Versio.io

CVE-2020-27339

Common vulnerabilities & exposures (CVE)

CVE databaseCVE database blogpostRelease & EoL database
 
Published at: - 16-06-2021 06:15
Last modified: - 24-04-2022 04:00
Total changes: - 7

Description

In the kernel in Insyde InsydeH2O 5.x, certain SMM drivers did not correctly validate the CommBuffer and CommBufferSize parameters, allowing callers to corrupt either the firmware or the OS memory. The fixed versions for this issue in the AhciBusDxe, IdeBusDxe, NvmExpressDxe, SdHostDriverDxe, and SdMmcDeviceDxe drivers are 05.16.25, 05.26.25, 05.35.25, 05.43.25, and 05.51.25 (for Kernel 5.1 through 5.5).

Common Vulnerability Scoring System (CVSS)

CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
Low
Attack complexity
Local
Attack vector
High
Availability
High
Confidentiality
High
Integrity
High
Privileges required
Unchanged
Scope
None
User interaction
6.7
Base score
0.8
5.9
Exploitability score
Impact score
 

Verification logic

OR
OR
vendor=insyde AND product=insydeh2o AND versionStartIncluding=5.3 AND versionEndExcluding=5.34.44
OR
vendor=insyde AND product=insydeh2o AND versionStartIncluding=5.2 AND versionEndExcluding=5.25.44
OR
vendor=insyde AND product=insydeh2o AND versionStartIncluding=5.1 AND versionEndExcluding=5.16.25
OR
vendor=insyde AND product=insydeh2o AND versionStartIncluding=5.4 AND versionEndExcluding=5.42.44
OR
vendor=insyde AND product=insydeh2o AND versionStartIncluding=5.3 AND versionEndExcluding=5.35.25
OR
vendor=insyde AND product=insydeh2o AND versionStartIncluding=5.2 AND versionEndExcluding=5.26.25
OR
vendor=insyde AND product=insydeh2o AND versionStartIncluding=5.4 AND versionEndExcluding=5.43.25
AND
OR
vendor=siemens AND product=ruggedcom_apr1808_firmware AND version=-
OR
vendor=siemens AND product=ruggedcom_apr1808 AND version=-
AND
OR
vendor=siemens AND product=simatic_field_pg_m5_firmware AND version=-
OR
vendor=siemens AND product=simatic_field_pg_m5 AND version=-
AND
OR
vendor=siemens AND product=simatic_field_pg_m6_firmware AND version=-
OR
vendor=siemens AND product=simatic_field_pg_m6 AND version=-
AND
OR
vendor=siemens AND product=simatic_ipc127e_firmware AND version=-
OR
vendor=siemens AND product=simatic_ipc127e AND version=-
AND
OR
vendor=siemens AND product=simatic_ipc227g_firmware AND version=-
OR
vendor=siemens AND product=simatic_ipc227g AND version=-
AND
OR
vendor=siemens AND product=simatic_ipc277g_firmware AND version=-
OR
vendor=siemens AND product=simatic_ipc277g AND version=-
AND
OR
vendor=siemens AND product=simatic_ipc327g_firmware AND version=-
OR
vendor=siemens AND product=simatic_ipc327g AND version=-
AND
OR
vendor=siemens AND product=simatic_ipc377g_firmware AND version=-
OR
vendor=siemens AND product=simatic_ipc377g AND version=-
AND
OR
vendor=siemens AND product=simatic_ipc427e_firmware AND version=-
OR
vendor=siemens AND product=simatic_ipc427e AND version=-
AND
OR
vendor=siemens AND product=simatic_ipc477e_firmware AND version=-
OR
vendor=siemens AND product=simatic_ipc477e AND version=-
AND
OR
vendor=siemens AND product=simatic_ipc477e_pro_firmware AND version=-
OR
vendor=siemens AND product=simatic_ipc477e_pro AND version=-
AND
OR
vendor=siemens AND product=simatic_ipc627e_firmware AND version=-
OR
vendor=siemens AND product=simatic_ipc627e AND version=-
AND
OR
vendor=siemens AND product=simatic_ipc647e_firmware AND version=-
OR
vendor=siemens AND product=simatic_ipc647e AND version=-
AND
OR
vendor=siemens AND product=simatic_ipc677e_firmware AND version=-
OR
vendor=siemens AND product=simatic_ipc677e AND version=-
AND
OR
vendor=siemens AND product=simatic_ipc847e_firmware AND version=-
OR
vendor=siemens AND product=simatic_ipc847e AND version=-
AND
OR
vendor=siemens AND product=simatic_itp1000_firmware AND version=-
OR
vendor=siemens AND product=simatic_itp1000 AND version=-
 

Reference

 


Keywords

NVD

 

CVE-2020-27339

 

CVE

 

Common vulnerabilities & exposures

 

CVSS

 

Common vulnerability scoring system

 

Security

 

Vulnerabilities

 

Exposures

 

We use cookies to ensure that we give you the best experience on our website. Read privacy policies for more information.