CVE-2022-30426

Published on: Not Yet Published

Last Modified on: 09/26/2022 02:35:00 PM UTC

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Certain versions of Altos T110 F3 from Acer contain the following vulnerability:

There is a stack buffer overflow vulnerability, which could lead to arbitrary code execution in UEFI DXE driver on some Acer products. An attack could exploit this vulnerability to escalate privilege from ring 3 to ring 0, and hijack control flow during UEFI DXE execution. This affects Altos T110 F3 firmware version <= P13 (latest) and AP130 F2 firmware version <= P04 (latest) and Aspire 1600X firmware version <= P11.A3L (latest) and Aspire 1602M firmware version <= P11.A3L (latest) and Aspire 7600U firmware version <= P11.A4 (latest) and Aspire MC605 firmware version <= P11.A4L (latest) and Aspire TC-105 firmware version <= P12.B0L (latest) and Aspire TC-120 firmware version <= P11-A4 (latest) and Aspire U5-620 firmware version <= P11.A1 (latest) and Aspire X1935 firmware version <= P11.A3L (latest) and Aspire X3475 firmware version <= P11.A3L (latest) and Aspire X3995 firmware version <= P11.A3L (latest) and Aspire XC100 firmware version <= P11.B3 (latest) and Aspire XC600 firmware version <= P11.A4 (latest) and Aspire Z3-615 firmware version <= P11.A2L (latest) and Veriton E430G firmware version <= P21.A1 (latest) and Veriton B630_49 firmware version <= AAP02SR (latest) and Veriton E430 firmware version <= P11.A4 (latest) and Veriton M2110G firmware version <= P21.A3 (latest) and Veriton M2120G fir.

  • CVE-2022-30426 has been assigned by URL Logo [email protected] to track the vulnerability - currently rated as HIGH severity.

CVSS3 Score: 7.8 - HIGH

Attack
Vector
Attack
Complexity
Privileges
Required
User
Interaction
LOCAL LOW LOW NONE
Scope Confidentiality
Impact
Integrity
Impact
Availability
Impact
UNCHANGED HIGH HIGH HIGH

CVE References

Description Tags Link
Acer Laptops, Desktops, Chromebooks, Monitors & Projectors | Acer United States acer.com
text/html
URL Logo MISC acer.com
vulnerabilities/CVE-2022-30426.md at main · 10TG/vulnerabilities · GitHub github.com
text/html
URL Logo MISC github.com/10TG/vulnerabilities/blob/main/Acer/CVE-2022-30426/CVE-2022-30426.md
Cyberfinder.com altos.com
text/html
URL Logo MISC altos.com

Known Affected Configurations (CPE V2.3)

Type Vendor Product Version Update Edition Language
Hardware Device InfoAcerAltos T110 F3-AllAllAll
Operating
System
AcerAltos T110 F3 FirmwareAllAllAllAll
Hardware Device InfoAcerAp130 F2-AllAllAll
Operating
System
AcerAp130 F2 FirmwareAllAllAllAll
Hardware Device InfoAcerAspire 1600x-AllAllAll
Operating
System
AcerAspire 1600x FirmwareAllAllAllAll
Hardware Device InfoAcerAspire 1602m-AllAllAll
Operating
System
AcerAspire 1602m FirmwareAllAllAllAll
Hardware Device InfoAcerAspire 7600u-AllAllAll
Operating
System
AcerAspire 7600u FirmwareAllAllAllAll
Hardware Device InfoAcerAspire Mc605-AllAllAll
Operating
System
AcerAspire Mc605 FirmwareAllAllAllAll
Hardware Device InfoAcerAspire Tc-105-AllAllAll
Operating
System
AcerAspire Tc-105 FirmwareAllAllAllAll
Hardware Device InfoAcerAspire Tc-120-AllAllAll
Operating
System
AcerAspire Tc-120 FirmwareAllAllAllAll
Hardware Device InfoAcerAspire U5-620-AllAllAll
Operating
System
AcerAspire U5-620 FirmwareAllAllAllAll
Hardware Device InfoAcerAspire X1935-AllAllAll
Operating
System
AcerAspire X1935 FirmwareAllAllAllAll
Hardware Device InfoAcerAspire X3475-AllAllAll
Operating
System
AcerAspire X3475 FirmwareAllAllAllAll
Hardware Device InfoAcerAspire X3995-AllAllAll
Operating
System
AcerAspire X3995 FirmwareAllAllAllAll
Hardware Device InfoAcerAspire Xc100-AllAllAll
Operating
System
AcerAspire Xc100 FirmwareAllAllAllAll
Hardware Device InfoAcerAspire Xc600-AllAllAll
Operating
System
AcerAspire Xc600 FirmwareAllAllAllAll
Hardware Device InfoAcerAspire Z3-615-AllAllAll
Operating
System
AcerAspire Z3-615 FirmwareAllAllAllAll
Hardware Device InfoAcerVeriton B630 49-AllAllAll
Operating
System
AcerVeriton B630 49 FirmwareAllAllAllAll
Hardware Device InfoAcerVeriton E430-AllAllAll
Hardware Device InfoAcerVeriton E430g-AllAllAll
Operating
System
AcerVeriton E430g FirmwareAllAllAllAll
Operating
System
AcerVeriton E430 FirmwareAllAllAllAll
Hardware Device InfoAcerVeriton M2110g-AllAllAll
Operating
System
AcerVeriton M2110g FirmwareAllAllAllAll
Hardware Device InfoAcerVeriton M2120g-AllAllAll
Operating
System
AcerVeriton M2120g FirmwareAllAllAllAll
Hardware Device InfoAcerVeriton M2611-AllAllAll
Hardware Device InfoAcerVeriton M2611g-AllAllAll
Operating
System
AcerVeriton M2611g FirmwareAllAllAllAll
Operating
System
AcerVeriton M2611 FirmwareAllAllAllAll
Hardware Device InfoAcerVeriton M4620-AllAllAll
Hardware Device InfoAcerVeriton M4620g-AllAllAll
Operating
System
AcerVeriton M4620g FirmwareAllAllAllAll
Operating
System
AcerVeriton M4620 FirmwareAllAllAllAll
Hardware Device InfoAcerVeriton M6620g-AllAllAll
Operating
System
AcerVeriton M6620g FirmwareAllAllAllAll
Hardware Device InfoAcerVeriton N2620g-AllAllAll
Operating
System
AcerVeriton N2620g FirmwareAllAllAllAll
Hardware Device InfoAcerVeriton N4620g-AllAllAll
Operating
System
AcerVeriton N4620g FirmwareAllAllAllAll
Hardware Device InfoAcerVeriton N4630g-AllAllAll
Operating
System
AcerVeriton N4630g FirmwareAllAllAllAll
Hardware Device InfoAcerVeriton S6620g-AllAllAll
Operating
System
AcerVeriton S6620g FirmwareAllAllAllAll
Hardware Device InfoAcerVeriton X2611-AllAllAll
Hardware Device InfoAcerVeriton X2611g-AllAllAll
Operating
System
AcerVeriton X2611g FirmwareAllAllAllAll
Operating
System
AcerVeriton X2611 FirmwareAllAllAllAll
Hardware Device InfoAcerVeriton X4620g-AllAllAll
Operating
System
AcerVeriton X4620g FirmwareAllAllAllAll
Hardware Device InfoAcerVeriton X6620g-AllAllAll
Operating
System
AcerVeriton X6620g FirmwareAllAllAllAll
Hardware Device InfoAcerVeriton Z2650g-AllAllAll
Operating
System
AcerVeriton Z2650g FirmwareAllAllAllAll
  • cpe:2.3:h:acer:altos_t110_f3:-:*:*:*:*:*:*:*:
  • cpe:2.3:o:acer:altos_t110_f3_firmware:*:*:*:*:*:*:*:*:
  • cpe:2.3:h:acer:ap130_f2:-:*:*:*:*:*:*:*:
  • cpe:2.3:o:acer:ap130_f2_firmware:*:*:*:*:*:*:*:*:
  • cpe:2.3:h:acer:aspire_1600x:-:*:*:*:*:*:*:*:
  • cpe:2.3:o:acer:aspire_1600x_firmware:*:*:*:*:*:*:*:*:
  • cpe:2.3:h:acer:aspire_1602m:-:*:*:*:*:*:*:*:
  • cpe:2.3:o:acer:aspire_1602m_firmware:*:*:*:*:*:*:*:*:
  • cpe:2.3:h:acer:aspire_7600u:-:*:*:*:*:*:*:*:
  • cpe:2.3:o:acer:aspire_7600u_firmware:*:*:*:*:*:*:*:*:
  • cpe:2.3:h:acer:aspire_mc605:-:*:*:*:*:*:*:*:
  • cpe:2.3:o:acer:aspire_mc605_firmware:*:*:*:*:*:*:*:*:
  • cpe:2.3:h:acer:aspire_tc-105:-:*:*:*:*:*:*:*:
  • cpe:2.3:o:acer:aspire_tc-105_firmware:*:*:*:*:*:*:*:*:
  • cpe:2.3:h:acer:aspire_tc-120:-:*:*:*:*:*:*:*:
  • cpe:2.3:o:acer:aspire_tc-120_firmware:*:*:*:*:*:*:*:*:
  • cpe:2.3:h:acer:aspire_u5-620:-:*:*:*:*:*:*:*:
  • cpe:2.3:o:acer:aspire_u5-620_firmware:*:*:*:*:*:*:*:*:
  • cpe:2.3:h:acer:aspire_x1935:-:*:*:*:*:*:*:*:
  • cpe:2.3:o:acer:aspire_x1935_firmware:*:*:*:*:*:*:*:*:
  • cpe:2.3:h:acer:aspire_x3475:-:*:*:*:*:*:*:*:
  • cpe:2.3:o:acer:aspire_x3475_firmware:*:*:*:*:*:*:*:*:
  • cpe:2.3:h:acer:aspire_x3995:-:*:*:*:*:*:*:*:
  • cpe:2.3:o:acer:aspire_x3995_firmware:*:*:*:*:*:*:*:*:
  • cpe:2.3:h:acer:aspire_xc100:-:*:*:*:*:*:*:*:
  • cpe:2.3:o:acer:aspire_xc100_firmware:*:*:*:*:*:*:*:*:
  • cpe:2.3:h:acer:aspire_xc600:-:*:*:*:*:*:*:*:
  • cpe:2.3:o:acer:aspire_xc600_firmware:*:*:*:*:*:*:*:*:
  • cpe:2.3:h:acer:aspire_z3-615:-:*:*:*:*:*:*:*:
  • cpe:2.3:o:acer:aspire_z3-615_firmware:*:*:*:*:*:*:*:*:
  • cpe:2.3:h:acer:veriton_b630_49:-:*:*:*:*:*:*:*:
  • cpe:2.3:o:acer:veriton_b630_49_firmware:*:*:*:*:*:*:*:*:
  • cpe:2.3:h:acer:veriton_e430:-:*:*:*:*:*:*:*:
  • cpe:2.3:h:acer:veriton_e430g:-:*:*:*:*:*:*:*:
  • cpe:2.3:o:acer:veriton_e430g_firmware:*:*:*:*:*:*:*:*:
  • cpe:2.3:o:acer:veriton_e430_firmware:*:*:*:*:*:*:*:*:
  • cpe:2.3:h:acer:veriton_m2110g:-:*:*:*:*:*:*:*:
  • cpe:2.3:o:acer:veriton_m2110g_firmware:*:*:*:*:*:*:*:*:
  • cpe:2.3:h:acer:veriton_m2120g:-:*:*:*:*:*:*:*:
  • cpe:2.3:o:acer:veriton_m2120g_firmware:*:*:*:*:*:*:*:*:
  • cpe:2.3:h:acer:veriton_m2611:-:*:*:*:*:*:*:*:
  • cpe:2.3:h:acer:veriton_m2611g:-:*:*:*:*:*:*:*:
  • cpe:2.3:o:acer:veriton_m2611g_firmware:*:*:*:*:*:*:*:*:
  • cpe:2.3:o:acer:veriton_m2611_firmware:*:*:*:*:*:*:*:*:
  • cpe:2.3:h:acer:veriton_m4620:-:*:*:*:*:*:*:*:
  • cpe:2.3:h:acer:veriton_m4620g:-:*:*:*:*:*:*:*:
  • cpe:2.3:o:acer:veriton_m4620g_firmware:*:*:*:*:*:*:*:*:
  • cpe:2.3:o:acer:veriton_m4620_firmware:*:*:*:*:*:*:*:*:
  • cpe:2.3:h:acer:veriton_m6620g:-:*:*:*:*:*:*:*:
  • cpe:2.3:o:acer:veriton_m6620g_firmware:*:*:*:*:*:*:*:*:
  • cpe:2.3:h:acer:veriton_n2620g:-:*:*:*:*:*:*:*:
  • cpe:2.3:o:acer:veriton_n2620g_firmware:*:*:*:*:*:*:*:*:
  • cpe:2.3:h:acer:veriton_n4620g:-:*:*:*:*:*:*:*:
  • cpe:2.3:o:acer:veriton_n4620g_firmware:*:*:*:*:*:*:*:*:
  • cpe:2.3:h:acer:veriton_n4630g:-:*:*:*:*:*:*:*:
  • cpe:2.3:o:acer:veriton_n4630g_firmware:*:*:*:*:*:*:*:*:
  • cpe:2.3:h:acer:veriton_s6620g:-:*:*:*:*:*:*:*:
  • cpe:2.3:o:acer:veriton_s6620g_firmware:*:*:*:*:*:*:*:*:
  • cpe:2.3:h:acer:veriton_x2611:-:*:*:*:*:*:*:*:
  • cpe:2.3:h:acer:veriton_x2611g:-:*:*:*:*:*:*:*:
  • cpe:2.3:o:acer:veriton_x2611g_firmware:*:*:*:*:*:*:*:*:
  • cpe:2.3:o:acer:veriton_x2611_firmware:*:*:*:*:*:*:*:*:
  • cpe:2.3:h:acer:veriton_x4620g:-:*:*:*:*:*:*:*:
  • cpe:2.3:o:acer:veriton_x4620g_firmware:*:*:*:*:*:*:*:*:
  • cpe:2.3:h:acer:veriton_x6620g:-:*:*:*:*:*:*:*:
  • cpe:2.3:o:acer:veriton_x6620g_firmware:*:*:*:*:*:*:*:*:
  • cpe:2.3:h:acer:veriton_z2650g:-:*:*:*:*:*:*:*:
  • cpe:2.3:o:acer:veriton_z2650g_firmware:*:*:*:*:*:*:*:*:

Social Mentions

Source Title Posted (UTC)
Twitter Icon @Robo_Alerts Potentially Critical CVE Detected! CVE-2022-30426 There is a stack buffer overflow vulnerability, which could lead… twitter.com/i/web/status/1… 2022-09-22 23:55:55
Twitter Icon @CVEreport CVE-2022-30426 : There is a stack buffer overflow vulnerability, which could lead to arbitrary code execution in UE… twitter.com/i/web/status/1… 2022-09-23 00:03:46
Reddit Logo Icon /r/netcve CVE-2022-30426 2022-09-23 00:38:31
© CVE.report 2023 Twitter Nitter Twitter Viewer |

Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user's risk. It is the responsibility of user to evaluate the accuracy, completeness or usefulness of any information, opinion, advice or other content. EACH USER WILL BE SOLELY RESPONSIBLE FOR ANY consequences of his or her direct or indirect use of this web site. ALL WARRANTIES OF ANY KIND ARE EXPRESSLY DISCLAIMED. This site will NOT BE LIABLE FOR ANY DIRECT, INDIRECT or any other kind of loss.

CVE, CWE, and OVAL are registred trademarks of The MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. This site includes MITRE data granted under the following license.

CVE.report and Source URL Uptime Status status.cve.report