{"api_version":"1","generated_at":"2026-04-23T06:59:49+00:00","cve":"CVE-2021-43323","urls":{"html":"https://cve.report/CVE-2021-43323","api":"https://cve.report/api/cve/CVE-2021-43323.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2021-43323","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2021-43323"},"summary":{"title":"CVE-2021-43323","description":"An issue was discovered in UsbCoreDxe in Insyde InsydeH2O with kernel 5.5 before 05.51.45, 5.4 before 05.43.45, 5.3 before 05.35.45, 5.2 before 05.26.45, 5.1 before 05.16.45, and 5.0 before 05.08.45. An SMM callout vulnerability allows an attacker to hijack execution flow of code running in System Management Mode. Exploiting this issue could lead to escalating privileges to SMM.","state":"PUBLIC","assigner":"cve@mitre.org","published_at":"2022-02-03 02:15:00","updated_at":"2022-03-29 16:05:00"},"problem_types":["NVD-CWE-noinfo"],"metrics":[],"references":[{"url":"https://www.insyde.com/security-pledge","name":"https://www.insyde.com/security-pledge","refsource":"MISC","tags":[],"title":"Insyde's Security Pledge | Insyde Software","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://cert-portal.siemens.com/productcert/pdf/ssa-306654.pdf","name":"https://cert-portal.siemens.com/productcert/pdf/ssa-306654.pdf","refsource":"CONFIRM","tags":[],"title":"","mime":"application/pdf","httpstatus":"200","archivestatus":"200"},{"url":"https://security.netapp.com/advisory/ntap-20220217-0013/","name":"https://security.netapp.com/advisory/ntap-20220217-0013/","refsource":"CONFIRM","tags":[],"title":"CVE-2021-43323 InsydeH20 Vulnerability in NetApp Products | NetApp Product Security","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://www.cve.org/CVERecord?id=CVE-2021-43323","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2021-43323","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2021","cve_id":"43323","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"insyde","cpe5":"insydeh2o","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[{"cve":"CVE-2021-43323","qid":"590981","title":"Siemens Industrial Products Insyde BIOS Multiple Vulnerabilities (SSA-306654)"}]},"source_records":{"cve_program":{"CVE_data_meta":{"ASSIGNER":"cve@mitre.org","ID":"CVE-2021-43323","STATE":"PUBLIC"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"n/a","version":{"version_data":[{"version_value":"n/a"}]}}]},"vendor_name":"n/a"}]}},"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"An issue was discovered in UsbCoreDxe in Insyde InsydeH2O with kernel 5.5 before 05.51.45, 5.4 before 05.43.45, 5.3 before 05.35.45, 5.2 before 05.26.45, 5.1 before 05.16.45, and 5.0 before 05.08.45. An SMM callout vulnerability allows an attacker to hijack execution flow of code running in System Management Mode. Exploiting this issue could lead to escalating privileges to SMM."}]},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"n/a"}]}]},"references":{"reference_data":[{"url":"https://www.insyde.com/security-pledge","refsource":"MISC","name":"https://www.insyde.com/security-pledge"},{"refsource":"CONFIRM","name":"https://security.netapp.com/advisory/ntap-20220217-0013/","url":"https://security.netapp.com/advisory/ntap-20220217-0013/"},{"refsource":"CONFIRM","name":"https://cert-portal.siemens.com/productcert/pdf/ssa-306654.pdf","url":"https://cert-portal.siemens.com/productcert/pdf/ssa-306654.pdf"}]}},"nvd":{"publishedDate":"2022-02-03 02:15:00","lastModifiedDate":"2022-03-29 16:05:00","problem_types":["NVD-CWE-noinfo"],"metrics":{"baseMetricV3":{"cvssV3":{"version":"3.1","vectorString":"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H","attackVector":"LOCAL","attackComplexity":"LOW","privilegesRequired":"HIGH","userInteraction":"NONE","scope":"CHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH","baseScore":8.2,"baseSeverity":"HIGH"},"exploitabilityScore":1.5,"impactScore":6},"baseMetricV2":{"cvssV2":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:C/I:C/A:C","accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE","baseScore":7.2},"severity":"HIGH","exploitabilityScore":3.9,"impactScore":10,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}},"configurations":{"CVE_data_version":"4.0","nodes":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:insyde:insydeh2o:*:*:*:*:*:*:*:*","versionStartIncluding":"5.1","versionEndExcluding":"5.16.45","cpe_name":[]}]},{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:insyde:insydeh2o:*:*:*:*:*:*:*:*","versionStartIncluding":"5.2","versionEndExcluding":"5.26.45","cpe_name":[]}]},{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:insyde:insydeh2o:*:*:*:*:*:*:*:*","versionStartIncluding":"5.3","versionEndExcluding":"5.33.45","cpe_name":[]}]},{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:insyde:insydeh2o:*:*:*:*:*:*:*:*","versionStartIncluding":"5.0","versionEndExcluding":"5.08.45","cpe_name":[]}]},{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:insyde:insydeh2o:*:*:*:*:*:*:*:*","versionStartIncluding":"5.4","versionEndExcluding":"5.43.45","cpe_name":[]}]},{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:insyde:insydeh2o:*:*:*:*:*:*:*:*","versionStartIncluding":"5.5","versionEndExcluding":"5.51.45","cpe_name":[]}]}]}},"legacy_mitre":{"record":{"CveYear":"2021","CveId":"43323","Ordinal":"220378","Title":"CVE-2021-43323","CVE":"CVE-2021-43323","Year":"2021"},"notes":[{"CveYear":"2021","CveId":"43323","Ordinal":"1","NoteData":"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.","Type":"Description","Title":null}]}}}