD": {
"alias": "CVE-2021-33626",
"description": "In the kernel in Insyde InsydeH2O 5.x, certain SMM drivers did not correctly validate the CommBuffer and CommBufferSize parameters, allowing callers to corrupt either the firmware or the OS memory. The fixed versions for this issue in the PnpSmm, SmmResourceCheckDxe, and BeepStatusCode drivers are 05.08.23, 05.16.23, 05.26.23, 05.35.23, 05.43.23, and 05.51.23 (for Kernel 5.0 through 5.5).",
"id": "GSD-2021-33626"
},
"gsd": {
"metadata": {
"exploitCode": "unknown",
"remediation": "unknown",
"reportConfidence": "confirmed",
"type": "vulnerability"
},
"osvSchema": {
"aliases": [
"CVE-2021-33626"
],
"details": "A vulnerability exists in SMM (System Management Mode) branch that registers a SWSMI handler that does not sufficiently check or validate the allocated buffer pointer(QWORD values for CommBuffer). This can be used by an attacker to corrupt data in SMRAM memory and even lead to arbitrary code execution.",
"id": "GSD-2021-33626",
"modified": "2023-12-13T01:23:19.132610Z",
"schema_version": "1.4.0"
}
},
"namespaces": {
"cve.org": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2021-33626",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "A vulnerability exists in SMM (System Management Mode) branch that registers a SWSMI handler that does not sufficiently check or validate the allocated buffer pointer(QWORD values for CommBuffer). This can be used by an attacker to corrupt data in SMRAM memory and even lead to arbitrary code execution."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://www.insyde.com/security-pledge",
"refsource": "MISC",
"url": "https://www.insyde.com/security-pledge"
},
{
"name": "https://www.insyde.com/security-pledge/SA-2021001",
"refsource": "MISC",
"url": "https://www.insyde.com/security-pledge/SA-2021001"
},
{
"name": "https://security.netapp.com/advisory/ntap-20220216-0006/",
"refsource": "CONFIRM",
"url": "https://security.netapp.com/advisory/ntap-20220216-0006/"
},
{
"name": "https://cert-portal.siemens.com/productcert/pdf/ssa-306654.pdf",
"refsource": "CONFIRM",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-306654.pdf"
}
]
},
"source": {
"discovery": "INTERNAL"
}
},
"nvd.nist.gov": {
"configurations": {
"CVE_data_version": "4.0",
"nodes": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:insyde:insydeh2o:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndExcluding": "5.34.44",
"versionStartIncluding": "5.3",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:insyde:insydeh2o:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndExcluding": "5.25.44",
"versionStartIncluding": "5.2",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:insyde:insydeh2o:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndExcluding": "5.16.25",
"versionStartIncluding": "5.1",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:insyde:insydeh2o:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndExcluding": "5.42.44",
"versionStartIncluding": "5.4",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:insyde:insydeh2o:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndExcluding": "5.35.25",
"versionStartIncluding": "5.3",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:insyde:insydeh2o:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndExcluding": "5.26.25",
"versionStartIncluding": "5.2",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:insyde:insydeh2o:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndExcluding": "5.43.25",
"versionStartIncluding": "5.4",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:siemens:ruggedcom_apr1808_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:siemens:ruggedcom_apr1808:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:siemens:simatic_field_pg_m5_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:siemens:simatic_field_pg_m5:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:siemens:simatic_field_pg_m6_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:siemens:simatic_field_pg_m6:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:siemens:simatic_ipc127e_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:siemens:simatic_ipc127e:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:siemens:simatic_ipc227g_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:siemens:simatic_ipc227g:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:siemens:simatic_ipc277g_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:siemens:simatic_ipc277g:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:siemens:simatic_ipc327g_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:siemens:simatic_ipc327g:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:siemens:simatic_ipc377g_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:siemens:simatic_ipc377g:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:siemens:simatic_ipc427e_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:siemens:simatic_ipc427e:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:siemens:simatic_ipc477e_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:siemens:simatic_ipc477e:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:siemens:simatic_ipc477e_pro_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:siemens:simatic_ipc477e_pro:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:siemens:simatic_ipc627e_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:siemens:simatic_ipc627e:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:siemens:simatic_ipc647e_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:siemens:simatic_ipc647e:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:siemens:simatic_ipc677e_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:siemens:simatic_ipc677e:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:siemens:simatic_ipc847e_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:siemens:simatic_ipc847e:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:siemens:simatic_itp1000_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:siemens:simatic_itp1000:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
}
]
},
"cve": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2021-33626"
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "en",
"value": "A vulnerability exists in SMM (System Management Mode) branch that registers a SWSMI handler that does not sufficiently check or validate the allocated buffer pointer(QWORD values for CommBuffer). This can be used by an attacker to corrupt data in SMRAM memory and even lead to arbitrary code execution."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "en",
"value": "CWE-829"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://www.insyde.com/security-pledge/SA-2021001",
"refsource": "MISC",
"tags": [
"Vendor Advisory"
],
"url": "https://www.insyde.com/security-pledge/SA-2021001"
},
{
"name": "https://www.insyde.com/security-pledge",
"refsource": "MISC",
"tags": [
"Vendor Advisory"
],
"url": "https://www.insyde.com/security-pledge"
},
{
"name": "https://security.netapp.com/advisory/ntap-20220216-0006/",
"refsource": "CONFIRM",
"tags": [
"Third Party Advisory"
],
"url": "https://security.netapp.com/advisory/ntap-20220216-0006/"
},
{
"name": "https://cert-portal.siemens.com/productcert/pdf/ssa-306654.pdf",
"refsource": "CONFIRM",
"tags": [
"Third Party Advisory"
],
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-306654.pdf"
}
]
}
},
"impact": {
"baseMetricV2": {
"acInsufInfo": false,
"cvssV2": {
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.6,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 3.9,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "MEDIUM",
"userInteractionRequired": false
},
"baseMetricV3": {
"cvssV3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
},
"lastModifiedDate": "2022-04-24T02:03Z",
"publishedDate": "2021-10-01T03:15Z"
}
}
}
cnvd-2022-10034
Vulnerability from cnvd
厂商尚未提供漏洞修复方案,请关注厂商主页更新: https://www.insyde.com/security-pledge/SA-2021001
| Name | Insyde InsydeH2O 5.* |
|---|
{
"cves": {
"cve": {
"cveNumber": "CVE-2021-33626",
"cveUrl": "https://nvd.nist.gov/vuln/detail/CVE-2021-33626"
}
},
"description": "Insyde InsydeH2O\u662f\u4e2d\u56fd\u53f0\u6e7e\u7cfb\u5fae\uff08Insyde\uff09\u516c\u53f8\u7684\u4e00\u4e2aC\u8bed\u8a00\u6e90\uff0c\u5b83\u5b9e\u73b0\u4e86\u65b0\u6280\u672f\u201cEFI/UEFI\u201d\u89c4\u8303\uff0c\u65e8\u5728\u53d6\u4ee3\u4f20\u7edf\u7684BIOS\uff08\u57fa\u672c\u8f93\u5165/\u8f93\u51fa\u7cfb\u7edf\uff09\u3002\n\nInsyde InsydeH2O\u5b58\u5728\u5185\u5b58\u635f\u574f\u6f0f\u6d1e\uff0c\u8be5\u6f0f\u6d1e\u6e90\u4e8e\u5185\u6838\u4e2d\u67d0\u4e9bSMM\u9a71\u52a8\u7a0b\u5e8f\u672a\u6b63\u786e\u9a8c\u8bc1CommBuffer\u548cCommBufferSize\u53c2\u6570\uff0c\u4ece\u800c\u5bfc\u81f4\u8c03\u7528\u7a0b\u5e8f\u635f\u574f\u56fa\u4ef6\u6216\u64cd\u4f5c\u7cfb\u7edf\u5185\u5b58\uff0c\u653b\u51fb\u8005\u53ef\u5229\u7528\u8be5\u6f0f\u6d1e\u901a\u8fc7\u635f\u574f\u7cfb\u7edf\u9020\u6210\u62d2\u7edd\u670d\u52a1\u3002",
"formalWay": "\u5382\u5546\u5c1a\u672a\u63d0\u4f9b\u6f0f\u6d1e\u4fee\u590d\u65b9\u6848\uff0c\u8bf7\u5173\u6ce8\u5382\u5546\u4e3b\u9875\u66f4\u65b0\uff1a\r\nhttps://www.insyde.com/security-pledge/SA-2021001",
"isEvent": "\u901a\u7528\u8f6f\u786c\u4ef6\u6f0f\u6d1e",
"number": "CNVD-2022-10034",
"openTime": "2022-02-14",
"products": {
"product": "Insyde InsydeH2O 5.*"
},
"referenceLink": "https://www.insyde.com/security-pledge/SA-2021001",
"serverity": "\u4e2d",
"submitTime": "2021-10-08",
"title": "Insyde InsydeH2O\u5185\u5b58\u635f\u574f\u6f0f\u6d1e"
}
var-202110-0264
Vulnerability from variot
A vulnerability exists in SMM (System Management Mode) branch that registers a SWSMI handler that does not sufficiently check or validate the allocated buffer pointer(QWORD values for CommBuffer). This can be used by an attacker to corrupt data in SMRAM memory and even lead to arbitrary code execution. The InsydeH2O Hardware-2-Operating System (H2O) UEFI firmware contains multiple vulnerabilities related to memory management in System Management Mode (SMM).Vulnerability Category Count
SMM Privilege Escalation 10
SMM Memory Corruption 12
DXE Memory Corruption 1CVE-2020-27339 Affected CVE-2020-5953 Affected CVE-2021-33625 Affected CVE-2021-33626 Affected CVE-2021-33627 Affected CVE-2021-41837 Affected CVE-2021-41838 Affected CVE-2021-41839 Affected CVE-2021-41840 Affected CVE-2021-41841 Affected CVE-2021-42059 Affected CVE-2021-42060 Not Affected CVE-2021-42113 Affected CVE-2021-42554 Affected CVE-2021-43323 Affected CVE-2021-43522 Affected CVE-2021-43615 Not Affected CVE-2021-45969 Not Affected CVE-2021-45970 Not Affected CVE-2021-45971 Not Affected CVE-2022-24030 Not Affected CVE-2022-24031 Not Affected CVE-2022-24069 Not Affected CVE-2022-28806 Unknown. InsydeH2O Includes a vulnerability in incorporating functionality from an untrusted control area.Information is obtained, information is tampered with, and service is disrupted (DoS) It may be put into a state. In the kernel in Insyde InsydeH2O 5.x, certain SMM drivers did not correctly validate the CommBuffer and CommBufferSize parameters, allowing callers to corrupt either the firmware or the OS memory. The fixed versions for this issue in the PnpSmm, SmmResourceCheckDxe, and BeepStatusCode drivers are 05.08.23, 05.16.23, 05.26.23, 05.35.23, 05.43.23, and 05.51.23 (for Kernel 5.0 up to and including 5.5)
Show details on source website{
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
"affected_products": {
"@id": "https://www.variotdbs.pl/ref/affected_products"
},
"configurations": {
"@id": "https://www.variotdbs.pl/ref/configurations"
},
"credits": {
"@id": "https://www.variotdbs.pl/ref/credits"
},
"cvss": {
"@id": "https://www.variotdbs.pl/ref/cvss/"
},
"description": {
"@id": "https://www.variotdbs.pl/ref/description/"
},
"exploit_availability": {
"@id": "https://www.variotdbs.pl/ref/exploit_availability/"
},
"external_ids": {
"@id": "https://www.variotdbs.pl/ref/external_ids/"
},
"iot": {
"@id": "https://www.variotdbs.pl/ref/iot/"
},
"iot_taxonomy": {
"@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
},
"patch": {
"@id": "https://www.variotdbs.pl/ref/patch/"
},
"problemtype_data": {
"@id": "https://www.variotdbs.pl/ref/problemtype_data/"
},
"references": {
"@id": "https://www.variotdbs.pl/ref/references/"
},
"sources": {
"@id": "https://www.variotdbs.pl/ref/sources/"
},
"sources_release_date": {
"@id": "https://www.variotdbs.pl/ref/sources_release_date/"
},
"sources_update_date": {
"@id": "https://www.variotdbs.pl/ref/sources_update_date/"
},
"threat_type": {
"@id": "https://www.variotdbs.pl/ref/threat_type/"
},
"title": {
"@id": "https://www.variotdbs.pl/ref/title/"
},
"type": {
"@id": "https://www.variotdbs.pl/ref/type/"
}
},
"@id": "https://www.variotdbs.pl/vuln/VAR-202110-0264",
"affected_products": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/affected_products#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"model": "simatic ipc377g",
"scope": "eq",
"trust": 1.0,
"vendor": "siemens",
"version": null
},
{
"model": "simatic itp1000",
"scope": "eq",
"trust": 1.0,
"vendor": "siemens",
"version": null
},
{
"model": "insydeh2o",
"scope": "lt",
"trust": 1.0,
"vendor": "insyde",
"version": "5.25.44"
},
{
"model": "insydeh2o",
"scope": "gte",
"trust": 1.0,
"vendor": "insyde",
"version": "5.2"
},
{
"model": "simatic ipc647e",
"scope": "eq",
"trust": 1.0,
"vendor": "siemens",
"version": null
},
{
"model": "insydeh2o",
"scope": "lt",
"trust": 1.0,
"vendor": "insyde",
"version": "5.35.25"
},
{
"model": "insydeh2o",
"scope": "lt",
"trust": 1.0,
"vendor": "insyde",
"version": "5.43.25"
},
{
"model": "simatic field pg m6",
"scope": "eq",
"trust": 1.0,
"vendor": "siemens",
"version": null
},
{
"model": "ruggedcom apr1808",
"scope": "eq",
"trust": 1.0,
"vendor": "siemens",
"version": null
},
{
"model": "simatic ipc477e",
"scope": "eq",
"trust": 1.0,
"vendor": "siemens",
"version": null
},
{
"model": "insydeh2o",
"scope": "gte",
"trust": 1.0,
"vendor": "insyde",
"version": "5.4"
},
{
"model": "simatic ipc627e",
"scope": "eq",
"trust": 1.0,
"vendor": "siemens",
"version": null
},
{
"model": "simatic ipc847e",
"scope": "eq",
"trust": 1.0,
"vendor": "siemens",
"version": null
},
{
"model": "simatic field pg m5",
"scope": "eq",
"trust": 1.0,
"vendor": "siemens",
"version": null
},
{
"model": "insydeh2o",
"scope": "gte",
"trust": 1.0,
"vendor": "insyde",
"version": "5.1"
},
{
"model": "simatic ipc677e",
"scope": "eq",
"trust": 1.0,
"vendor": "siemens",
"version": null
},
{
"model": "insydeh2o",
"scope": "lt",
"trust": 1.0,
"vendor": "insyde",
"version": "5.26.25"
},
{
"model": "simatic ipc227g",
"scope": "eq",
"trust": 1.0,
"vendor": "siemens",
"version": null
},
{
"model": "insydeh2o",
"scope": "gte",
"trust": 1.0,
"vendor": "insyde",
"version": "5.3"
},
{
"model": "insydeh2o",
"scope": "lt",
"trust": 1.0,
"vendor": "insyde",
"version": "5.16.25"
},
{
"model": "simatic ipc427e",
"scope": "eq",
"trust": 1.0,
"vendor": "siemens",
"version": null
},
{
"model": "insydeh2o",
"scope": "lt",
"trust": 1.0,
"vendor": "insyde",
"version": "5.34.44"
},
{
"model": "simatic ipc327g",
"scope": "eq",
"trust": 1.0,
"vendor": "siemens",
"version": null
},
{
"model": "simatic ipc127e",
"scope": "eq",
"trust": 1.0,
"vendor": "siemens",
"version": null
},
{
"model": "insydeh2o",
"scope": "lt",
"trust": 1.0,
"vendor": "insyde",
"version": "5.42.44"
},
{
"model": "simatic ipc277g",
"scope": "eq",
"trust": 1.0,
"vendor": "siemens",
"version": null
},
{
"model": "simatic ipc477e pro",
"scope": "eq",
"trust": 1.0,
"vendor": "siemens",
"version": null
},
{
"model": "insydeh2o",
"scope": null,
"trust": 0.8,
"vendor": "insyde",
"version": null
},
{
"model": "insydeh2o",
"scope": "eq",
"trust": 0.8,
"vendor": "insyde",
"version": null
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2021-007559"
},
{
"db": "NVD",
"id": "CVE-2021-33626"
}
]
},
"configurations": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/configurations#",
"children": {
"@container": "@list"
},
"cpe_match": {
"@container": "@list"
},
"data": {
"@container": "@list"
},
"nodes": {
"@container": "@list"
}
},
"data": [
{
"CVE_data_version": "4.0",
"nodes": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:insyde:insydeh2o:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndExcluding": "5.34.44",
"versionStartIncluding": "5.3",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:insyde:insydeh2o:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndExcluding": "5.25.44",
"versionStartIncluding": "5.2",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:insyde:insydeh2o:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndExcluding": "5.16.25",
"versionStartIncluding": "5.1",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:insyde:insydeh2o:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndExcluding": "5.42.44",
"versionStartIncluding": "5.4",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:insyde:insydeh2o:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndExcluding": "5.35.25",
"versionStartIncluding": "5.3",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:insyde:insydeh2o:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndExcluding": "5.26.25",
"versionStartIncluding": "5.2",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:insyde:insydeh2o:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndExcluding": "5.43.25",
"versionStartIncluding": "5.4",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:siemens:ruggedcom_apr1808_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:siemens:ruggedcom_apr1808:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:siemens:simatic_field_pg_m5_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:siemens:simatic_field_pg_m5:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:siemens:simatic_field_pg_m6_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:siemens:simatic_field_pg_m6:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:siemens:simatic_ipc127e_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:siemens:simatic_ipc127e:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:siemens:simatic_ipc227g_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:siemens:simatic_ipc227g:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:siemens:simatic_ipc277g_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:siemens:simatic_ipc277g:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:siemens:simatic_ipc327g_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:siemens:simatic_ipc327g:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:siemens:simatic_ipc377g_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:siemens:simatic_ipc377g:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:siemens:simatic_ipc427e_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:siemens:simatic_ipc427e:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:siemens:simatic_ipc477e_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:siemens:simatic_ipc477e:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:siemens:simatic_ipc477e_pro_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:siemens:simatic_ipc477e_pro:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:siemens:simatic_ipc627e_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:siemens:simatic_ipc627e:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:siemens:simatic_ipc647e_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:siemens:simatic_ipc647e:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:siemens:simatic_ipc677e_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:siemens:simatic_ipc677e:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:siemens:simatic_ipc847e_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:siemens:simatic_ipc847e:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:siemens:simatic_itp1000_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:siemens:simatic_itp1000:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
}
]
}
],
"sources": [
{
"db": "NVD",
"id": "CVE-2021-33626"
}
]
},
"credits": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/credits#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "This document was written by Vijay Sarvepalli.Statement Date:\u00a0\u00a0 March 01, 2022",
"sources": [
{
"db": "CERT/CC",
"id": "VU#796611"
}
],
"trust": 0.8
},
"cve": "CVE-2021-33626",
"cvss": {
"@context": {
"cvssV2": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
},
"cvssV3": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
},
"severity": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/cvss/severity#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/severity"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"cvssV2": [
{
"acInsufInfo": false,
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"author": "NVD",
"availabilityImpact": "PARTIAL",
"baseScore": 4.6,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 3.9,
"impactScore": 6.4,
"integrityImpact": "PARTIAL",
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "MEDIUM",
"trust": 1.0,
"userInteractionRequired": false,
"vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
{
"acInsufInfo": null,
"accessComplexity": "Low",
"accessVector": "Local",
"authentication": "None",
"author": "NVD",
"availabilityImpact": "Partial",
"baseScore": 4.6,
"confidentialityImpact": "Partial",
"exploitabilityScore": null,
"id": "CVE-2021-33626",
"impactScore": null,
"integrityImpact": "Partial",
"obtainAllPrivilege": null,
"obtainOtherPrivilege": null,
"obtainUserPrivilege": null,
"severity": "Medium",
"trust": 0.8,
"userInteractionRequired": null,
"vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
}
],
"cvssV3": [
{
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"author": "NVD",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"exploitabilityScore": 1.8,
"impactScore": 5.9,
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"trust": 1.0,
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
{
"attackComplexity": "Low",
"attackVector": "Local",
"author": "NVD",
"availabilityImpact": "High",
"baseScore": 7.8,
"baseSeverity": "High",
"confidentialityImpact": "High",
"exploitabilityScore": null,
"id": "CVE-2021-33626",
"impactScore": null,
"integrityImpact": "High",
"privilegesRequired": "Low",
"scope": "Unchanged",
"trust": 0.8,
"userInteraction": "None",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
}
],
"severity": [
{
"author": "NVD",
"id": "CVE-2021-33626",
"trust": 1.8,
"value": "HIGH"
},
{
"author": "CNNVD",
"id": "CNNVD-202109-2000",
"trust": 0.6,
"value": "HIGH"
}
]
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2021-007559"
},
{
"db": "NVD",
"id": "CVE-2021-33626"
},
{
"db": "CNNVD",
"id": "CNNVD-202109-2000"
}
]
},
"description": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/description#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "A vulnerability exists in SMM (System Management Mode) branch that registers a SWSMI handler that does not sufficiently check or validate the allocated buffer pointer(QWORD values for CommBuffer). This can be used by an attacker to corrupt data in SMRAM memory and even lead to arbitrary code execution. The InsydeH2O Hardware-2-Operating System (H2O) UEFI firmware contains multiple vulnerabilities related to memory management in System Management Mode (SMM).Vulnerability Category Count \n\n\n\n\nSMM Privilege Escalation 10 \n\n\n SMM Memory Corruption 12 \n\n\n DXE Memory Corruption 1CVE-2020-27339 Affected\nCVE-2020-5953 Affected\nCVE-2021-33625 Affected\nCVE-2021-33626 Affected\nCVE-2021-33627 Affected\nCVE-2021-41837 Affected\nCVE-2021-41838 Affected\nCVE-2021-41839 Affected\nCVE-2021-41840 Affected\nCVE-2021-41841 Affected\nCVE-2021-42059 Affected\nCVE-2021-42060 Not Affected\nCVE-2021-42113 Affected\nCVE-2021-42554 Affected\nCVE-2021-43323 Affected\nCVE-2021-43522 Affected\nCVE-2021-43615 Not Affected\nCVE-2021-45969 Not Affected\nCVE-2021-45970 Not Affected\nCVE-2021-45971 Not Affected\nCVE-2022-24030 Not Affected\nCVE-2022-24031 Not Affected\nCVE-2022-24069 Not Affected\nCVE-2022-28806 Unknown. InsydeH2O Includes a vulnerability in incorporating functionality from an untrusted control area.Information is obtained, information is tampered with, and service is disrupted (DoS) It may be put into a state. In the kernel in Insyde InsydeH2O 5.x, certain SMM drivers did not correctly validate the CommBuffer and CommBufferSize parameters, allowing callers to corrupt either the firmware or the OS memory. The fixed versions for this issue in the PnpSmm, SmmResourceCheckDxe, and BeepStatusCode drivers are 05.08.23, 05.16.23, 05.26.23, 05.35.23, 05.43.23, and 05.51.23 (for Kernel 5.0 up to and including 5.5)",
"sources": [
{
"db": "NVD",
"id": "CVE-2021-33626"
},
{
"db": "CERT/CC",
"id": "VU#796611"
},
{
"db": "JVNDB",
"id": "JVNDB-2021-007559"
},
{
"db": "VULMON",
"id": "CVE-2021-33626"
}
],
"trust": 2.43
},
"external_ids": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/external_ids#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"db": "NVD",
"id": "CVE-2021-33626",
"trust": 4.1
},
{
"db": "SIEMENS",
"id": "SSA-306654",
"trust": 1.6
},
{
"db": "CERT/CC",
"id": "VU#796611",
"trust": 0.8
},
{
"db": "JVN",
"id": "JVNVU98748974",
"trust": 0.8
},
{
"db": "JVN",
"id": "JVNVU97136454",
"trust": 0.8
},
{
"db": "JVNDB",
"id": "JVNDB-2021-007559",
"trust": 0.8
},
{
"db": "LENOVO",
"id": "LEN-73436",
"trust": 0.6
},
{
"db": "CNNVD",
"id": "CNNVD-202109-2000",
"trust": 0.6
},
{
"db": "VULMON",
"id": "CVE-2021-33626",
"trust": 0.1
}
],
"sources": [
{
"db": "CERT/CC",
"id": "VU#796611"
},
{
"db": "VULMON",
"id": "CVE-2021-33626"
},
{
"db": "JVNDB",
"id": "JVNDB-2021-007559"
},
{
"db": "NVD",
"id": "CVE-2021-33626"
},
{
"db": "CNNVD",
"id": "CNNVD-202109-2000"
}
]
},
"id": "VAR-202110-0264",
"iot": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": true,
"sources": [
{
"db": "VARIoT devices database",
"id": null
}
],
"trust": 0.5
},
"last_update_date": "2023-12-18T11:10:01.956000Z",
"patch": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/patch#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"title": "Insyde\u0027s\u00a0Security\u00a0Pledge Security\u00a0Advisory",
"trust": 0.8,
"url": "https://www.insyde.com/security-pledge"
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2021-007559"
}
]
},
"problemtype_data": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"problemtype": "CWE-829",
"trust": 1.0
},
{
"problemtype": "Incorporating features from untrusted control areas (CWE-829) [NVD Evaluation ]",
"trust": 0.8
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2021-007559"
},
{
"db": "NVD",
"id": "CVE-2021-33626"
}
]
},
"references": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/references#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"trust": 1.7,
"url": "https://www.insyde.com/security-pledge/sa-2021001"
},
{
"trust": 1.6,
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-306654.pdf"
},
{
"trust": 1.6,
"url": "https://security.netapp.com/advisory/ntap-20220216-0006/"
},
{
"trust": 1.6,
"url": "https://www.insyde.com/security-pledge"
},
{
"trust": 1.4,
"url": "https://nvd.nist.gov/vuln/detail/cve-2021-33626"
},
{
"trust": 0.8,
"url": "cve-2020-27339 "
},
{
"trust": 0.8,
"url": "cve-2020-5953 "
},
{
"trust": 0.8,
"url": "cve-2021-33625 "
},
{
"trust": 0.8,
"url": "cve-2021-33626 "
},
{
"trust": 0.8,
"url": "cve-2021-33627 "
},
{
"trust": 0.8,
"url": "cve-2021-41837 "
},
{
"trust": 0.8,
"url": "cve-2021-41838 "
},
{
"trust": 0.8,
"url": "cve-2021-41839 "
},
{
"trust": 0.8,
"url": "cve-2021-41840 "
},
{
"trust": 0.8,
"url": "cve-2021-41841 "
},
{
"trust": 0.8,
"url": "cve-2021-42059 "
},
{
"trust": 0.8,
"url": "cve-2021-42060 "
},
{
"trust": 0.8,
"url": "cve-2021-42113 "
},
{
"trust": 0.8,
"url": "cve-2021-42554 "
},
{
"trust": 0.8,
"url": "cve-2021-43323 "
},
{
"trust": 0.8,
"url": "cve-2021-43522 "
},
{
"trust": 0.8,
"url": "cve-2021-43615 "
},
{
"trust": 0.8,
"url": "cve-2021-45969 "
},
{
"trust": 0.8,
"url": "cve-2021-45970 "
},
{
"trust": 0.8,
"url": "cve-2021-45971 "
},
{
"trust": 0.8,
"url": "cve-2022-24030 "
},
{
"trust": 0.8,
"url": "cve-2022-24031 "
},
{
"trust": 0.8,
"url": "cve-2022-24069 "
},
{
"trust": 0.8,
"url": "cve-2022-28806 "
},
{
"trust": 0.8,
"url": "https://jvn.jp/vu/jvnvu97136454/index.html"
},
{
"trust": 0.8,
"url": "https://jvn.jp/vu/jvnvu98748974/"
},
{
"trust": 0.6,
"url": "https://vigilance.fr/vulnerability/independent-bios-developers-multiple-vulnerabilities-via-uefi-37438"
},
{
"trust": 0.6,
"url": "https://support.lenovo.com/us/en/product_security/len-73436"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov"
}
],
"sources": [
{
"db": "CERT/CC",
"id": "VU#796611"
},
{
"db": "VULMON",
"id": "CVE-2021-33626"
},
{
"db": "JVNDB",
"id": "JVNDB-2021-007559"
},
{
"db": "NVD",
"id": "CVE-2021-33626"
},
{
"db": "CNNVD",
"id": "CNNVD-202109-2000"
}
]
},
"sources": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
"data": {
"@container": "@list"
}
},
"data": [
{
"db": "CERT/CC",
"id": "VU#796611"
},
{
"db": "VULMON",
"id": "CVE-2021-33626"
},
{
"db": "JVNDB",
"id": "JVNDB-2021-007559"
},
{
"db": "NVD",
"id": "CVE-2021-33626"
},
{
"db": "CNNVD",
"id": "CNNVD-202109-2000"
}
]
},
"sources_release_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2022-02-01T00:00:00",
"db": "CERT/CC",
"id": "VU#796611"
},
{
"date": "2021-10-01T00:00:00",
"db": "VULMON",
"id": "CVE-2021-33626"
},
{
"date": "2022-02-17T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2021-007559"
},
{
"date": "2021-10-01T03:15:06.593000",
"db": "NVD",
"id": "CVE-2021-33626"
},
{
"date": "2021-09-30T00:00:00",
"db": "CNNVD",
"id": "CNNVD-202109-2000"
}
]
},
"sources_update_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2022-04-26T00:00:00",
"db": "CERT/CC",
"id": "VU#796611"
},
{
"date": "2021-10-01T00:00:00",
"db": "VULMON",
"id": "CVE-2021-33626"
},
{
"date": "2022-02-28T07:09:00",
"db": "JVNDB",
"id": "JVNDB-2021-007559"
},
{
"date": "2022-04-24T02:03:42.070000",
"db": "NVD",
"id": "CVE-2021-33626"
},
{
"date": "2022-03-10T00:00:00",
"db": "CNNVD",
"id": "CNNVD-202109-2000"
}
]
},
"threat_type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/threat_type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "local",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-202109-2000"
}
],
"trust": 0.6
},
"title": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/title#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "InsydeH2O UEFI software impacted by multiple vulnerabilities in SMM",
"sources": [
{
"db": "CERT/CC",
"id": "VU#796611"
}
],
"trust": 0.8
},
"type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "other",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-202109-2000"
}
],
"trust": 0.6
}
}
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.