Vulnerability Description
An issue was discovered in PnpSmm in Insyde InsydeH2O with kernel 5.0 through 5.6. There is a possible out-of-bounds access in the SMM communication buffer, leading to tampering. The PNP-related SMI sub-functions do not verify data size before getting it from the communication buffer, which could lead to possible circumstances where the data immediately following the command buffer could be destroyed with a fixed value. This is fixed in kernel 5.2 v05.28.45, kernel 5.3 v05.37.45, kernel 5.4 v05.45.45, kernel 5.5 v05.53.45, and kernel 5.6 v05.60.45.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Insyde | Kernel | >= 5.2, < 5.28.45 |
Related Weaknesses (CWE)
References
- https://www.insyde.com/security-pledge/SA-2023067Vendor Advisory
- https://www.insyde.com/security-pledge/SA-2023067Vendor Advisory
FAQ
What is CVE-2023-47252?
CVE-2023-47252 is a vulnerability with a CVSS score of 6.3 (MEDIUM). An issue was discovered in PnpSmm in Insyde InsydeH2O with kernel 5.0 through 5.6. There is a possible out-of-bounds access in the SMM communication buffer, leading to tampering. The PNP-related SMI s...
How severe is CVE-2023-47252?
CVE-2023-47252 has been rated MEDIUM with a CVSS base score of 6.3/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2023-47252?
Check the references section above for vendor advisories and patch information. Affected products include: Insyde Kernel.