Vulnerability Details : CVE-2023-39281
A stack buffer overflow vulnerability discovered in AsfSecureBootDxe in Insyde InsydeH2O with kernel 5.0 through 5.5 allows attackers to run arbitrary code execution during the DXE phase.
Vulnerability category: Overflow
Products affected by CVE-2023-39281
- cpe:2.3:a:insyde:insydeh2o:05.45.24.0039:*:*:*:*:*:*:*
- cpe:2.3:a:insyde:insydeh2o:05.44.45.0017:*:*:*:*:*:*:*
- cpe:2.3:a:insyde:insydeh2o:05.44.34.0055:*:*:*:*:*:*:*
- cpe:2.3:a:insyde:insydeh2o:05.53.28.0013:*:*:*:*:*:*:*
- cpe:2.3:a:insyde:insydeh2o:05.45.38.0005:*:*:*:*:*:*:*
- cpe:2.3:a:insyde:insydeh2o:05.53.23.0011:*:*:*:*:*:*:*
- cpe:2.3:a:insyde:insydeh2o:05.53.23.0014:*:*:*:*:*:*:*
- cpe:2.3:a:insyde:insydeh2o:05.53.22.0008:*:*:*:*:*:*:*
- cpe:2.3:a:insyde:insydeh2o:05.44.30.0022:*:*:*:*:*:*:*
- cpe:2.3:a:insyde:insydeh2o:05.43.06.0021:*:*:*:*:*:*:*
- cpe:2.3:a:insyde:insydeh2o:05.42.37.0031:*:*:*:*:*:*:*
Max 200 conditions are displayed on this page, to prevent potential performance issues,
please refer to NVD for more details.
Exploit prediction scoring system (EPSS) score for CVE-2023-39281
0.29%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 70 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2023-39281
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
5.7
|
MEDIUM | CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:N |
0.5
|
5.2
|
134c704f-9b21-4f2e-91b3-4a467353bcc0 | 2024-09-06 |
9.8
|
CRITICAL | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H |
3.9
|
5.9
|
NIST |
CWE ids for CVE-2023-39281
-
A stack-based buffer overflow condition is a condition where the buffer being overwritten is allocated on the stack (i.e., is a local variable or, rarely, a parameter to a function).Assigned by: 134c704f-9b21-4f2e-91b3-4a467353bcc0 (Secondary)
-
The product writes data past the end, or before the beginning, of the intended buffer.Assigned by: nvd@nist.gov (Primary)
References for CVE-2023-39281
-
https://www.insyde.com/security-pledge
Insyde's Security Pledge | Insyde SoftwareVendor Advisory
-
https://www.insyde.com/security-pledge/SA-2023054
Insyde Security Advisory 2023054 | Insyde SoftwareVendor Advisory
Jump to