Vulnerability Details : CVE-2022-35894
An issue was discovered in Insyde InsydeH2O with kernel 5.0 through 5.5. The SMI handler for the FwBlockServiceSmm driver uses an untrusted pointer as the location to copy data to an attacker-specified buffer, leading to information disclosure.
Vulnerability category: Information leak
Products affected by CVE-2022-35894
- cpe:2.3:a:insyde:insydeh2o:*:*:*:*:*:*:*:*
- cpe:2.3:a:insyde:insydeh2o:*:*:*:*:*:*:*:*
- cpe:2.3:a:insyde:insydeh2o:*:*:*:*:*:*:*:*
- cpe:2.3:a:insyde:insydeh2o:*:*:*:*:*:*:*:*
- cpe:2.3:a:insyde:insydeh2o:*:*:*:*:*:*:*:*
- cpe:2.3:a:insyde:insydeh2o:*:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2022-35894
0.05%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 18 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2022-35894
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
6.0
|
MEDIUM | CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N |
1.5
|
4.0
|
NIST |
CWE ids for CVE-2022-35894
-
The product does not sufficiently track and release allocated memory after it has been used, which slowly consumes remaining memory.Assigned by: nvd@nist.gov (Primary)
References for CVE-2022-35894
-
https://www.insyde.com/security-pledge
Insyde's Security Pledge | Insyde SoftwareVendor Advisory
-
https://binarly.io/advisories/BRLY-2022-018/index.html
[BRLY-2022-018] SMM memory leak vulnerability in SMM driver (SMRAM read).Exploit;Third Party Advisory
-
https://www.insyde.com/security-pledge/SA-2022030
Insyde Security Advisory 2022030 | Insyde SoftwareVendor Advisory
Jump to