{"api_version":"1","generated_at":"2026-04-23T10:28:51+00:00","cve":"CVE-2022-24069","urls":{"html":"https://cve.report/CVE-2022-24069","api":"https://cve.report/api/cve/CVE-2022-24069.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2022-24069","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2022-24069"},"summary":{"title":"CVE-2022-24069","description":"An issue was discovered in AhciBusDxe in Insyde InsydeH2O with kernel 5.0 before 05.08.41, 5.1 before 05.16.29, 5.2 before 05.26.29, 5.3 before 05.35.29, 5.4 before 05.43.29, and 5.5 before 05.51.29. An SMM callout vulnerability allows an attacker to hijack the execution flow of code running in System Management Mode. Exploiting this issue could lead to escalating privileges to SMM.","state":"PUBLIC","assigner":"cve@mitre.org","published_at":"2022-02-03 00:15:00","updated_at":"2022-03-29 16:35:00"},"problem_types":["NVD-CWE-noinfo"],"metrics":[],"references":[{"url":"https://www.insyde.com/security-pledge","name":"https://www.insyde.com/security-pledge","refsource":"MISC","tags":[],"title":"Insyde's Security Pledge | Insyde Software","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://cert-portal.siemens.com/productcert/pdf/ssa-306654.pdf","name":"https://cert-portal.siemens.com/productcert/pdf/ssa-306654.pdf","refsource":"CONFIRM","tags":[],"title":"","mime":"application/pdf","httpstatus":"200","archivestatus":"200"},{"url":"https://security.netapp.com/advisory/ntap-20220216-0002/","name":"https://security.netapp.com/advisory/ntap-20220216-0002/","refsource":"CONFIRM","tags":[],"title":"CVE-2022-24069 InsydeH20 Vulnerability in NetApp Products | NetApp Product Security","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://www.cve.org/CVERecord?id=CVE-2022-24069","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2022-24069","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2022","cve_id":"24069","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"insyde","cpe5":"insydeh2o","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[{"cve":"CVE-2022-24069","qid":"590981","title":"Siemens Industrial Products Insyde BIOS Multiple Vulnerabilities (SSA-306654)"}]},"source_records":{"cve_program":{"CVE_data_meta":{"ASSIGNER":"cve@mitre.org","ID":"CVE-2022-24069","STATE":"PUBLIC"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"n/a","version":{"version_data":[{"version_value":"n/a"}]}}]},"vendor_name":"n/a"}]}},"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"An issue was discovered in AhciBusDxe in Insyde InsydeH2O with kernel 5.0 before 05.08.41, 5.1 before 05.16.29, 5.2 before 05.26.29, 5.3 before 05.35.29, 5.4 before 05.43.29, and 5.5 before 05.51.29. An SMM callout vulnerability allows an attacker to hijack the execution flow of code running in System Management Mode. Exploiting this issue could lead to escalating privileges to SMM."}]},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"n/a"}]}]},"references":{"reference_data":[{"url":"https://www.insyde.com/security-pledge","refsource":"MISC","name":"https://www.insyde.com/security-pledge"},{"refsource":"CONFIRM","name":"https://security.netapp.com/advisory/ntap-20220216-0002/","url":"https://security.netapp.com/advisory/ntap-20220216-0002/"},{"refsource":"CONFIRM","name":"https://cert-portal.siemens.com/productcert/pdf/ssa-306654.pdf","url":"https://cert-portal.siemens.com/productcert/pdf/ssa-306654.pdf"}]}},"nvd":{"publishedDate":"2022-02-03 00:15:00","lastModifiedDate":"2022-03-29 16:35:00","problem_types":["NVD-CWE-noinfo"],"metrics":{"baseMetricV3":{"cvssV3":{"version":"3.1","vectorString":"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H","attackVector":"LOCAL","attackComplexity":"LOW","privilegesRequired":"HIGH","userInteraction":"NONE","scope":"CHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH","baseScore":8.2,"baseSeverity":"HIGH"},"exploitabilityScore":1.5,"impactScore":6},"baseMetricV2":{"cvssV2":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:C/I:C/A:C","accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE","baseScore":7.2},"severity":"HIGH","exploitabilityScore":3.9,"impactScore":10,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}},"configurations":{"CVE_data_version":"4.0","nodes":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:insyde:insydeh2o:*:*:*:*:*:*:*:*","versionStartIncluding":"5.1","versionEndExcluding":"5.16.29","cpe_name":[]}]},{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:insyde:insydeh2o:*:*:*:*:*:*:*:*","versionStartIncluding":"5.2","versionEndExcluding":"5.26.29","cpe_name":[]}]},{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:insyde:insydeh2o:*:*:*:*:*:*:*:*","versionStartIncluding":"5.3","versionEndExcluding":"5.35.29","cpe_name":[]}]},{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:insyde:insydeh2o:*:*:*:*:*:*:*:*","versionStartIncluding":"5.0","versionEndExcluding":"5.08.29","cpe_name":[]}]},{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:insyde:insydeh2o:*:*:*:*:*:*:*:*","versionStartIncluding":"5.4","versionEndExcluding":"5.43.29","cpe_name":[]}]},{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:insyde:insydeh2o:*:*:*:*:*:*:*:*","versionStartIncluding":"5.5","versionEndExcluding":"5.51.29","cpe_name":[]}]}]}},"legacy_mitre":{"record":{"CveYear":"2022","CveId":"24069","Ordinal":"227277","Title":"CVE-2022-24069","CVE":"CVE-2022-24069","Year":"2022"},"notes":[{"CveYear":"2022","CveId":"24069","Ordinal":"1","NoteData":"An issue was discovered in AhciBusDxe in Insyde InsydeH2O with kernel 5.0 before 05.08.41, 5.1 before 05.16.29, 5.2 before 05.26.29, 5.3 before 05.35.29, 5.4 before 05.43.29, and 5.5 before 05.51.29. An SMM callout vulnerability allows an attacker to hijack the execution flow of code running in System Management Mode. Exploiting this issue could lead to escalating privileges to SMM.","Type":"Description","Title":null},{"CveYear":"2022","CveId":"24069","Ordinal":"2","NoteData":"2022-02-02","Type":"Other","Title":"Published"},{"CveYear":"2022","CveId":"24069","Ordinal":"3","NoteData":"2022-02-02","Type":"Other","Title":"Modified"}]}}}