Show plain JSON{"configurations": [{"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:a:insyde:insydeh2o:05.42.52.0026:*:*:*:*:*:*:*", "matchCriteriaId": "94959F4D-ACDF-4A60-A685-CBD767A2F7B0", "vulnerable": true}, {"criteria": "cpe:2.3:a:insyde:insydeh2o:05.43.01.0026:*:*:*:*:*:*:*", "matchCriteriaId": "BE92C570-EA0B-4690-851E-1A5A55318292", "vulnerable": true}, {"criteria": "cpe:2.3:a:insyde:insydeh2o:05.43.12.0056:*:*:*:*:*:*:*", "matchCriteriaId": "360DD0A8-A74E-48DC-B786-47883545AE68", "vulnerable": true}, {"criteria": "cpe:2.3:a:insyde:insydeh2o:05.44.34.0054:*:*:*:*:*:*:*", "matchCriteriaId": "CF5DC875-3A03-4494-A0FD-9FF2C4F36150", "vulnerable": true}, {"criteria": "cpe:2.3:a:insyde:insydeh2o:05.44.45.0015:*:*:*:*:*:*:*", "matchCriteriaId": "647EDD1B-C1E9-40AA-A1C5-200E9A22551C", "vulnerable": true}, {"criteria": "cpe:2.3:a:insyde:insydeh2o:05.44.45.0028:*:*:*:*:*:*:*", "matchCriteriaId": "BC773CA7-D0C5-4C3E-AA7A-8F22CDE745CD", "vulnerable": true}], "negate": false, "operator": "OR"}]}], "cveTags": [], "descriptions": [{"lang": "en", "value": "An issue was discovered in ChipsetSvcSmm in Insyde InsydeH2O with kernel 5.0 through 5.5. There is insufficient input validation in BIOS Guard updates. An attacker can induce memory corruption in SMM by supplying malformed inputs to the BIOS Guard SMI handler."}], "id": "CVE-2023-22614", "lastModified": "2025-02-11T20:15:31.860", "metrics": {"cvssMetricV31": [{"cvssData": {"attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H", "version": "3.1"}, "exploitabilityScore": 2.0, "impactScore": 6.0, "source": "nvd@nist.gov", "type": "Primary"}, {"cvssData": {"attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H", "version": "3.1"}, "exploitabilityScore": 2.0, "impactScore": 6.0, "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary"}]}, "published": "2023-04-11T21:15:17.680", "references": [{"source": "cve@mitre.org", "tags": ["Exploit", "Third Party Advisory"], "url": "https://research.nccgroup.com/2023/04/11/stepping-insyde-system-management-mode/"}, {"source": "cve@mitre.org", "tags": ["Vendor Advisory"], "url": "https://www.insyde.com/security-pledge"}, {"source": "cve@mitre.org", "tags": ["Vendor Advisory"], "url": "https://www.insyde.com/security-pledge/SA-2023020"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Exploit", "Third Party Advisory"], "url": "https://research.nccgroup.com/2023/04/11/stepping-insyde-system-management-mode/"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Vendor Advisory"], "url": "https://www.insyde.com/security-pledge"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Vendor Advisory"], "url": "https://www.insyde.com/security-pledge/SA-2023020"}], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [{"description": [{"lang": "en", "value": "CWE-787"}], "source": "nvd@nist.gov", "type": "Primary"}, {"description": [{"lang": "en", "value": "CWE-787"}], "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary"}]}