A vulnerability has been identified in a signed kernel driver for the BIOS of some ThinkPad systems that can allow an attacker with Windows administrator-level privileges to call System Management Mode (SMM) services. This could lead to a denial of service attack or allow certain BIOS variables or settings to be altered (such as boot sequence). The setting or changing of BIOS passwords is not affected by this vulnerability.
Published 2016-11-30 15:59:00
Updated 2016-12-06 19:43:06
View at NVD,   CVE.org
Vulnerability category: BypassGain privilegeDenial of service

Exploit prediction scoring system (EPSS) score for CVE-2016-8222

0.04%
Probability of exploitation activity in the next 30 days EPSS Score History
~ 10 %
Percentile, the proportion of vulnerabilities that are scored at or less

CVSS scores for CVE-2016-8222

Base Score Base Severity CVSS Vector Exploitability Score Impact Score Score Source First Seen
4.7
MEDIUM AV:L/AC:M/Au:N/C:N/I:N/A:C
3.4
6.9
NIST
4.4
MEDIUM CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
0.8
3.6
NIST

CWE ids for CVE-2016-8222

  • The product does not restrict or incorrectly restricts access to a resource from an unauthorized actor.
    Assigned by: nvd@nist.gov (Primary)

References for CVE-2016-8222

Products affected by CVE-2016-8222