CVE-2021-33626

high

Description

A vulnerability exists in SMM (System Management Mode) branch that registers a SWSMI handler that does not sufficiently check or validate the allocated buffer pointer(QWORD values for CommBuffer). This can be used by an attacker to corrupt data in SMRAM memory and even lead to arbitrary code execution.

References

https://www.insyde.com/security-pledge/SA-2021001

https://www.insyde.com/security-pledge

https://security.netapp.com/advisory/ntap-20220216-0006/

https://cert-portal.siemens.com/productcert/pdf/ssa-306654.pdf

Details

Source: Mitre, NVD

Published: 2021-10-01

Updated: 2022-04-24

Risk Information

CVSS v2

Base Score: 4.6

Vector: CVSS2#AV:L/AC:L/Au:N/C:P/I:P/A:P

Severity: Medium

CVSS v3

Base Score: 7.8

Vector: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Severity: High