Vulnerability Details : CVE-2022-29277
Incorrect pointer checks within the the FwBlockServiceSmm driver can allow arbitrary RAM modifications During review of the FwBlockServiceSmm driver, certain instances of SpiAccessLib could be tricked into writing 0xff to arbitrary system and SMRAM addresses. Fixed in: INTEL Purley-R: 05.21.51.0048 Whitley: 05.42.23.0066 Cedar Island: 05.42.11.0021 Eagle Stream: 05.44.25.0052 Greenlow/Greenlow-R(skylake/kabylake): Trunk Mehlow/Mehlow-R (CoffeeLake-S): Trunk Tatlow (RKL-S): Trunk Denverton: 05.10.12.0042 Snow Ridge: Trunk Graneville DE: 05.05.15.0038 Grangeville DE NS: 05.27.26.0023 Bakerville: 05.21.51.0026 Idaville: 05.44.27.0030 Whiskey Lake: Trunk Comet Lake-S: Trunk Tiger Lake H/UP3: 05.43.12.0052 Alder Lake: 05.44.23.0047 Gemini Lake: Not Affected Apollo Lake: Not Affected Elkhart Lake: 05.44.30.0018 AMD ROME: trunk MILAN: 05.36.10.0017 GENOA: 05.52.25.0006 Snowy Owl: Trunk R1000: 05.32.50.0018 R2000: 05.44.30.0005 V2000: Trunk V3000: 05.44.30.0007 Ryzen 5000: 05.44.30.0004 Embedded ROME: Trunk Embedded MILAN: Trunk Hygon Hygon #1/#2: 05.36.26.0016 Hygon #3: 05.44.26.0007 https://www.insyde.com/security-pledge/SA-2022060
Vulnerability category: Memory Corruption
Products affected by CVE-2022-29277
- cpe:2.3:o:intel:alder_lake_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:intel:bakerville_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:intel:cedar_island_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:intel:idaville_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:intel:comet_lake-s_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:intel:tiger_lake_h\/up3_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:intel:whiskey_lake_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:intel:denverton_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:intel:eagle_stream_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:intel:grangeville_de_ns_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:intel:granville_de_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:intel:greenlow_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:intel:greenlow-r_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:intel:mehlow_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:intel:mehlow-r_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:intel:tatlow_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:intel:purley-r_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:intel:whitley_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:amd:ryzen_5950x_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:amd:ryzen_5800x3d_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:amd:ryzen_5900x_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:amd:ryzen_5800x_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:amd:ryzen_5600x_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:amd:ryzen_5700g_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:amd:ryzen_5600g_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:amd:ryzen_5700ge_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:amd:ryzen_5600ge_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:amd:ryzen_5300g_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:amd:ryzen_5300ge_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:amd:genoa_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:amd:hygon_1_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:amd:hygon_2_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:amd:hygon_3_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:amd:milan_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:amd:milan_firmware:*:*:*:*:embedded:*:*:*
- cpe:2.3:o:amd:rome_firmware:*:*:*:*:embedded:*:*:*
- cpe:2.3:o:amd:rome_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:amd:snowy_owl_r1000_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:amd:snowy_owl_r2000_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:amd:snowy_owl_v2000_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:amd:snowy_owl_v3000_firmware:*:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2022-29277
0.04%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 12 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2022-29277
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
8.8
|
HIGH | CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H |
2.0
|
6.0
|
NIST |
CWE ids for CVE-2022-29277
-
The product writes data past the end, or before the beginning, of the intended buffer.Assigned by: nvd@nist.gov (Primary)
References for CVE-2022-29277
-
https://www.insyde.com/security-pledge/SA-2022060
Insyde Security Advisory 2022060 | Insyde SoftwareVendor Advisory
-
https://www.insyde.com/security-pledge
Insyde's Security Pledge | Insyde SoftwareVendor Advisory
Jump to