Vulnerability Description
A vulnerability exists in SMM (System Management Mode) branch that registers a SWSMI handler that does not sufficiently check or validate the allocated buffer pointer(QWORD values for CommBuffer). This can be used by an attacker to corrupt data in SMRAM memory and even lead to arbitrary code execution.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Insyde | Insydeh2O | >= 5.3, < 5.34.44 |
| Siemens | Ruggedcom Apr1808 Firmware | - |
| Siemens | Ruggedcom Apr1808 | - |
| Siemens | Simatic Field Pg M5 Firmware | - |
| Siemens | Simatic Field Pg M5 | - |
| Siemens | Simatic Field Pg M6 Firmware | - |
| Siemens | Simatic Field Pg M6 | - |
| Siemens | Simatic Ipc127E Firmware | - |
| Siemens | Simatic Ipc127E | - |
| Siemens | Simatic Ipc227G Firmware | - |
| Siemens | Simatic Ipc227G | - |
| Siemens | Simatic Ipc277G Firmware | - |
| Siemens | Simatic Ipc277G | - |
| Siemens | Simatic Ipc327G Firmware | - |
| Siemens | Simatic Ipc327G | - |
| Siemens | Simatic Ipc377G Firmware | - |
| Siemens | Simatic Ipc377G | - |
| Siemens | Simatic Ipc427E Firmware | - |
| Siemens | Simatic Ipc427E | - |
| Siemens | Simatic Ipc477E Firmware | - |
Related Weaknesses (CWE)
References
- https://cert-portal.siemens.com/productcert/pdf/ssa-306654.pdfThird Party Advisory
- https://security.netapp.com/advisory/ntap-20220216-0006/Third Party Advisory
- https://www.insyde.com/security-pledgeVendor Advisory
- https://www.insyde.com/security-pledge/SA-2021001Vendor Advisory
- https://cert-portal.siemens.com/productcert/pdf/ssa-306654.pdfThird Party Advisory
- https://security.netapp.com/advisory/ntap-20220216-0006/Third Party Advisory
- https://www.insyde.com/security-pledgeVendor Advisory
- https://www.insyde.com/security-pledge/SA-2021001Vendor Advisory
- https://www.kb.cert.org/vuls/id/796611
FAQ
What is CVE-2021-33626?
CVE-2021-33626 is a vulnerability with a CVSS score of 7.8 (HIGH). A vulnerability exists in SMM (System Management Mode) branch that registers a SWSMI handler that does not sufficiently check or validate the allocated buffer pointer(QWORD values for CommBuffer). Thi...
How severe is CVE-2021-33626?
CVE-2021-33626 has been rated HIGH with a CVSS base score of 7.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2021-33626?
Check the references section above for vendor advisories and patch information. Affected products include: Insyde Insydeh2O, Siemens Ruggedcom Apr1808 Firmware, Siemens Ruggedcom Apr1808, Siemens Simatic Field Pg M5 Firmware, Siemens Simatic Field Pg M5.