Lucene search

K
cve[email protected]CVE-2022-28806
HistoryMay 04, 2022 - 3:15 p.m.

CVE-2022-28806

2022-05-0415:15:13
CWE-787
web.nvd.nist.gov
50
cve
fujitsu liefbook
bios
security vulnerability
swsmi
smram

7.2 High

CVSS2

Attack Vector

LOCAL

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:L/AC:L/Au:N/C:C/I:C/A:C

7.8 High

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

8.2 High

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

34.0%

An issue was discovered on certain Fujitsu LIEFBOOK devices (A3510, U9310, U7511/U7411/U7311, U9311, E5510/E5410, U7510/U7410/U7310, E459/E449) with BIOS versions before v1.09 (A3510), v2.17 (U9310), v2.30 (U7511/U7411/U7311), v2.33 (U9311), v2.23 (E5510), v2.19 (U7510/U7410), v2.13 (U7310), and v1.09 (E459/E449). The FjGabiFlashCoreAbstractionSmm driver registers a Software System Management Interrupt (SWSMI) handler that is not sufficiently validated to ensure that the CommBuffer (or any other communication buffer’s nested contents) are not pointing to SMRAM contents. A potential attacker can therefore write fixed data to SMRAM, which could lead to data corruption inside this memory (e.g., change the SMI handler’s code or modify SMRAM map structures to break input pointer validation for other SMI handlers). Thus, the attacker could elevate privileges from ring 0 to ring -2 and execute arbitrary code in SMM.

Affected configurations

NVD
Node
fujitsulifebook_a3510_firmwareRange<1.09
AND
fujitsulifebook_a3510Match-
Node
fujitsulifebook_u9310_firmwareRange<2.17
AND
fujitsulifebook_u9310Match-
Node
fujitsulifebook_u7511_firmwareRange<2.30
AND
fujitsulifebook_u7511Match-
Node
fujitsulifebook_u7411_firmwareRange<2.30
AND
fujitsulifebook_u7411Match-
Node
fujitsulifebook_u7311_firmwareRange<2.30
AND
fujitsulifebook_u7311Match-
Node
fujitsulifebook_u9311_firmwareRange2.33
AND
fujitsulifebook_u9311Match-
Node
fujitsulifebook_e5510_firmwareRange<2.23
AND
fujitsulifebook_e5510Match-
Node
fujitsulifebook_u7510_firmwareRange<2.19
AND
fujitsulifebook_u7510Match-
Node
fujitsulifebook_u7410_firmwareRange<2.19
AND
fujitsulifebook_u7410Match-
Node
fujitsulifebook_u7310_firmwareRange<2.13
AND
fujitsulifebook_u7310Match-
Node
fujitsulifebook_e459_firmwareRange<1.09
AND
fujitsulifebook_e459Match-
Node
fujitsulifebook_e449_firmwareRange<1.09
AND
fujitsulifebook_e449Match-

7.2 High

CVSS2

Attack Vector

LOCAL

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:L/AC:L/Au:N/C:C/I:C/A:C

7.8 High

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

8.2 High

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

34.0%

Related for CVE-2022-28806