Lucene search

K
cve[email protected]CVE-2021-33626
HistoryOct 01, 2021 - 3:15 a.m.

CVE-2021-33626

2021-10-0103:15:06
CWE-829
web.nvd.nist.gov
54
cve-2021-33626
vulnerability
smm
system management mode
swsmi
buffer pointer
commbuffer
smram
arbitrary code execution
nvd

4.6 Medium

CVSS2

Attack Vector

LOCAL

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:L/AC:L/Au:N/C:P/I:P/A:P

7.8 High

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

8 High

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

20.6%

A vulnerability exists in SMM (System Management Mode) branch that registers a SWSMI handler that does not sufficiently check or validate the allocated buffer pointer(QWORD values for CommBuffer). This can be used by an attacker to corrupt data in SMRAM memory and even lead to arbitrary code execution.

Affected configurations

NVD
Node
insydeinsydeh2oRange5.35.34.44
Node
insydeinsydeh2oRange5.25.25.44
Node
insydeinsydeh2oRange5.15.16.25
Node
insydeinsydeh2oRange5.45.42.44
Node
insydeinsydeh2oRange5.35.35.25
Node
insydeinsydeh2oRange5.25.26.25
Node
insydeinsydeh2oRange5.45.43.25
Node
siemensruggedcom_apr1808Match-
AND
siemensruggedcom_apr1808_firmwareMatch-
Node
siemenssimatic_field_pg_m5Match-
AND
siemenssimatic_field_pg_m5_firmwareMatch-
Node
siemenssimatic_field_pg_m6Match-
AND
siemenssimatic_field_pg_m6_firmwareMatch-
Node
siemenssimatic_ipc127eMatch-
AND
siemenssimatic_ipc127e_firmwareMatch-
Node
siemenssimatic_ipc227gMatch-
AND
siemenssimatic_ipc227g_firmwareMatch-
Node
siemenssimatic_ipc277gMatch-
AND
siemenssimatic_ipc277g_firmwareMatch-
Node
siemenssimatic_ipc327g_firmwareMatch-
AND
siemenssimatic_ipc327gMatch-
Node
siemenssimatic_ipc377g_firmwareMatch-
AND
siemenssimatic_ipc377gMatch-
Node
siemenssimatic_ipc427e_firmwareMatch-
AND
siemenssimatic_ipc427eMatch-
Node
siemenssimatic_ipc477e_firmwareMatch-
AND
siemenssimatic_ipc477eMatch-
Node
siemenssimatic_ipc477e_pro_firmwareMatch-
AND
siemenssimatic_ipc477e_proMatch-
Node
siemenssimatic_ipc627e_firmwareMatch-
AND
siemenssimatic_ipc627eMatch-
Node
siemenssimatic_ipc647e_firmwareMatch-
AND
siemenssimatic_ipc647eMatch-
Node
siemenssimatic_ipc677e_firmwareMatch-
AND
siemenssimatic_ipc677eMatch-
Node
siemenssimatic_ipc847e_firmwareMatch-
AND
siemenssimatic_ipc847eMatch-
Node
siemenssimatic_itp1000_firmwareMatch-
AND
siemenssimatic_itp1000Match-

4.6 Medium

CVSS2

Attack Vector

LOCAL

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:L/AC:L/Au:N/C:P/I:P/A:P

7.8 High

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

8 High

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

20.6%

Related for CVE-2021-33626