Vulnerability Description
EDK2 is susceptible to a vulnerability in the Tcg2MeasurePeImage() function, allowing a user to trigger a heap buffer overflow via a local network. Successful exploitation of this vulnerability may result in a compromise of confidentiality, integrity, and/or availability.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Tianocore | Edk2 | <= 202311 |
Related Weaknesses (CWE)
References
- https://github.com/tianocore/edk2/security/advisories/GHSA-4hcq-p8q8-hj8jThird Party Advisory
- https://lists.fedoraproject.org/archives/list/[email protected]
- https://github.com/tianocore/edk2/security/advisories/GHSA-4hcq-p8q8-hj8jThird Party Advisory
- https://lists.debian.org/debian-lts-announce/2025/06/msg00007.html
- https://lists.fedoraproject.org/archives/list/[email protected]
FAQ
What is CVE-2022-36764?
CVE-2022-36764 is a vulnerability with a CVSS score of 7.0 (HIGH). EDK2 is susceptible to a vulnerability in the Tcg2MeasurePeImage() function, allowing a user to trigger a heap buffer overflow via a local network. Successful exploitation of this vulnerability may re...
How severe is CVE-2022-36764?
CVE-2022-36764 has been rated HIGH with a CVSS base score of 7.0/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2022-36764?
Check the references section above for vendor advisories and patch information. Affected products include: Tianocore Edk2.