Vulnerability Details : CVE-2021-42113
An issue was discovered in StorageSecurityCommandDxe in Insyde InsydeH2O with Kernel 5.1 before 05.14.28, Kernel 5.2 before 05.24.28, and Kernel 5.3 before 05.32.25. An SMM callout vulnerability allows an attacker to hijack execution flow of code running in System Management Mode. Exploiting this issue could lead to escalating privileges to SMM.
Products affected by CVE-2021-42113
- cpe:2.3:a:insyde:insydeh2o:*:*:*:*:*:*:*:*
- cpe:2.3:a:insyde:insydeh2o:*:*:*:*:*:*:*:*
- cpe:2.3:a:insyde:insydeh2o:*:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2021-42113
0.08%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 24 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2021-42113
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
4.6
|
MEDIUM | AV:L/AC:L/Au:N/C:P/I:P/A:P |
3.9
|
6.4
|
NIST | |
8.2
|
HIGH | CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H |
1.5
|
6.0
|
NIST |
References for CVE-2021-42113
-
https://security.netapp.com/advisory/ntap-20220216-0012/
CVE-2021-42113 InsydeH20 Vulnerability in NetApp Products | NetApp Product SecurityThird Party Advisory
-
https://cert-portal.siemens.com/productcert/pdf/ssa-306654.pdf
Third Party Advisory
-
https://www.insyde.com/security-pledge
Insyde's Security Pledge | Insyde SoftwareVendor Advisory
-
https://www.insyde.com/security-pledge/SA-2022008
Insyde Security Advisory 2022008 | Insyde SoftwareVendor Advisory
Jump to