An issue was discovered in PnpSmm in Insyde InsydeH2O with kernel 5.0 through 5.6. There is a possible out-of-bounds access in the SMM communication buffer, leading to tampering. The PNP-related SMI sub-functions do not verify data size before getting it from the communication buffer, which could lead to possible circumstances where the data immediately following the command buffer could be destroyed with a fixed value. This is fixed in kernel 5.2 v05.28.45, kernel 5.3 v05.37.45, kernel 5.4 v05.45.45, kernel 5.5 v05.53.45, and kernel 5.6 v05.60.45.
Metrics
Affected Vendors & Products
References
| Link | Providers |
|---|---|
| https://www.insyde.com/security-pledge/SA-2023067 |
|
History
Tue, 29 Jul 2025 23:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Insyde kernel
|
|
| CPEs | cpe:2.3:o:insyde:kernel:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Insyde kernel
|
Wed, 20 Nov 2024 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-787 | |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: mitre
Published: 2024-04-26T00:00:00
Updated: 2024-11-20T15:50:18.349Z
Reserved: 2023-11-05T00:00:00
Link: CVE-2023-47252
Updated: 2024-08-02T21:09:35.794Z
Status : Analyzed
Published: 2024-04-26T03:15:06.617
Modified: 2025-07-29T23:30:00.790
Link: CVE-2023-47252
No data.