CVE-2023-22614
Summary
| CVE | CVE-2023-22614 |
|---|---|
| State | PUBLIC |
| Assigner | [email protected] |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2023-04-11 21:15:00 UTC |
| Updated | 2023-08-14 18:21:00 UTC |
| Description | An issue was discovered in ChipsetSvcSmm in Insyde InsydeH2O with kernel 5.0 through 5.5. There is insufficient input validation in BIOS Guard updates. An attacker can induce memory corruption in SMM by supplying malformed inputs to the BIOS Guard SMI handler. |
Risk And Classification
Problem Types: CWE-787
NVD Known Affected Configurations (CPE 2.3)
| Type | Vendor | Product | Version | Update | Edition | Language |
|---|---|---|---|---|---|---|
| Application | Insyde | Insydeh20 | 05.42.52.0026 | All | All | All |
| Application | Insyde | Insydeh20 | 05.43.01.0026 | All | All | All |
| Application | Insyde | Insydeh20 | 05.43.12.0056 | All | All | All |
| Application | Insyde | Insydeh20 | 05.44.34.0054 | All | All | All |
| Application | Insyde | Insydeh20 | 05.44.45.0015 | All | All | All |
| Application | Insyde | Insydeh20 | 05.44.45.0028 | All | All | All |
| Application | Insyde | Insydeh2o | 05.42.52.0026 | All | All | All |
| Application | Insyde | Insydeh2o | 05.43.01.0026 | All | All | All |
| Application | Insyde | Insydeh2o | 05.43.12.0056 | All | All | All |
| Application | Insyde | Insydeh2o | 05.44.34.0054 | All | All | All |
| Application | Insyde | Insydeh2o | 05.44.45.0015 | All | All | All |
| Application | Insyde | Insydeh2o | 05.44.45.0028 | All | All | All |
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| Stepping Insyde System Management Mode | NCC Group Research Blog | Making the world safer and more secure | MISC | research.nccgroup.com | |
| Insyde Security Advisory 2023020 | Insyde Software | MISC | www.insyde.com | |
| Insyde's Security Pledge | Insyde Software | MISC | www.insyde.com | |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
No vendor comments have been submitted for this CVE.
There are currently no legacy QID mappings associated with this CVE.