{"api_version":"1","generated_at":"2026-04-23T01:00:16+00:00","cve":"CVE-2022-36338","urls":{"html":"https://cve.report/CVE-2022-36338","api":"https://cve.report/api/cve/CVE-2022-36338.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2022-36338","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2022-36338"},"summary":{"title":"CVE-2022-36338","description":"An issue was discovered in Insyde InsydeH2O with kernel 5.0 through 5.5. An SMM callout vulnerability in the SMM driver FwBlockServiceSmm, creating SMM, leads to arbitrary code execution. An attacker can replace the pointer to the UEFI boot service GetVariable with a pointer to malware, and then generate a software SMI.","state":"PUBLIC","assigner":"cve@mitre.org","published_at":"2022-09-23 18:15:00","updated_at":"2022-09-27 05:01:00"},"problem_types":["NVD-CWE-noinfo"],"metrics":[],"references":[{"url":"https://www.insyde.com/security-pledge","name":"https://www.insyde.com/security-pledge","refsource":"MISC","tags":[],"title":"Insyde's Security Pledge | Insyde Software","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://www.insyde.com/security-pledge/SA-2022029","name":"https://www.insyde.com/security-pledge/SA-2022029","refsource":"MISC","tags":[],"title":"Insyde Security Advisory 2022029 | Insyde Software","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://binarly.io/advisories/BRLY-2022-017/index.html","name":"https://binarly.io/advisories/BRLY-2022-017/index.html","refsource":"MISC","tags":[],"title":"[BRLY-2022-017] SMM callout vulnerability in SMM driver (SMM arbitrary code execution).","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://www.cve.org/CVERecord?id=CVE-2022-36338","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2022-36338","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2022","cve_id":"36338","vulnerable":"1","versionEndIncluding":"5.5","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"insyde","cpe5":"insydeh2o","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[]},"source_records":{"cve_program":{"CVE_data_meta":{"ASSIGNER":"cve@mitre.org","ID":"CVE-2022-36338","STATE":"PUBLIC"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"n/a","version":{"version_data":[{"version_value":"n/a"}]}}]},"vendor_name":"n/a"}]}},"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"An issue was discovered in Insyde InsydeH2O with kernel 5.0 through 5.5. An SMM callout vulnerability in the SMM driver FwBlockServiceSmm, creating SMM, leads to arbitrary code execution. An attacker can replace the pointer to the UEFI boot service GetVariable with a pointer to malware, and then generate a software SMI."}]},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"n/a"}]}]},"references":{"reference_data":[{"url":"https://www.insyde.com/security-pledge","refsource":"MISC","name":"https://www.insyde.com/security-pledge"},{"refsource":"MISC","name":"https://binarly.io/advisories/BRLY-2022-017/index.html","url":"https://binarly.io/advisories/BRLY-2022-017/index.html"},{"refsource":"MISC","name":"https://www.insyde.com/security-pledge/SA-2022029","url":"https://www.insyde.com/security-pledge/SA-2022029"}]}},"nvd":{"publishedDate":"2022-09-23 18:15:00","lastModifiedDate":"2022-09-27 05:01:00","problem_types":["NVD-CWE-noinfo"],"metrics":{"baseMetricV3":{"cvssV3":{"version":"3.1","vectorString":"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H","attackVector":"LOCAL","attackComplexity":"LOW","privilegesRequired":"HIGH","userInteraction":"NONE","scope":"CHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH","baseScore":8.2,"baseSeverity":"HIGH"},"exploitabilityScore":1.5,"impactScore":6}},"configurations":{"CVE_data_version":"4.0","nodes":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:insyde:insydeh2o:*:*:*:*:*:*:*:*","versionStartIncluding":"5.0","versionEndIncluding":"5.5","cpe_name":[]}]}]}},"legacy_mitre":{"record":null,"notes":[]}}}