Insyde's Security Pledge
Insyde Security Advisory 2022020
Insyde ID | Advisory Category | Impact of Vulnerability | Severity Rating | Original Date | Last Revised |
INSYDE-SA-2022020 | Software | AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H | 8.2 | 02/01/2022 | 02/01/2022 |
Summary:
A vulnerability exists in SMM (System Management Mode) branch that registers a SWSMI handler that does not sufficiently check or validate the allocated table variable EFI_BOOT_SERVICES. This can be used by an attacker to overwrite address location of any of the functions (FreePool,LocateHandleBuffer,HandleProtocol) to the address location of arbitrary code controlled by the attacker. On system call to SWSMI handler, the arbitrary code can be triggered to execute.
Vulnerability Details
This corresponds to CVE-2021-41839. It affects the driver NvmExpressDxe. This issue was discovered by Insyde engineering during an internal security review of several Insyde drivers and entered as a security incident on May 28, 2021. It was fixed in the following Insyde kernel versions on June 18, 2021. It was independently reported by Binarly (BRLY-2021-017) in September 2021. Kernel 5.0: Unaffected. Kernel 5.1: 05.16.25 Kernel 5.2: 05.26.25 Kernel 5.3: 05.35.25 Kernel 5.4: 05.43.25 Kernel 5.5: 05.51.25
Acknowledgements:
Insyde Software would like to thank Binarly for reporting this issue.
Revision History:
Revision | Date | Description |
1.0 | 02/01/2022 | Initial Release |
- | - | - |