Vulnerability Details : CVE-2022-28806
An issue was discovered on certain Fujitsu LIEFBOOK devices (A3510, U9310, U7511/U7411/U7311, U9311, E5510/E5410, U7510/U7410/U7310, E459/E449) with BIOS versions before v1.09 (A3510), v2.17 (U9310), v2.30 (U7511/U7411/U7311), v2.33 (U9311), v2.23 (E5510), v2.19 (U7510/U7410), v2.13 (U7310), and v1.09 (E459/E449). The FjGabiFlashCoreAbstractionSmm driver registers a Software System Management Interrupt (SWSMI) handler that is not sufficiently validated to ensure that the CommBuffer (or any other communication buffer's nested contents) are not pointing to SMRAM contents. A potential attacker can therefore write fixed data to SMRAM, which could lead to data corruption inside this memory (e.g., change the SMI handler's code or modify SMRAM map structures to break input pointer validation for other SMI handlers). Thus, the attacker could elevate privileges from ring 0 to ring -2 and execute arbitrary code in SMM.
Vulnerability category: Memory CorruptionExecute code
Products affected by CVE-2022-28806
- cpe:2.3:o:fujitsu:lifebook_a3510_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:fujitsu:lifebook_u9310_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:fujitsu:lifebook_u7511_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:fujitsu:lifebook_u7411_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:fujitsu:lifebook_u7311_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:fujitsu:lifebook_u9311_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:fujitsu:lifebook_e5510_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:fujitsu:lifebook_u7510_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:fujitsu:lifebook_u7410_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:fujitsu:lifebook_u7310_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:fujitsu:lifebook_e459_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:fujitsu:lifebook_e449_firmware:*:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2022-28806
0.09%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 40 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2022-28806
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
7.2
|
HIGH | AV:L/AC:L/Au:N/C:C/I:C/A:C |
3.9
|
10.0
|
NIST | |
7.8
|
HIGH | CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H |
1.8
|
5.9
|
NIST |
CWE ids for CVE-2022-28806
-
The product writes data past the end, or before the beginning, of the intended buffer.Assigned by: nvd@nist.gov (Primary)
References for CVE-2022-28806
-
https://support.ts.fujitsu.com/ProductSecurity/content/Fujitsu-PSIRT-FCCL-IS-2021-090903-Security-Advisory.asp
Fujitsu Technical Support pages from Fujitsu Great Britain and Northern IrelandVendor Advisory
-
http://www.fmworld.net/biz/common/insyde/20220210/
Insyde社のUEFI(InsydeH2O)に関する脆弱性のお知らせ(CVE-2021-41837他) - FMWORLD(法人):富士通Vendor Advisory
-
https://www.binarly.io/advisories
Binarly | AI-Powered Firmware ProtectionExploit;Third Party Advisory
-
https://kb.cert.org/vuls/id/796611
VU#796611 - InsydeH2O UEFI software impacted by multiple vulnerabilities in SMMThird Party Advisory;US Government Resource
Jump to