A vulnerability exists in SMM (System Management Mode) branch that registers a SWSMI handler that does not sufficiently check or validate the allocated buffer pointer(QWORD values for CommBuffer). This can be used by an attacker to corrupt data in SMRAM memory and even lead to arbitrary code execution.
The product imports, requires, or includes executable functionality (such as a library) from a source that is outside of the intended control sphere.
Link | Tags |
---|---|
https://www.insyde.com/security-pledge | vendor advisory |
https://www.insyde.com/security-pledge/SA-2021001 | vendor advisory |
https://security.netapp.com/advisory/ntap-20220216-0006/ | third party advisory |
https://cert-portal.siemens.com/productcert/pdf/ssa-306654.pdf | third party advisory |