{"api_version":"1","generated_at":"2026-04-23T01:00:10+00:00","cve":"CVE-2023-28468","urls":{"html":"https://cve.report/CVE-2023-28468","api":"https://cve.report/api/cve/CVE-2023-28468.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2023-28468","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2023-28468"},"summary":{"title":"CVE-2023-28468","description":"An issue was discovered in FvbServicesRuntimeDxe in Insyde InsydeH2O with kernel 5.0 through 5.5. The FvbServicesRuntimeDxe SMM module exposes an SMI handler that allows an attacker to interact with the SPI flash at run-time from the OS.","state":"PUBLIC","assigner":"cve@mitre.org","published_at":"2023-08-03 15:15:00","updated_at":"2023-08-09 20:48:00"},"problem_types":["CWE-863"],"metrics":[],"references":[{"url":"https://www.insyde.com/security-pledge","name":"https://www.insyde.com/security-pledge","refsource":"MISC","tags":[],"title":"Insyde's Security Pledge | Insyde Software","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://www.insyde.com/security-pledge/SA-2023039","name":"https://www.insyde.com/security-pledge/SA-2023039","refsource":"MISC","tags":[],"title":"Insyde Security Advisory 2023039 | Insyde Software","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://www.cve.org/CVERecord?id=CVE-2023-28468","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2023-28468","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2023","cve_id":"28468","vulnerable":"1","versionEndIncluding":"5.5","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"insyde","cpe5":"kernel","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[]},"source_records":{"cve_program":{"CVE_data_meta":{"ASSIGNER":"cve@mitre.org","ID":"CVE-2023-28468","STATE":"PUBLIC"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"n/a","version":{"version_data":[{"version_value":"n/a"}]}}]},"vendor_name":"n/a"}]}},"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"An issue was discovered in FvbServicesRuntimeDxe in Insyde InsydeH2O with kernel 5.0 through 5.5. The FvbServicesRuntimeDxe SMM module exposes an SMI handler that allows an attacker to interact with the SPI flash at run-time from the OS."}]},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"n/a"}]}]},"references":{"reference_data":[{"url":"https://www.insyde.com/security-pledge","refsource":"MISC","name":"https://www.insyde.com/security-pledge"},{"refsource":"MISC","name":"https://www.insyde.com/security-pledge/SA-2023039","url":"https://www.insyde.com/security-pledge/SA-2023039"}]}},"nvd":{"publishedDate":"2023-08-03 15:15:00","lastModifiedDate":"2023-08-09 20:48:00","problem_types":["CWE-863"],"metrics":{"baseMetricV3":{"cvssV3":{"version":"3.1","vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:H/A:N","attackVector":"LOCAL","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"CHANGED","confidentialityImpact":"NONE","integrityImpact":"HIGH","availabilityImpact":"NONE","baseScore":6.5,"baseSeverity":"MEDIUM"},"exploitabilityScore":2,"impactScore":4}},"configurations":{"CVE_data_version":"4.0","nodes":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:insyde:kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"5.0","versionEndIncluding":"5.5","cpe_name":[]}]}]}},"legacy_mitre":{"record":null,"notes":[]}}}