Vulnerability Details : CVE-2021-33626
A vulnerability exists in SMM (System Management Mode) branch that registers a SWSMI handler that does not sufficiently check or validate the allocated buffer pointer(QWORD values for CommBuffer). This can be used by an attacker to corrupt data in SMRAM memory and even lead to arbitrary code execution.
Vulnerability category: File inclusion
Products affected by CVE-2021-33626
- cpe:2.3:o:siemens:simatic_ipc427e_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:siemens:simatic_ipc477e_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:siemens:simatic_itp1000_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:siemens:simatic_field_pg_m5_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:siemens:simatic_ipc477e_pro_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:siemens:simatic_field_pg_m6_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:siemens:simatic_ipc127e_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:siemens:simatic_ipc227g_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:siemens:simatic_ipc277g_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:siemens:simatic_ipc327g_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:siemens:simatic_ipc377g_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:siemens:simatic_ipc627e_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:siemens:simatic_ipc647e_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:siemens:simatic_ipc677e_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:siemens:simatic_ipc847e_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:siemens:ruggedcom_apr1808_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:insyde:insydeh2o:*:*:*:*:*:*:*:*
- cpe:2.3:o:insyde:insydeh2o:*:*:*:*:*:*:*:*
- cpe:2.3:o:insyde:insydeh2o:*:*:*:*:*:*:*:*
- cpe:2.3:o:insyde:insydeh2o:*:*:*:*:*:*:*:*
- cpe:2.3:o:insyde:insydeh2o:*:*:*:*:*:*:*:*
- cpe:2.3:o:insyde:insydeh2o:*:*:*:*:*:*:*:*
- cpe:2.3:o:insyde:insydeh2o:*:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2021-33626
0.05%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 18 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2021-33626
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
4.6
|
MEDIUM | AV:L/AC:L/Au:N/C:P/I:P/A:P |
3.9
|
6.4
|
NIST | |
7.8
|
HIGH | CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H |
1.8
|
5.9
|
NIST |
CWE ids for CVE-2021-33626
-
The product imports, requires, or includes executable functionality (such as a library) from a source that is outside of the intended control sphere.Assigned by: nvd@nist.gov (Primary)
References for CVE-2021-33626
-
https://security.netapp.com/advisory/ntap-20220216-0006/
CVE-2021-33626 InsydeH2O Vulnerability in NetApp Products | NetApp Product SecurityThird Party Advisory
-
https://cert-portal.siemens.com/productcert/pdf/ssa-306654.pdf
Third Party Advisory
-
https://www.insyde.com/security-pledge
Insyde's Security Pledge | Insyde SoftwareVendor Advisory
-
https://www.insyde.com/security-pledge/SA-2021001
Security Advisory | Insyde SoftwareVendor Advisory
Jump to