Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
Vulnerability Details :

CVE-2020-27014

Summary
Assigner-trendmicro
Assigner Org ID-7f7bd7df-cffe-4fdb-ab6d-859363b89272
Published At-29 Oct, 2020 | 23:45
Updated At-04 Aug, 2024 | 16:03
Rejected At-
Credits

Trend Micro Antivirus for Mac 2020 (Consumer) contains a race condition vulnerability in the Web Threat Protection Blocklist component, that if exploited, could allow an attacker to case a kernel panic or crash.\n\n\r\nAn attacker must first obtain the ability to execute high-privileged code on the target system in order to exploit this vulnerability.

Vendors
-
Not available
Products
-
Metrics (CVSS)
VersionBase scoreBase severityVector
Weaknesses
Attack Patterns
Solution/Workaround
References
HyperlinkResource Type
EPSS History
Score
Latest Score
-
N/A
No data available for selected date range
Percentile
Latest Percentile
-
N/A
No data available for selected date range
Stakeholder-Specific Vulnerability Categorization (SSVC)
▼Common Vulnerabilities and Exposures (CVE)
cve.org
Assigner:trendmicro
Assigner Org ID:7f7bd7df-cffe-4fdb-ab6d-859363b89272
Published At:29 Oct, 2020 | 23:45
Updated At:04 Aug, 2024 | 16:03
Rejected At:
▼CVE Numbering Authority (CNA)

Trend Micro Antivirus for Mac 2020 (Consumer) contains a race condition vulnerability in the Web Threat Protection Blocklist component, that if exploited, could allow an attacker to case a kernel panic or crash.\n\n\r\nAn attacker must first obtain the ability to execute high-privileged code on the target system in order to exploit this vulnerability.

Affected Products
Vendor
Trend Micro IncorporatedTrend Micro
Product
Trend Micro Antivirus for Mac (Consumer)
Versions
Affected
  • 2020 (v10.x) and below
Problem Types
TypeCWE IDDescription
textN/ARace Condition
Type: text
CWE ID: N/A
Description: Race Condition
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://helpcenter.trendmicro.com/en-us/article/TMKA-09974
x_refsource_MISC
https://www.zerodayinitiative.com/advisories/ZDI-20-1285/
x_refsource_MISC
Hyperlink: https://helpcenter.trendmicro.com/en-us/article/TMKA-09974
Resource:
x_refsource_MISC
Hyperlink: https://www.zerodayinitiative.com/advisories/ZDI-20-1285/
Resource:
x_refsource_MISC
▼Authorized Data Publishers (ADP)
CVE Program Container
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://helpcenter.trendmicro.com/en-us/article/TMKA-09974
x_refsource_MISC
x_transferred
https://www.zerodayinitiative.com/advisories/ZDI-20-1285/
x_refsource_MISC
x_transferred
Hyperlink: https://helpcenter.trendmicro.com/en-us/article/TMKA-09974
Resource:
x_refsource_MISC
x_transferred
Hyperlink: https://www.zerodayinitiative.com/advisories/ZDI-20-1285/
Resource:
x_refsource_MISC
x_transferred
Information is not available yet
▼National Vulnerability Database (NVD)
nvd.nist.gov
Source:security@trendmicro.com
Published At:30 Oct, 2020 | 00:15
Updated At:05 Nov, 2020 | 16:22

Trend Micro Antivirus for Mac 2020 (Consumer) contains a race condition vulnerability in the Web Threat Protection Blocklist component, that if exploited, could allow an attacker to case a kernel panic or crash.\n\n\r\nAn attacker must first obtain the ability to execute high-privileged code on the target system in order to exploit this vulnerability.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Date Added: N/A
Due Date: N/A
Vulnerability Name: N/A
Required Action: N/A
Metrics
TypeVersionBase scoreBase severityVector
Primary3.16.4MEDIUM
CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
Primary2.06.9MEDIUM
AV:L/AC:M/Au:N/C:C/I:C/A:C
Type: Primary
Version: 3.1
Base score: 6.4
Base severity: MEDIUM
Vector:
CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
Type: Primary
Version: 2.0
Base score: 6.9
Base severity: MEDIUM
Vector:
AV:L/AC:M/Au:N/C:C/I:C/A:C
CPE Matches

Trend Micro Incorporated
trendmicro
>>antivirus>>2020
cpe:2.3:a:trendmicro:antivirus:2020:*:*:*:*:macos:*:*
Weaknesses
CWE IDTypeSource
CWE-367Primarynvd@nist.gov
CWE ID: CWE-367
Type: Primary
Source: nvd@nist.gov
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
https://helpcenter.trendmicro.com/en-us/article/TMKA-09974security@trendmicro.com
Vendor Advisory
https://www.zerodayinitiative.com/advisories/ZDI-20-1285/security@trendmicro.com
Third Party Advisory
VDB Entry
Hyperlink: https://helpcenter.trendmicro.com/en-us/article/TMKA-09974
Source: security@trendmicro.com
Resource:
Vendor Advisory
Hyperlink: https://www.zerodayinitiative.com/advisories/ZDI-20-1285/
Source: security@trendmicro.com
Resource:
Third Party Advisory
VDB Entry

Change History

0
Information is not available yet

Similar CVEs

69Records found

CVE-2017-14088
Matching Score-8
Assigner-Trend Micro, Inc.
ShareView Details
Matching Score-8
Assigner-Trend Micro, Inc.
CVSS Score-7||HIGH
EPSS-0.12% / 31.53%
||
7 Day CHG~0.00%
Published-05 Oct, 2017 | 13:00
Updated-20 Apr, 2025 | 01:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Memory Corruption Privilege Escalation vulnerabilities in Trend Micro OfficeScan 11.0 and XG allows local attackers to execute arbitrary code and escalate privileges to resources normally reserved for the kernel on vulnerable installations by exploiting tmwfp.sys. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit the vulnerability.

Action-Not Available
Vendor-Trend Micro Incorporated
Product-officescan_xgofficescanTrend Micro OfficeScan
CWE ID-CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
CVE-2021-32466
Matching Score-8
Assigner-Trend Micro, Inc.
ShareView Details
Matching Score-8
Assigner-Trend Micro, Inc.
CVSS Score-7||HIGH
EPSS-0.10% / 27.36%
||
7 Day CHG~0.00%
Published-29 Sep, 2021 | 10:21
Updated-03 Aug, 2024 | 23:17
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An uncontrolled search path element privilege escalation vulnerability in Trend Micro HouseCall for Home Networks version 5.3.1225 and below could allow an attacker to escalate privileges by placing a custom crafted file in a specific directory to load a malicious library. Please note that an attacker must first obtain the ability to execute low-privileged code on the target system to exploit this vulnerability.

Action-Not Available
Vendor-Microsoft CorporationTrend Micro Incorporated
Product-windowshousecall_for_home_networksTrend Micro HouseCall for Home Networks
CWE ID-CWE-427
Uncontrolled Search Path Element
CVE-2019-15628
Matching Score-8
Assigner-Trend Micro, Inc.
ShareView Details
Matching Score-8
Assigner-Trend Micro, Inc.
CVSS Score-7.8||HIGH
EPSS-0.24% / 47.37%
||
7 Day CHG~0.00%
Published-02 Dec, 2019 | 15:45
Updated-05 Aug, 2024 | 00:56
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Trend Micro Security (Consumer) 2020 (v16.0.1221 and below) is affected by a DLL hijacking vulnerability that could allow an attacker to use a specific service as an execution and/or persistence mechanism which could execute a malicious program each time the service is started.

Action-Not Available
Vendor-Microsoft CorporationTrend Micro Incorporated
Product-antivirus_\+_security_2020premium_security_2020windowsinternet_security_2020maximum_security_2020Trend Micro Security (Consumer)
CWE ID-CWE-426
Untrusted Search Path
CVE-2022-28394
Matching Score-8
Assigner-Trend Micro, Inc.
ShareView Details
Matching Score-8
Assigner-Trend Micro, Inc.
CVSS Score-7.8||HIGH
EPSS-0.06% / 20.16%
||
7 Day CHG~0.00%
Published-26 May, 2022 | 23:25
Updated-03 Aug, 2024 | 05:56
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

EOL Product CVE - Installer of Trend Micro Password Manager (Consumer) versions 3.7.0.1223 and below provided by Trend Micro Incorporated contains an issue with the DLL search path, which may lead to insecurely loading Dynamic Link Libraries (CWE-427). Please note that this was reported on an EOL version of the product, and users are advised to upgrade to the latest supported version (5.x).

Action-Not Available
Vendor-Trend Micro Incorporated
Product-password_managerTrend Micro Password Manager
CWE ID-CWE-427
Uncontrolled Search Path Element
CVE-2020-8469
Matching Score-8
Assigner-Trend Micro, Inc.
ShareView Details
Matching Score-8
Assigner-Trend Micro, Inc.
CVSS Score-7.8||HIGH
EPSS-0.18% / 39.64%
||
7 Day CHG~0.00%
Published-12 Mar, 2020 | 23:05
Updated-04 Aug, 2024 | 10:03
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Trend Micro Password Manager for Windows version 5.0 is affected by a DLL hijacking vulnerability would could potentially allow an attacker privleged escalation.

Action-Not Available
Vendor-Trend Micro Incorporated
Product-password_managerTrend Micro Password Manager for Windows
CWE ID-CWE-427
Uncontrolled Search Path Element
CVE-2022-23120
Matching Score-8
Assigner-Trend Micro, Inc.
ShareView Details
Matching Score-8
Assigner-Trend Micro, Inc.
CVSS Score-7.8||HIGH
EPSS-1.20% / 78.03%
||
7 Day CHG~0.00%
Published-20 Jan, 2022 | 18:11
Updated-03 Aug, 2024 | 03:36
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A code injection vulnerability in Trend Micro Deep Security and Cloud One - Workload Security Agent for Linux version 20 and below could allow an attacker to escalate privileges and run arbitrary code in the context of root. Please note: an attacker must first obtain access to the target agent in an un-activated and unconfigured state in order to exploit this vulnerability.

Action-Not Available
Vendor-Trend Micro IncorporatedLinux Kernel Organization, Inc
Product-deep_security_agentlinux_kernelTrend Micro Deep Security Agent for Linux
CWE ID-CWE-94
Improper Control of Generation of Code ('Code Injection')
CVE-2020-27696
Matching Score-8
Assigner-Trend Micro, Inc.
ShareView Details
Matching Score-8
Assigner-Trend Micro, Inc.
CVSS Score-7.8||HIGH
EPSS-0.07% / 20.39%
||
7 Day CHG~0.00%
Published-18 Nov, 2020 | 18:45
Updated-04 Aug, 2024 | 16:18
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Trend Micro Security 2020 (Consumer) contains a vulnerability in the installer package that could be exploited by placing a specific Windows system directory which can lead to obtaining administrative privileges during the installation of the product.

Action-Not Available
Vendor-Microsoft CorporationTrend Micro Incorporated
Product-premium_security_2020windowsinternet_security_2020maximum_security_2020antivirus\+_security_2020Trend Micro Security (Consumer)
CVE-2020-27695
Matching Score-8
Assigner-Trend Micro, Inc.
ShareView Details
Matching Score-8
Assigner-Trend Micro, Inc.
CVSS Score-7.8||HIGH
EPSS-0.07% / 20.39%
||
7 Day CHG~0.00%
Published-18 Nov, 2020 | 18:45
Updated-04 Aug, 2024 | 16:18
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Trend Micro Security 2020 (Consumer) contains a vulnerability in the installer package that could be exploited by placing a malicious DLL in a local directory which can lead to obtaining administrative privileges during the installation of the product.

Action-Not Available
Vendor-Microsoft CorporationTrend Micro Incorporated
Product-premium_security_2020windowsinternet_security_2020maximum_security_2020antivirus\+_security_2020Trend Micro Security (Consumer)
CWE ID-CWE-426
Untrusted Search Path
CVE-2018-6236
Matching Score-8
Assigner-Trend Micro, Inc.
ShareView Details
Matching Score-8
Assigner-Trend Micro, Inc.
CVSS Score-7||HIGH
EPSS-0.05% / 13.67%
||
7 Day CHG~0.00%
Published-25 May, 2018 | 15:00
Updated-05 Aug, 2024 | 06:01
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A Time-of-Check Time-of-Use privilege escalation vulnerability in Trend Micro Maximum Security (Consumer) 2018 could allow a local attacker to escalate privileges on vulnerable installations due to a flaw within processing of IOCTL 0x222813 by the tmusa driver. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.

Action-Not Available
Vendor-Microsoft CorporationTrend Micro Incorporated
Product-premium_securityinternet_securityantivirus\+windowsmaximum_securityTrend Micro Maximum Security
CWE ID-CWE-362
Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')
CVE-2022-26319
Matching Score-8
Assigner-Trend Micro, Inc.
ShareView Details
Matching Score-8
Assigner-Trend Micro, Inc.
CVSS Score-6.5||MEDIUM
EPSS-0.04% / 12.52%
||
7 Day CHG~0.00%
Published-08 Mar, 2022 | 21:55
Updated-03 Aug, 2024 | 05:03
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An installer search patch element vulnerability in Trend Micro Portable Security 3.0 Pro, 3.0 and 2.0 could allow a local attacker to place an arbitrarily generated DLL file in an installer folder to elevate local privileges. Please note: an attacker must first obtain the ability to execute high-privileged code on the target system in order to exploit this vulnerability.

Action-Not Available
Vendor-Trend Micro Incorporated
Product-portable_securityTrend Micro Portable Security
CWE ID-CWE-427
Uncontrolled Search Path Element
CVE-2020-15602
Matching Score-8
Assigner-Trend Micro, Inc.
ShareView Details
Matching Score-8
Assigner-Trend Micro, Inc.
CVSS Score-7.8||HIGH
EPSS-0.38% / 58.65%
||
7 Day CHG~0.00%
Published-15 Jul, 2020 | 19:15
Updated-04 Aug, 2024 | 13:22
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An untrusted search path remote code execution (RCE) vulnerability in the Trend Micro Secuity 2020 (v16.0.0.1146 and below) consumer family of products could allow an attacker to run arbitrary code on a vulnerable system. As the Trend Micro installer tries to load DLL files from its current directory, an arbitrary DLL could also be loaded with the same privileges as the installer if run as Administrator. User interaction is required to exploit the vulnerbaility in that the target must open a malicious directory or device.

Action-Not Available
Vendor-Microsoft CorporationTrend Micro Incorporated
Product-premium_security_2020windowsinternet_security_2020maximum_security_2020antivirus\+_2020Trend Micro Security (Consumer)
CWE ID-CWE-426
Untrusted Search Path
CVE-2020-27697
Matching Score-8
Assigner-Trend Micro, Inc.
ShareView Details
Matching Score-8
Assigner-Trend Micro, Inc.
CVSS Score-7.8||HIGH
EPSS-0.05% / 15.36%
||
7 Day CHG~0.00%
Published-18 Nov, 2020 | 18:45
Updated-04 Aug, 2024 | 16:18
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Trend Micro Security 2020 (Consumer) contains a vulnerability in the installer package that could be exploited by placing a malicious DLL in a non-protected location with high privileges (symlink attack) which can lead to obtaining administrative privileges during the installation of the product.

Action-Not Available
Vendor-Microsoft CorporationTrend Micro Incorporated
Product-premium_security_2020windowsinternet_security_2020maximum_security_2020antivirus\+_security_2020Trend Micro Security (Consumer)
CWE ID-CWE-59
Improper Link Resolution Before File Access ('Link Following')
CVE-2024-36304
Matching Score-6
Assigner-Trend Micro, Inc.
ShareView Details
Matching Score-6
Assigner-Trend Micro, Inc.
CVSS Score-7.8||HIGH
EPSS-0.04% / 11.05%
||
7 Day CHG~0.00%
Published-10 Jun, 2024 | 21:21
Updated-16 Jun, 2025 | 20:39
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A Time-of-Check Time-Of-Use vulnerability in the Trend Micro Apex One and Apex One as a Service agent could allow a local attacker to escalate privileges on affected installations. Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.

Action-Not Available
Vendor-Trend Micro Incorporated
Product-apex_oneTrend Micro Apex OneTrend Micro Apex One as a Service
CWE ID-CWE-367
Time-of-check Time-of-use (TOCTOU) Race Condition
CVE-2023-32555
Matching Score-6
Assigner-Trend Micro, Inc.
ShareView Details
Matching Score-6
Assigner-Trend Micro, Inc.
CVSS Score-7||HIGH
EPSS-0.04% / 10.93%
||
7 Day CHG~0.00%
Published-26 Jun, 2023 | 21:56
Updated-04 Dec, 2024 | 21:24
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A Time-of-Check Time-Of-Use vulnerability in the Trend Micro Apex One and Apex One as a Service agent could allow a local attacker to escalate privileges on affected installations. Please note: a local attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. This is similar to, but not identical to CVE-2023-32554.

Action-Not Available
Vendor-Microsoft CorporationTrend Micro Incorporated
Product-apex_onewindowsTrend Micro Apex Onetrend_micro_apex_one
CWE ID-CWE-367
Time-of-check Time-of-use (TOCTOU) Race Condition
CVE-2022-48191
Matching Score-6
Assigner-Trend Micro, Inc.
ShareView Details
Matching Score-6
Assigner-Trend Micro, Inc.
CVSS Score-7||HIGH
EPSS-0.05% / 16.42%
||
7 Day CHG~0.00%
Published-18 Jan, 2023 | 23:07
Updated-03 Apr, 2025 | 20:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A vulnerability exists in Trend Micro Maximum Security 2022 (17.7) wherein a low-privileged user can write a known malicious executable to a specific location and in the process of removal and restoral an attacker could replace an original folder with a mount point to an arbitrary location, allowing a escalation of privileges on an affected system.

Action-Not Available
Vendor-Microsoft CorporationTrend Micro Incorporated
Product-maximum_security_2022windowsTrend Micro Maxium Security (Consumer)
CWE ID-CWE-367
Time-of-check Time-of-use (TOCTOU) Race Condition
CVE-2022-44651
Matching Score-6
Assigner-Trend Micro, Inc.
ShareView Details
Matching Score-6
Assigner-Trend Micro, Inc.
CVSS Score-7||HIGH
EPSS-0.06% / 18.14%
||
7 Day CHG~0.00%
Published-21 Nov, 2022 | 17:57
Updated-28 Apr, 2025 | 19:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A Time-of-Check Time-Of-Use vulnerability in the Trend Micro Apex One and Apex One as a Service agent could allow a local attacker to escalate privileges on affected installations. Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.

Action-Not Available
Vendor-Trend Micro Incorporated
Product-apex_oneTrend Micro Apex One
CWE ID-CWE-367
Time-of-check Time-of-use (TOCTOU) Race Condition
CVE-2022-41744
Matching Score-6
Assigner-Trend Micro, Inc.
ShareView Details
Matching Score-6
Assigner-Trend Micro, Inc.
CVSS Score-7||HIGH
EPSS-0.05% / 14.00%
||
7 Day CHG~0.00%
Published-10 Oct, 2022 | 00:00
Updated-03 Aug, 2024 | 12:49
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A Time-of-Check Time-Of-Use vulnerability in the Trend Micro Apex One Vulnerability Protection integrated component could allow a local attacker to escalate privileges and turn a specific working directory into a mount point on affected installations. Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.

Action-Not Available
Vendor-Microsoft CorporationTrend Micro Incorporated
Product-apex_onewindowsTrend Micro Apex One
CWE ID-CWE-367
Time-of-check Time-of-use (TOCTOU) Race Condition
CVE-2023-32554
Matching Score-6
Assigner-Trend Micro, Inc.
ShareView Details
Matching Score-6
Assigner-Trend Micro, Inc.
CVSS Score-7||HIGH
EPSS-0.04% / 10.93%
||
7 Day CHG~0.00%
Published-26 Jun, 2023 | 21:56
Updated-04 Dec, 2024 | 21:25
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A Time-of-Check Time-Of-Use vulnerability in the Trend Micro Apex One and Apex One as a Service agent could allow a local attacker to escalate privileges on affected installations. Please note: a local attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. This is similar to, but not identical to CVE-2023-32555.

Action-Not Available
Vendor-Microsoft CorporationTrend Micro Incorporated
Product-apex_onewindowsTrend Micro Apex Onetrend_micro_apex_one
CWE ID-CWE-367
Time-of-check Time-of-use (TOCTOU) Race Condition
CVE-2021-42835
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-7||HIGH
EPSS-16.91% / 94.70%
||
7 Day CHG~0.00%
Published-08 Dec, 2021 | 14:34
Updated-04 Aug, 2024 | 03:38
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An issue was discovered in Plex Media Server through 1.24.4.5081-e362dc1ee. An attacker (with a foothold in a endpoint via a low-privileged user account) can access the exposed RPC service of the update service component. This RPC functionality allows the attacker to interact with the RPC functionality and execute code from a path of his choice (local, or remote via SMB) because of a TOCTOU race condition. This code execution is in the context of the Plex update service (which runs as SYSTEM).

Action-Not Available
Vendor-plexn/aMicrosoft Corporation
Product-windowsmedia_servern/a
CWE ID-CWE-367
Time-of-check Time-of-use (TOCTOU) Race Condition
CVE-2020-14418
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-7||HIGH
EPSS-0.06% / 19.90%
||
7 Day CHG~0.00%
Published-30 Jan, 2021 | 05:26
Updated-04 Aug, 2024 | 12:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A TOCTOU vulnerability exists in madCodeHook before 2020-07-16 that allows local attackers to elevate their privileges to SYSTEM. This occurs because path redirection can occur via vectors involving directory junctions.

Action-Not Available
Vendor-madshimorphisecn/aCisco Systems, Inc.
Product-advanced_malware_protectionunified_threat_prevention_platformmadcodehookn/a
CWE ID-CWE-367
Time-of-check Time-of-use (TOCTOU) Race Condition
CVE-2021-35937
Matching Score-4
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-4
Assigner-Red Hat, Inc.
CVSS Score-6.4||MEDIUM
EPSS-0.01% / 0.44%
||
7 Day CHG~0.00%
Published-25 Aug, 2022 | 00:00
Updated-04 Aug, 2024 | 00:40
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A race condition vulnerability was found in rpm. A local unprivileged user could use this flaw to bypass the checks that were introduced in response to CVE-2017-7500 and CVE-2017-7501, potentially gaining root privileges. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.

Action-Not Available
Vendor-rpmn/aRed Hat, Inc.Fedora Project
Product-fedorarpmenterprise_linuxRPM
CWE ID-CWE-59
Improper Link Resolution Before File Access ('Link Following')
CWE ID-CWE-367
Time-of-check Time-of-use (TOCTOU) Race Condition
CVE-2021-35090
Matching Score-4
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-4
Assigner-Qualcomm, Inc.
CVSS Score-9.3||CRITICAL
EPSS-0.18% / 39.69%
||
7 Day CHG~0.00%
Published-14 Jun, 2022 | 09:51
Updated-04 Aug, 2024 | 00:33
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Possible hypervisor memory corruption due to TOC TOU race condition when updating address mappings in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Industrial IOT, Snapdragon Mobile

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-wcn3991_firmwarewcn3991wsa8830wcd9380_firmwaresd780gsd865_5gqca6431_firmwaresdx55m_firmwarewcn6856_firmwaresd888wsa8835sa8540p_firmwarewcd9380sd765g_firmwaresd888_5gqca6420_firmwareqca6390_firmwaresd690_5gwcd9370sd690_5g_firmwarewcn6855_firmwaresm7325pqca6426qrb5165n_firmwareqca6430_firmwarewcn6750wcn3998sd_8cx_firmwarewcd9385_firmwaresdxr2_5g_firmwaresd_8cx_gen2_firmwaresa9000pwcd9340_firmwarewsa8815sm7325p_firmwareqsm8350_firmwarewcn6850qsm8350sd765qca6426_firmwaresa9000p_firmwaresm7315_firmwarewcn7850sd768g_firmwarewcd9375_firmwarewcn3998_firmwareqrb5165msm7315sm7250p_firmwareqca6391sdx55mqca6420qca6436_firmwareqrb5165nqca6421_firmwareaqt1000_firmwarewcn6740_firmwaresd778gsd_8cx_gen2wcn7851qcs6490qrb5165_firmwareqrb5165m_firmwaresdxr2_5gqcm6490_firmwareqrb5165wcn6851_firmwarewcn3988_firmwareqca6430qca6421sd778g_firmwarewcd9340wsa8810_firmwaresd765gwcd9341_firmwarewsa8810sd765_firmwaresd870qca6436wcn6851wcn6855sa8540pwcn7851_firmwarewcn6856wcd9385wcd9341sd768gqca6431qcs6490_firmwaresd750gsd870_firmwarewcn6740qca6391_firmwareqca6390wcd9375sd_8cxaqt1000sd750g_firmwaresd780g_firmwarewcd9370_firmwaresd888_firmwarewsa8830_firmwaresd865_5g_firmwareqcm6490sd888_5g_firmwarewcn3988wcn6850_firmwarewcn7850_firmwarewsa8815_firmwarewsa8835_firmwaresm7250pwcn6750_firmwareSnapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Industrial IOT, Snapdragon Mobile
CWE ID-CWE-367
Time-of-check Time-of-use (TOCTOU) Race Condition
CVE-2021-34788
Matching Score-4
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-4
Assigner-Cisco Systems, Inc.
CVSS Score-7||HIGH
EPSS-0.04% / 10.65%
||
7 Day CHG~0.00%
Published-06 Oct, 2021 | 19:40
Updated-07 Nov, 2024 | 21:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Cisco AnyConnect Secure Mobility Client for Linux and Mac OS with VPN Posture (HostScan) Module Shared Library Hijacking Vulnerability

A vulnerability in the shared library loading mechanism of Cisco AnyConnect Secure Mobility Client for Linux and Mac OS could allow an authenticated, local attacker to perform a shared library hijacking attack on an affected device if the VPN Posture (HostScan) Module is installed on the AnyConnect client. This vulnerability is due to a race condition in the signature verification process for shared library files that are loaded on an affected device. An attacker could exploit this vulnerability by sending a series of crafted interprocess communication (IPC) messages to the AnyConnect process. A successful exploit could allow the attacker to execute arbitrary code on the affected device with root privileges. To exploit this vulnerability, the attacker must have a valid account on the system.

Action-Not Available
Vendor-Linux Kernel Organization, IncCisco Systems, Inc.Apple Inc.
Product-macoslinux_kernelanyconnect_secure_mobility_clientCisco AnyConnect Secure Mobility Client
CWE ID-CWE-367
Time-of-check Time-of-use (TOCTOU) Race Condition
CVE-2021-29657
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-7.4||HIGH
EPSS-0.04% / 9.77%
||
7 Day CHG~0.00%
Published-22 Jul, 2021 | 16:44
Updated-03 Aug, 2024 | 22:11
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

arch/x86/kvm/svm/nested.c in the Linux kernel before 5.11.12 has a use-after-free in which an AMD KVM guest can bypass access control on host OS MSRs when there are nested guests, aka CID-a58d9166a756. This occurs because of a TOCTOU race condition associated with a VMCB12 double fetch in nested_svm_vmrun.

Action-Not Available
Vendor-n/aLinux Kernel Organization, Inc
Product-linux_kerneln/a
CWE ID-CWE-416
Use After Free
CWE ID-CWE-367
Time-of-check Time-of-use (TOCTOU) Race Condition
CVE-2021-23892
Matching Score-4
Assigner-Trellix
ShareView Details
Matching Score-4
Assigner-Trellix
CVSS Score-8.2||HIGH
EPSS-0.08% / 25.41%
||
7 Day CHG~0.00%
Published-12 May, 2021 | 09:05
Updated-03 Aug, 2024 | 19:14
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

By exploiting a time of check to time of use (TOCTOU) race condition during the Endpoint Security for Linux Threat Prevention and Firewall (ENSL TP/FW) installation process, a local user can perform a privilege escalation attack to obtain administrator privileges for the purpose of executing arbitrary code through insecure use of predictable temporary file locations.

Action-Not Available
Vendor-McAfee, LLC
Product-endpoint_security_for_linux_threat_preventionMcAfee Endpoint Security (ENS) for Linux
CWE ID-CWE-59
Improper Link Resolution Before File Access ('Link Following')
CWE ID-CWE-367
Time-of-check Time-of-use (TOCTOU) Race Condition
CVE-2020-9939
Matching Score-4
Assigner-Apple Inc.
ShareView Details
Matching Score-4
Assigner-Apple Inc.
CVSS Score-6.4||MEDIUM
EPSS-0.04% / 12.21%
||
7 Day CHG~0.00%
Published-22 Oct, 2020 | 18:06
Updated-04 Aug, 2024 | 10:50
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

This issue was addressed with improved checks. This issue is fixed in macOS Catalina 10.15.6. A local user may be able to load unsigned kernel extensions.

Action-Not Available
Vendor-Apple Inc.
Product-mac_os_xmacOS
CWE ID-CWE-367
Time-of-check Time-of-use (TOCTOU) Race Condition
CVE-2020-8342
Matching Score-4
Assigner-Lenovo Group Ltd.
ShareView Details
Matching Score-4
Assigner-Lenovo Group Ltd.
CVSS Score-7.3||HIGH
EPSS-0.03% / 8.19%
||
7 Day CHG~0.00%
Published-15 Sep, 2020 | 14:20
Updated-17 Sep, 2024 | 00:01
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A race condition vulnerability was reported in Lenovo System Update prior to version 5.07.0106 that could allow escalation of privilege.

Action-Not Available
Vendor-Lenovo Group Limited
Product-system_updateSystem Update
CWE ID-CWE-367
Time-of-check Time-of-use (TOCTOU) Race Condition
CWE ID-CWE-362
Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')
CVE-2019-15316
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-7||HIGH
EPSS-0.05% / 15.41%
||
7 Day CHG~0.00%
Published-21 Aug, 2019 | 19:36
Updated-05 Aug, 2024 | 00:42
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Valve Steam Client for Windows through 2019-08-20 has weak folder permissions, leading to privilege escalation (to NT AUTHORITY\SYSTEM) via crafted use of CreateMountPoint.exe and SetOpLock.exe to leverage a TOCTOU race condition.

Action-Not Available
Vendor-valvesoftwaren/aMicrosoft Corporation
Product-windowssteam_clientn/a
CWE ID-CWE-732
Incorrect Permission Assignment for Critical Resource
CWE ID-CWE-367
Time-of-check Time-of-use (TOCTOU) Race Condition
CVE-2023-28576
Matching Score-4
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-4
Assigner-Qualcomm, Inc.
CVSS Score-6.4||MEDIUM
EPSS-0.02% / 4.67%
||
7 Day CHG~0.00%
Published-08 Aug, 2023 | 09:15
Updated-02 Aug, 2024 | 13:43
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Time-of-check Time-of-use (TOCTOU) Race Condition in Camera Kernel Driver

The buffer obtained from kernel APIs such as cam_mem_get_cpu_buf() may be readable/writable in userspace after kernel accesses it. In other words, user mode may race and modify the packet header (e.g. header.count), causing checks (e.g. size checks) in kernel code to be invalid. This may lead to out-of-bounds read/write issues.

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-fastconnect_7800snapdragon_865_5gwcd9380_firmwarewsa8830qcs610sw5100psd865_5gfastconnect_6900fastconnect_6800fastconnect_6900_firmwaresnapdragon_8_gen_1_firmwarewcn3988_firmwareqcn9074snapdragon_870_5gwsa8835wcn3950_firmwaresnapdragon_8_gen_1wsa8810_firmwarewcd9380wcd9341_firmwarefastconnect_7800_firmwaresw5100wsa8810qca6436qcs410snapdragon_865\+_5gsnapdragon_x55_5gqcs610_firmwaresw5100p_firmwaresxr2130wcd9370snapdragon_865\+_5g_firmwarewcn3680bqca6426sxr2130_firmwarewcd9341wcn3980qca6391_firmwarewcn3950snapdragon_xr2_5g_firmwarewcd9370_firmwarewcn3660bwsa8815snapdragon_870_5g_firmwarewsa8830_firmwaresd865_5g_firmwareqca6426_firmwarewcn3660b_firmwarewcn3988wsa8815_firmwaresnapdragon_x55_5g_firmwarewcn3680b_firmwarewsa8835_firmwaresw5100_firmwareqcn9074_firmwarefastconnect_6800_firmwareqcs410_firmwaresnapdragon_865_5g_firmwareqca6391wcn3980_firmwareqca6436_firmwaresnapdragon_xr2_5gSnapdragon
CWE ID-CWE-367
Time-of-check Time-of-use (TOCTOU) Race Condition
CVE-2020-3957
Matching Score-4
Assigner-VMware by Broadcom
ShareView Details
Matching Score-4
Assigner-VMware by Broadcom
CVSS Score-7||HIGH
EPSS-0.06% / 19.86%
||
7 Day CHG~0.00%
Published-29 May, 2020 | 19:37
Updated-04 Aug, 2024 | 07:52
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

VMware Fusion (11.x before 11.5.5), VMware Remote Console for Mac (11.x and prior) and VMware Horizon Client for Mac (5.x and prior) contain a local privilege escalation vulnerability due to a Time-of-check Time-of-use (TOCTOU) issue in the service opener. Successful exploitation of this issue may allow attackers with normal user privileges to escalate their privileges to root on the system where Fusion, VMRC and Horizon Client are installed.

Action-Not Available
Vendor-Apple Inc.VMware (Broadcom Inc.)
Product-remote_consolefusionmacoshorizon_clientVMware Remote Console for MacVMware Horizon Client for MacVMware Fusion
CWE ID-CWE-367
Time-of-check Time-of-use (TOCTOU) Race Condition
CVE-2019-14119
Matching Score-4
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-4
Assigner-Qualcomm, Inc.
CVSS Score-7||HIGH
EPSS-0.03% / 6.81%
||
7 Day CHG~0.00%
Published-08 Sep, 2020 | 09:31
Updated-05 Aug, 2024 | 00:12
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

u'While processing SMCInvoke asynchronous message header, message count is modified leading to a TOCTOU race condition and lead to memory corruption' in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wired Infrastructure and Networking in IPQ6018, Kamorta, MDM9205, MDM9607, Nicobar, QCS404, QCS405, QCS605, QCS610, Rennell, SA415M, SA515M, SA6155P, SC7180, SC8180X, SDM670, SDM710, SDX24, SDX55, SM6150, SM7150, SM8150, SM8250, SXR1130, SXR2130

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-kamorta_firmwaresa6155p_firmwareqcs610sa515m_firmwaresdx24qcs404_firmwaremdm9607_firmwaresm8250_firmwaresc8180x_firmwaresa415m_firmwareqcs405sm7150_firmwaresdm710sc7180_firmwaremdm9607sm6150sdm710_firmwaresm7150sa6155psdm670qcs610_firmwaresxr2130qcs605_firmwaresc8180xipq6018sdm670_firmwareqcs404sdx24_firmwaresm8150_firmwaresxr2130_firmwareqcs405_firmwarerennellsa415msc7180mdm9205_firmwarerennell_firmwareipq6018_firmwaremdm9205sa515mqcs605sdx55sm6150_firmwaresm8250sm8150sxr1130_firmwarekamortasdx55_firmwarenicobar_firmwaresxr1130nicobarSnapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wired Infrastructure and Networking
CWE ID-CWE-787
Out-of-bounds Write
CWE ID-CWE-367
Time-of-check Time-of-use (TOCTOU) Race Condition
CVE-2020-3680
Matching Score-4
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-4
Assigner-Qualcomm, Inc.
CVSS Score-7||HIGH
EPSS-0.02% / 4.13%
||
7 Day CHG~0.00%
Published-02 Jun, 2020 | 15:05
Updated-04 Aug, 2024 | 07:44
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A race condition can occur when using the fastrpc memory mapping API. in Snapdragon Auto, Snapdragon Compute, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Wearables in APQ8009, APQ8053, MSM8909W, MSM8917, MSM8953, QCS605, QM215, SA415M, SDM429, SDM429W, SDM439, SDM450, SDM632, SDM670, SDM710, SDM845, SDX24, SXR1130

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-msm8953sdm450sdm429wsdm632_firmwaresdm845sdm450_firmwaresdm632sdx24sdm439sdm429sa415m_firmwaresdm710msm8909w_firmwareqm215sdm429w_firmwaresdm710_firmwareapq8009apq8009_firmwaremsm8917sdm670qcs605_firmwaresdm670_firmwaresdx24_firmwaresdm439_firmwaresa415mqm215_firmwareqcs605msm8953_firmwareapq8053msm8917_firmwaresdm429_firmwaresxr1130_firmwaresxr1130msm8909wapq8053_firmwaresdm845_firmwareSnapdragon Auto, Snapdragon Compute, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Wearables
CWE ID-CWE-367
Time-of-check Time-of-use (TOCTOU) Race Condition
CVE-2023-20623
Matching Score-4
Assigner-MediaTek, Inc.
ShareView Details
Matching Score-4
Assigner-MediaTek, Inc.
CVSS Score-6.4||MEDIUM
EPSS-0.02% / 2.24%
||
7 Day CHG~0.00%
Published-07 Mar, 2023 | 00:00
Updated-06 Mar, 2025 | 17:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In ion, there is a possible escalation of privilege due to improper locking. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07559778; Issue ID: ALPS07559778.

Action-Not Available
Vendor-yoctoprojectGoogle LLCMediaTek Inc.
Product-androidmt6853tmt6833mt6739mt6779mt6885mt6735mt6763mt6875mt6769mt6757cdmt6761mt6891mt8666mt6785mt6853mt6893mt6753mt6768mt6781mt6889mt6873mt6765mt6762mt8532mt8788mt6883mt6580mt6757mt6757chmt6877mt6757cyoctomt8667mt8173mt6771mt6737MT6580, MT6735, MT6737, MT6739, MT6753, MT6757, MT6757C, MT6757CD, MT6757CH, MT6761, MT6762, MT6763, MT6765, MT6768, MT6769, MT6771, MT6779, MT6781, MT6785, MT6833, MT6853, MT6853T, MT6873, MT6875, MT6877, MT6883, MT6885, MT6889, MT6891, MT6893, MT8173, MT8532, MT8666, MT8667, MT8788
CWE ID-CWE-367
Time-of-check Time-of-use (TOCTOU) Race Condition
CVE-2023-20785
Matching Score-4
Assigner-MediaTek, Inc.
ShareView Details
Matching Score-4
Assigner-MediaTek, Inc.
CVSS Score-6.4||MEDIUM
EPSS-0.02% / 2.24%
||
7 Day CHG~0.00%
Published-07 Aug, 2023 | 03:21
Updated-04 Dec, 2024 | 15:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In audio, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07628524; Issue ID: ALPS07628524.

Action-Not Available
Vendor-Google LLCMediaTek Inc.
Product-mt6873mt6893mt6885mt6877mt6781mt6891mt6883mt6853mt6895mt6853tmt8168androidmt6875mt8797mt6889mt8791mt6779mt6785mt8781mt6879MT6779, MT6781, MT6785, MT6853, MT6853T, MT6873, MT6875, MT6877, MT6879, MT6883, MT6885, MT6889, MT6891, MT6893, MT6895, MT8168, MT8781, MT8791, MT8797
CWE ID-CWE-787
Out-of-bounds Write
CWE ID-CWE-367
Time-of-check Time-of-use (TOCTOU) Race Condition
CVE-2023-20578
Matching Score-4
Assigner-Advanced Micro Devices Inc.
ShareView Details
Matching Score-4
Assigner-Advanced Micro Devices Inc.
CVSS Score-7.5||HIGH
EPSS-0.02% / 4.11%
||
7 Day CHG~0.00%
Published-13 Aug, 2024 | 16:52
Updated-18 Mar, 2025 | 20:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A TOCTOU (Time-Of-Check-Time-Of-Use) in SMM may allow an attacker with ring0 privileges and access to the BIOS menu or UEFI shell to modify the communications buffer potentially resulting in arbitrary code execution.

Action-Not Available
Vendor-Advanced Micro Devices, Inc.
Product-epyc_9224epyc_7303epyc_7f32epyc_9754s_firmwareepyc_7272_firmwareepyc_7313pepyc_7402p_firmwareepyc_7663_firmwareepyc_7301epyc_7662_firmwareepyc_9254_firmwareepyc_7203pepyc_7313p_firmwareepyc_9174f_firmwareepyc_9384x_firmwareepyc_7551_firmwareepyc_7232p_firmwareepyc_7443pepyc_9634epyc_7203epyc_7252_firmwareepyc_7551pepyc_7742epyc_7262epyc_8324pepyc_7663epyc_9124_firmwareepyc_7713epyc_7371_firmwareepyc_9684xepyc_7351p_firmwareepyc_7262_firmwareepyc_7501epyc_7552epyc_7451_firmwareepyc_8434pn_firmwareepyc_9454p_firmwareepyc_7773x_firmwareepyc_7302p_firmwareepyc_9754sepyc_72f3_firmwareepyc_7543pepyc_7573x_firmwareepyc_8534pnepyc_7702p_firmwareepyc_7702pepyc_7702_firmwareepyc_9124epyc_9224_firmwareepyc_7502epyc_7513_firmwareepyc_8534pepyc_7763epyc_8224p_firmwareepyc_7h12_firmwareepyc_7281epyc_9754_firmwareepyc_7543_firmwareepyc_7001_firmwareepyc_8024pnepyc_7473xepyc_75f3epyc_8434pepyc_9354epyc_8434pnepyc_74f3epyc_7303pepyc_9474fepyc_9634_firmwareepyc_7502p_firmwareepyc_7302pepyc_9684x_firmwareepyc_9384xepyc_8534p_firmwareepyc_9554pepyc_72f3epyc_7552_firmwareepyc_7272epyc_8224pnepyc_8124p_firmwareepyc_7453_firmwareepyc_7713p_firmwareepyc_9334_firmwareepyc_74f3_firmwareepyc_7282_firmwareepyc_7473x_firmwareepyc_7281_firmwareepyc_7001epyc_7f72_firmwareepyc_7642_firmwareepyc_7401epyc_7f52_firmwareepyc_7f72epyc_9734epyc_7502pepyc_7551p_firmwareepyc_9184xepyc_7371epyc_9654epyc_8324pnepyc_8124pnepyc_7663pepyc_7343epyc_7313epyc_7402_firmwareepyc_7402pepyc_9454_firmwareepyc_7742_firmwareepyc_7542_firmwareepyc_8124pn_firmwareepyc_7413_firmwareepyc_9654p_firmwareepyc_9474f_firmwareepyc_9534epyc_9374fepyc_7643_firmwareepyc_7261epyc_7452_firmwareepyc_7642epyc_7401_firmwareepyc_7f32_firmwareepyc_7203p_firmwareepyc_7543p_firmwareepyc_7601epyc_9654_firmwareepyc_7251epyc_7352_firmwareepyc_9554_firmwareepyc_7763_firmwareepyc_9654pepyc_9454pepyc_7252epyc_7232pepyc_7543epyc_7301_firmwareepyc_7713_firmwareepyc_7643epyc_7663p_firmwareepyc_7662epyc_8224pn_firmwareepyc_7351epyc_7502_firmwareepyc_9274f_firmwareepyc_7532epyc_7501_firmwareepyc_7343_firmwareepyc_7643pepyc_7702epyc_7573xepyc_9534_firmwareepyc_7302epyc_7303_firmwareepyc_7513epyc_9184x_firmwareepyc_7413epyc_7453epyc_9354_firmwareepyc_8224pepyc_9374f_firmwareepyc_7443p_firmwareepyc_75f3_firmwareepyc_7h12epyc_7401p_firmwareepyc_7282epyc_7251_firmwareepyc_7373x_firmwareepyc_9254epyc_9354p_firmwareepyc_7551epyc_8024pepyc_7443_firmwareepyc_7443epyc_8024p_firmwareepyc_7203_firmwareepyc_7402epyc_9554p_firmwareepyc_7313_firmwareepyc_7601_firmwareepyc_9734_firmwareepyc_7643p_firmwareepyc_7542epyc_7452epyc_7352epyc_7261_firmwareepyc_8324p_firmwareepyc_9354pepyc_7451epyc_9174fepyc_7351_firmwareepyc_7773xepyc_7373xepyc_7532_firmwareepyc_73f3epyc_8434p_firmwareepyc_9274fepyc_8534pn_firmwareepyc_7713pepyc_9754epyc_7401pepyc_7f52epyc_8124pepyc_9454epyc_8324pn_firmwareepyc_9334epyc_7302_firmwareepyc_8024pn_firmwareepyc_73f3_firmwareepyc_7303p_firmwareepyc_9554epyc_7351pAMD EPYC™ Embedded 3000AMD Ryzen™ Embedded 7000AMD EPYC™ 7001 ProcessorsAMD Ryzen™ 6000 Series Processors with Radeon™ GraphicsAMD EPYC™ 7003 ProcessorsAMD EPYC™ Embedded 7003AMD EPYC™ 9004 ProcessorsAMD EPYC™ 7002 ProcessorsAMD RyzenTM Embedded V3000AMD Ryzen™ 7035 Series Processors with Radeon™ GraphicsAMD EPYC™ Embedded 9003AMD EPYC™ Embedded 7002AMD Ryzen™ Threadripper™ PRO 5000WX ProcessorsAMD Ryzen™ 7020 Series Processors with Radeon™ GraphicsAMD Ryzen™ 7000 Series Desktop Processorsepyc_embedded_7002epyc_embedded_7003epyc_embedded_3000epyc_7001epyc_embedded_9003epyc_7002epyc_9004ryzen_embedded_7000ryzen_embedded_v3000
CWE ID-CWE-367
Time-of-check Time-of-use (TOCTOU) Race Condition
CVE-2021-20181
Matching Score-4
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-4
Assigner-Red Hat, Inc.
CVSS Score-7.5||HIGH
EPSS-0.01% / 0.40%
||
7 Day CHG~0.00%
Published-13 May, 2021 | 15:24
Updated-03 Aug, 2024 | 17:30
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A race condition flaw was found in the 9pfs server implementation of QEMU up to and including 5.2.0. This flaw allows a malicious 9p client to cause a use-after-free error, potentially escalating their privileges on the system. The highest threat from this vulnerability is to confidentiality, integrity as well as system availability.

Action-Not Available
Vendor-n/aQEMUDebian GNU/Linux
Product-debian_linuxqemuqemu
CWE ID-CWE-367
Time-of-check Time-of-use (TOCTOU) Race Condition
CWE ID-CWE-362
Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')
CVE-2020-8354
Matching Score-4
Assigner-Lenovo Group Ltd.
ShareView Details
Matching Score-4
Assigner-Lenovo Group Ltd.
CVSS Score-6.4||MEDIUM
EPSS-0.03% / 7.54%
||
7 Day CHG~0.00%
Published-11 Nov, 2020 | 17:35
Updated-04 Aug, 2024 | 09:56
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A potential vulnerability in the SMI callback function used in the VariableServiceSmm driver in some Lenovo Notebook models may allow arbitrary code execution.

Action-Not Available
Vendor-Lenovo Group Limited
Product-notebook_firmwarenotebookBIOS
CWE ID-CWE-367
Time-of-check Time-of-use (TOCTOU) Race Condition
CVE-2020-3619
Matching Score-4
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-4
Assigner-Qualcomm, Inc.
CVSS Score-7||HIGH
EPSS-0.03% / 6.30%
||
7 Day CHG~0.00%
Published-08 Sep, 2020 | 09:31
Updated-04 Aug, 2024 | 07:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

u'Non-secure memory is touched multiple times during TrustZone\u2019s execution and can lead to privilege escalation or memory corruption' in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wired Infrastructure and Networking in APQ8009, APQ8017, APQ8053, APQ8098, IPQ8074, Kamorta, MDM9150, MDM9206, MDM9607, MDM9650, MSM8905, MSM8909, MSM8917, MSM8920, MSM8937, MSM8940, MSM8953, MSM8998, QCA8081, QCS404, QCS605, QCS610, QM215, Rennell, SA415M, SC7180, SDA660, SDA845, SDM429, SDM439, SDM450, SDM630, SDM632, SDM636, SDM660, SDM670, SDM710, SDM845, SDM850, SDX24, SM6150, SM7150, SM8150, SXR1130

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-mdm9150_firmwarekamorta_firmwareqcs610sdm632_firmwaresdm845sdm450_firmwaresdm632sdx24sdm439qcs404_firmwaremdm9650sdm429msm8940_firmwaresm7150_firmwaresm6150sm7150apq8009_firmwaremsm8917sdm670qcs605_firmwaremdm9206sdm670_firmwareqcs404sdx24_firmwareipq8074sdm636sda845_firmwaresa415mapq8098mdm9206_firmwareqcs605msm8937_firmwaremdm9650_firmwaresdm429_firmwaremsm8905_firmwaresda660sxr1130_firmwareqca8081_firmwaresxr1130apq8009msm8909_firmwareapq8053_firmwaresda845sdm850_firmwaremsm8920msm8953sdm450sdm636_firmwareapq8098_firmwaremsm8998_firmwaresdm660msm8920_firmwaresdm630mdm9607_firmwaresa415m_firmwareipq8074_firmwaresdm710qm215sc7180_firmwaremdm9607apq8017_firmwaresdm710_firmwareqca8081qcs610_firmwaremsm8937mdm9150msm8905sm8150_firmwaremsm8909sdm439_firmwarerennellsc7180sdm630_firmwaresda660_firmwarerennell_firmwareqm215_firmwaremsm8953_firmwaremsm8940sm6150_firmwareapq8053msm8917_firmwaremsm8998sm8150sdm850kamortaapq8017sdm660_firmwaresdm845_firmwareSnapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wired Infrastructure and Networking
CWE ID-CWE-787
Out-of-bounds Write
CWE ID-CWE-367
Time-of-check Time-of-use (TOCTOU) Race Condition
CVE-2022-33982
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-6.4||MEDIUM
EPSS-0.04% / 11.05%
||
7 Day CHG~0.00%
Published-14 Nov, 2022 | 00:00
Updated-30 Apr, 2025 | 21:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

DMA attacks on the parameter buffer used by the Int15ServiceSmm software SMI handler could lead to a TOCTOU attack on the SMI handler and lead to corruption of SMRAM. DMA attacks on the parameter buffer used by the software SMI handler used by the driver Int15ServiceSmm could lead to a TOCTOU attack on the SMI handler and lead to corruption of SMRAM. This issue was discovered by Insyde engineering during a security review. This issue is fixed in Kernel 5.2: 05.27.23, Kernel 5.3: 05.36.23, Kernel 5.4: 05.44.23 and Kernel 5.5: 05.52.23 CWE-367

Action-Not Available
Vendor-n/aInsyde Software Corp. (ISC)
Product-kerneln/a
CWE ID-CWE-367
Time-of-check Time-of-use (TOCTOU) Race Condition
CVE-2022-33906
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-6.4||MEDIUM
EPSS-0.04% / 11.05%
||
7 Day CHG~0.00%
Published-14 Nov, 2022 | 00:00
Updated-30 Apr, 2025 | 19:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

DMA transactions which are targeted at input buffers used for the FwBlockServiceSmm software SMI handler could cause SMRAM corruption through a TOCTOU attack. DMA transactions which are targeted at input buffers used for the software SMI handler used by the FwBlockServiceSmm driver could cause SMRAM corruption through a TOCTOU attack. This issue was discovered by Insyde engineering based on the general description provided by Intel's iSTARE group. Fixed in kernel 5.2: 05.27.23, 5.3: 05.36.23, 5.4: 05.44.23, 5.5: 05.52.23 https://www.insyde.com/security-pledge/SA-2022048

Action-Not Available
Vendor-n/aInsyde Software Corp. (ISC)
Product-kerneln/a
CWE ID-CWE-367
Time-of-check Time-of-use (TOCTOU) Race Condition
CVE-2022-32267
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-6.4||MEDIUM
EPSS-0.04% / 10.11%
||
7 Day CHG~0.00%
Published-14 Nov, 2022 | 00:00
Updated-30 Apr, 2025 | 19:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

DMA transactions which are targeted at input buffers used for the SmmResourceCheckDxe software SMI handler cause SMRAM corruption (a TOCTOU attack) DMA transactions which are targeted at input buffers used for the software SMI handler used by the SmmResourceCheckDxe driver could cause SMRAM corruption through a TOCTOU attack... This issue was discovered by Insyde engineering. Fixed in kernel Kernel 5.2: 05.27.23. Kernel 5.3: 05.36.23. Kernel 5.4: 05.44.23. Kernel 5.5: 05.52.23 https://www.insyde.com/security-pledge/SA-2022046

Action-Not Available
Vendor-n/aInsyde Software Corp. (ISC)
Product-kerneln/a
CWE ID-CWE-367
Time-of-check Time-of-use (TOCTOU) Race Condition
CVE-2022-32608
Matching Score-4
Assigner-MediaTek, Inc.
ShareView Details
Matching Score-4
Assigner-MediaTek, Inc.
CVSS Score-6.4||MEDIUM
EPSS-0.02% / 3.23%
||
7 Day CHG~0.00%
Published-08 Nov, 2022 | 00:00
Updated-02 May, 2025 | 19:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In jpeg, there is a possible use after free due to a race condition. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07388753; Issue ID: ALPS07388753.

Action-Not Available
Vendor-MediaTek Inc.Google LLC
Product-mt6893androidmt6895MT6893, MT6895
CWE ID-CWE-367
Time-of-check Time-of-use (TOCTOU) Race Condition
CVE-2022-32638
Matching Score-4
Assigner-MediaTek, Inc.
ShareView Details
Matching Score-4
Assigner-MediaTek, Inc.
CVSS Score-6.4||MEDIUM
EPSS-0.02% / 4.55%
||
7 Day CHG~0.00%
Published-03 Jan, 2023 | 00:00
Updated-10 Apr, 2025 | 16:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In isp, there is a possible out of bounds write due to a race condition. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07494449; Issue ID: ALPS07494449.

Action-Not Available
Vendor-Google LLCMediaTek Inc.
Product-mt8362amt8789mt8175mt8766androidmt6833mt6855mt8168mt8797mt8185mt6893mt8173mt8765mt6877mt8675mt8321mt6885mt8365mt8666mt8786mt6853mt8791mt8167mt8385mt6781mt8788mt8791tmt6873mt8167smt8768MT6781, MT6833, MT6853, MT6855, MT6873, MT6877, MT6885, MT6893, MT8167, MT8167S, MT8168, MT8173, MT8175, MT8185, MT8321, MT8362A, MT8365, MT8385, MT8666, MT8675, MT8765, MT8766, MT8768, MT8786, MT8788, MT8789, MT8791, MT8791T, MT8797
CWE ID-CWE-367
Time-of-check Time-of-use (TOCTOU) Race Condition
CVE-2022-21198
Matching Score-4
Assigner-Intel Corporation
ShareView Details
Matching Score-4
Assigner-Intel Corporation
CVSS Score-7.9||HIGH
EPSS-0.03% / 7.59%
||
7 Day CHG~0.00%
Published-11 Nov, 2022 | 15:49
Updated-04 Feb, 2025 | 18:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Time-of-check time-of-use race condition in the BIOS firmware for some Intel(R) Processors may allow a privileged user to potentially enable escalation of privilege via local access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-celeron_g5920celeron_5205ucore_i7-11850hceleron_g5925_firmwarecore_i5-11500tpentium_gold_g7400tcore_i7-12650hceleron_n2808_firmwareceleron_g1830core_i5-10310ycore_i3-10100t_firmwarecore_i5-12600_firmwarecore_i5-1145g7ecore_i7-10510ucore_i5-11300hpentium_gold_4415y_firmwareceleron_g1630core_i5-1030g7_firmwarecore_i7-11800hxeon_w-2223core_i5-10600tpentium_gold_4417u_firmwareceleron_g1820tecore_i7-1165g7core_i3-1220pe_firmwarecore_i5-10300hceleron_j3455_firmwareceleron_b800core_i9-12900h_firmwarecore_i3-1120g4_firmwarecore_i7-11370hcore_i7-1255uceleron_j4025core_i3-1215uceleron_b710core_i3-10105tcore_i5-1155g7_firmwarecore_i5-12600hlcore_i7-10710uceleron_n6210_firmwarecore_i9-11900t_firmwarepentium_gold_g6500celeron_g550txeon_w-3235_firmwarepentium_silver_n6005core_i7-11800h_firmwareceleron_847core_i3-11100he_firmwareceleron_g4900t_firmwareceleron_g5205u_firmwareceleron_g3900_firmwareceleron_n2805_firmwarecore_i7-12800h_firmwareceleron_n3350e_firmwarecore_i5-11600kf_firmwarecore_i5-10400hceleron_g4900_firmwarecore_i9-10900tecore_i5-1230u_firmwareceleron_1017upentium_gold_g6405_firmwarecore_i5-1145g7core_i3-10300celeron_n3050_firmwareceleron_807ue_firmwarecore_i5-1130g7core_i5-12600k_firmwareceleron_g3900t_firmwarecore_i5-1030g4_firmwarexeon_w-3365_firmwarexeon_w-1390t_firmwarepentium_gold_g5400t_firmwarecore_i3-1115g4ecore_i9-11900kf_firmwarecore_i5-12500core_i5-1245uecore_i7-1280p_firmwarepentium_gold_g5420_firmwareceleron_g460_firmwareceleron_g4900celeron_n4000core_i7-11370h_firmwarepentium_gold_g5620_firmwarexeon_w-1350_firmwarecore_i7-1068ng7xeon_w-2275_firmwarecore_i7-11390hceleron_j6412core_i9-11900fceleron_g5905t_firmwarecore_i3-1215uecore_i5-10500txeon_w-1290t_firmwarecore_i5-12600kfcore_i9-10900kfceleron_g5925core_i5-11400hceleron_2981uceleron_3965ycore_i5-12500hlceleron_2980u_firmwarecore_i5-11400tcore_i7-10810uceleron_g4930_firmwarepentium_gold_g7400t_firmwareceleron_g3900e_firmwarecore_i3-12100eceleron_b830_firmwarecore_i7-11700kfceleron_g465core_i3-10300_firmwarecore_i3-10320_firmwareceleron_g3900te_firmwarepentium_gold_g5600tcore_i3-1115g4e_firmwarecore_i7-12800hcore_i5-1135g7_firmwarepentium_gold_8505_firmwarecore_i3-10105_firmwareceleron_6600he_firmwareceleron_1017u_firmwareceleron_5205u_firmwareceleron_g3920t_firmwareceleron_n2820core_i3-11100hecore_i5-1035g4core_i9-12900kfceleron_g1840tceleron_n3150core_i7-10700fceleron_j4105core_i7-11390h_firmwarecore_i5-1145g7e_firmwarecore_i5-12500hl_firmwarecore_i7-12650h_firmwarecore_i3-10110y_firmwarexeon_w-2235core_i5-1250pcore_i5-11300h_firmwareceleron_g465_firmwarecore_i3-1215u_firmwarecore_i5-1035g7_firmwareceleron_g3930exeon_w-1250pentium_gold_g6605_firmwareceleron_2970mceleron_n4000c_firmwarecore_i7-10700e_firmwarecore_i7-1265ulceleron_g3900ecore_i7-11375h_firmwarecore_i5-1035g4_firmwareceleron_g4930t_firmwareceleron_g3930tecore_i3-1115g4core_i3-10300tceleron_g3902ecore_i3-10110ycore_i5-12450h_firmwarecore_i5-12600heceleron_g1620tceleron_1019yceleron_1020mcore_i9-11900kfceleron_797core_i3-10100_firmwareceleron_j3455e_firmwarecore_i7-12800hecore_i9-10980hk_firmwarecore_i5-1245ul_firmwareceleron_g6900t_firmwarexeon_w-1270p_firmwareceleron_n2930_firmwarecore_i7-11850he_firmwarexeon_w-3275mpentium_gold_4425y_firmwarepentium_gold_4415u_firmwareceleron_2957ucore_i3-12100celeron_g3900core_i7-1195g7core_i3-12300_firmwarepentium_gold_g5600_firmwareceleron_g3930tceleron_g4920core_i7-1260upentium_gold_g6600_firmwarexeon_w-3375celeron_n3700celeron_3855uceleron_n6211core_i5-1240u_firmwarecore_i7-1185g7e_firmwareceleron_g5305ucore_i5-12500hcore_i7-12850hx_firmwarepentium_gold_g5620core_i3-1210ucore_i7-12800hx_firmwarexeon_w-1290p_firmwareceleron_g1610_firmwareceleron_n3000core_i7-10875hceleron_j3060_firmwareceleron_3765u_firmwarecore_i5-12500ecore_i7-12700hxeon_w-1390celeron_g1830_firmwareceleron_g4930e_firmwarecore_i5-11500he_firmwareceleron_n3520_firmwareceleron_877celeron_n2807core_i7-12700_firmwareceleron_n2830celeron_n4000_firmwarecore_i9-10850kceleron_827ecore_i5-1145g7_firmwarecore_i7-11700k_firmwarecore_i7-1265uceleron_j1800core_i5-1230uceleron_g550_firmwarecore_i7-1270p_firmwarepentium_gold_4410y_firmwareceleron_g3930te_firmwarexeon_w-1370pcore_i9-12900kf_firmwarepentium_gold_g5500tcore_i5-12400core_i7-12700fcore_i7-10700kf_firmwareceleron_n3000_firmwareceleron_g3930t_firmwareceleron_g5305u_firmwareceleron_7300celeron_j6413celeron_n4020c_firmwarecore_i7-1180g7_firmwareceleron_b800_firmwarecore_i9-12900k_firmwarexeon_w-3265celeron_n2940core_i3-12100tcore_i7-1160g7celeron_n2840_firmwarecore_i9-10900ecore_i9-11900_firmwareceleron_n4000cceleron_n3450_firmwarexeon_w-3375_firmwareceleron_b810e_firmwareceleron_g3940celeron_1007u_firmwarecore_i3-1115g4_firmwarecore_i9-10900te_firmwareceleron_n6210celeron_847_firmwareceleron_g555_firmwarecore_i5-1245u_firmwareceleron_g5205ucore_i5-1235ulcore_i3-10100xeon_w-1390_firmwarecore_i5-11320hcore_i7-10750hcore_i9-11900celeron_4205ucore_i3-10100tcore_i5-10500h_firmwareceleron_3865u_firmwarecore_i5-11500pentium_gold_g6500t_firmwarepentium_gold_7505_firmwareceleron_g3950celeron_g440_firmwarecore_i3-12100texeon_w-1290celeron_g530t_firmwareceleron_n2810_firmwarexeon_w-2295_firmwarepentium_gold_g5420t_firmwarecore_i5-10500te_firmwarecore_i9-12900ksceleron_g530tcore_i3-10320xeon_w-3345_firmwarecore_i5-10310u_firmwareceleron_g3920_firmwareceleron_n4504_firmwarecore_i5-12450hceleron_j6412_firmwarecore_i7-10710u_firmwarecore_i5-12600hl_firmwarecore_i5-10600kf_firmwareceleron_g5900_firmwareceleron_n3160_firmwareceleron_807core_i5-12500tceleron_b815celeron_4305uecore_i5-10400t_firmwarexeon_w-3275celeron_n5100celeron_857_firmwarecore_i5-12600hceleron_j4005core_i3-10105t_firmwarecore_i3-12100t_firmwarecore_i5-1250pe_firmwarecore_i7-10870h_firmwarexeon_w-1290pcore_i5-10500tecore_i7-10700kfceleron_j4125_firmwarecore_i7-1185g7ecore_i3-10100tecore_i5-12600celeron_g470core_i7-10700_firmwarecore_i7-12700tcore_i9-12900epentium_gold_g5600t_firmwarecore_i9-12900hkpentium_gold_6500y_firmwarexeon_w-2235_firmwareceleron_n3700_firmwarexeon_w-2245_firmwareceleron_n3450celeron_g540xeon_w-2223_firmwarecore_i3-1220p_firmwarecore_i7-1160g7_firmwareceleron_n2920core_i5-12400f_firmwarecore_i7-11700_firmwarecore_i5-10505_firmwarecore_i7-10700te_firmwarecore_i5-10300h_firmwarexeon_w-2225_firmwareceleron_3755u_firmwareceleron_j4115xeon_w-3335_firmwareceleron_4305uceleron_867_firmwareceleron_g1610t_firmwarecore_i3-1125g4_firmwarecore_i5-12400t_firmwarecore_i7-11600h_firmwarexeon_w-2255core_i3-10105fxeon_w-3225_firmwareceleron_n2910core_i7-1065g7_firmwareceleron_j4115_firmwarecore_i7-10700f_firmwarecore_i7-1265ul_firmwarecore_i3-10300t_firmwarecore_i5-11600kcore_i9-10900kf_firmwarecore_i5-11400t_firmwareceleron_g6900core_i3-10110u_firmwarecore_i5-12600t_firmwarepentium_gold_g6405t_firmwareceleron_6305_firmwarexeon_w-1270_firmwareceleron_3955u_firmwarecore_i7-10700tcore_i7-12700core_i7-12700kf_firmwareceleron_3955uxeon_w-1350celeron_1020e_firmwarepentium_gold_g5400_firmwareceleron_n3150_firmwarecore_i5-1140g7_firmwarecore_i5-1038ng7_firmwarecore_i5-11500h_firmwarecore_i7-11600hxeon_w-3323celeron_n4020_firmwarecore_i9-10900celeron_7305_firmwarecore_i5-1235ucore_i7-11375hcore_i7-12700eceleron_2955uceleron_n5100_firmwareceleron_g3900tceleron_n4504core_i7-1255ul_firmwarecore_i7-12800hl_firmwarepentium_gold_4425ycore_i7-1250u_firmwarecore_i5-10400tcore_i3-10100y_firmwareceleron_g555core_i3-12300t_firmwarepentium_gold_g6405tceleron_3965y_firmwareceleron_g3930celeron_g1610tcore_i5-10400_firmwarecore_i5-12600kf_firmwarecore_i9-12900teceleron_g1840_firmwarexeon_w-2255_firmwarecore_i5-10500hcore_i7-10700kcore_i7-10700ecore_i9-10900tcore_i9-10900f_firmwarecore_i9-12950hxxeon_w-1370_firmwareceleron_b810_firmwarecore_i5-11500hpentium_gold_g6505_firmwareceleron_j4125xeon_w-1350p_firmwarecore_i5-11600_firmwarecore_i5-10400f_firmwareceleron_3865uxeon_w-3223core_i9-11900h_firmwarepentium_gold_8505celeron_1019y_firmwarecore_i3-12300celeron_g5905_firmwareceleron_n2840celeron_725c_firmwarecore_i5-1035g1celeron_797_firmwarecore_i5-12500_firmwarecore_i7-11850h_firmwarepentium_gold_g6505t_firmwareceleron_g540tcore_i7-10510yceleron_n4020cceleron_j6413_firmwarecore_i5-11320h_firmwarexeon_w-2295celeron_6305e_firmwarecore_i3-12100e_firmwarecore_i7-1068ng7_firmwareceleron_b810exeon_w-2225core_i5-11600t_firmwarecore_i3-10100fcore_i7-10750h_firmwareceleron_b720_firmwarecore_i5-1035g7core_i7-10870hcore_i5-11500hecore_i3-12300he_firmwarecore_i7-11700t_firmwarecore_i7-1185g7core_i9-11900f_firmwarecore_i9-12900hpentium_gold_g6605celeron_n4120core_i5-10500_firmwareceleron_n6211_firmwareceleron_807_firmwareceleron_j4105_firmwarecore_i9-11900kceleron_847e_firmwarecore_i5-12450hxceleron_n4100core_i9-10900kceleron_b720core_i7-10700t_firmwarepentium_gold_6405u_firmwarecore_i9-10900fcore_i9-12900core_i5-10500exeon_w-2265core_i7-1270pecore_i9-12900ks_firmwarecore_i7-11700celeron_g550t_firmwareceleron_g440celeron_g4900tcore_i5-10200h_firmwareceleron_g3930_firmwarecore_i5-11600k_firmwareceleron_j1900core_i5-10500pentium_gold_8500_firmwarecore_i9-12900hxceleron_g1820tcore_i9-11950h_firmwarecore_i5-10210y_firmwarepentium_silver_n6005_firmwarepentium_gold_4415ypentium_gold_g6405xeon_w-3275m_firmwareceleron_n2806_firmwareceleron_g1820core_i5-1245ue_firmwarepentium_gold_g6400_firmwarecore_i5-10600t_firmwareceleron_j1850_firmwarecore_i9-12950hx_firmwareceleron_4305ue_firmwarecore_i3-1115gre_firmwareceleron_n5105celeron_g5920_firmwareceleron_5305u_firmwarecore_i5-12400tceleron_g460core_i7-10610uceleron_b815_firmwarecore_i9-12900te_firmwarepentium_gold_g5420tcore_i3-1005g1_firmwareceleron_n3350xeon_w-3245m_firmwarexeon_w-3345core_i9-10900k_firmwarepentium_gold_g7400_firmwarecore_i9-10900_firmwareceleron_g470_firmwareceleron_j3060core_i3-1125g4celeron_g5905core_i7-11700kf_firmwarepentium_gold_g7400core_i9-12900tcore_i5-11500t_firmwarexeon_w-3365core_i7-1280pcore_i3-10105f_firmwarepentium_gold_g6505xeon_w-2265_firmwareceleron_6305xeon_w-1350pceleron_2957u_firmwareceleron_j4005_firmwareceleron_725cceleron_887pentium_gold_g6505txeon_w-1390tceleron_6305ecore_i5-12600tcore_i9-10900t_firmwarexeon_w-3323_firmwareceleron_1005mcore_i7-12700teceleron_j3160core_i5-10600kcore_i5-11260hceleron_5305ucore_i5-1245ulcore_i5-12500teceleron_887_firmwareceleron_n4500core_i5-12600hxceleron_g1630_firmwarecore_i3-1005g1core_i5-1250peceleron_j4025_firmwareceleron_n2820_firmwarecore_i7-1250ucore_i5-11600core_i7-1265u_firmwarecore_i9-10885h_firmwareceleron_867core_i5-1240pxeon_w-1290txeon_w-1370celeron_1000m_firmwarepentium_gold_g5500core_i3-1110g4_firmwareceleron_n2940_firmwareceleron_g3920core_i7-1255u_firmwarepentium_gold_6405uceleron_g1820_firmwarecore_i5-11400h_firmwareceleron_g530_firmwarecore_i5-1235ul_firmwareceleron_g4950_firmwareceleron_g1850_firmwareceleron_g4930xeon_w-2275celeron_b820_firmwareceleron_807uecore_i9-12900t_firmwarecore_i5-10200hceleron_n3060_firmwarexeon_w-3275_firmwarexeon_w-3235xeon_w-3245_firmwareceleron_6600hecore_i5-1240p_firmwarecore_i5-10210ucore_i7-11700tcore_i3-12300tcore_i3-10100e_firmwareceleron_j3355e_firmwarecore_i3-1215ulceleron_g3902e_firmwarecore_i3-1000g1_firmwareceleron_b820core_i3-12300hlcore_i7-12850hxcore_i5-12400fceleron_g4950celeron_7300_firmwarecore_i3-1210u_firmwarecore_i9-12900kcore_i3-1220pecore_i9-12900hk_firmwareceleron_n5095pentium_gold_g6600celeron_j3160_firmwarepentium_gold_g5500t_firmwarecore_i5-11400f_firmwarecore_i5-10210ycore_i9-10885hxeon_w-2245celeron_847ecore_i3-10305t_firmwareceleron_g550core_i5-11500_firmwareceleron_1020ecore_i9-11900hceleron_j1750celeron_g540_firmwarecore_i5-1030g7core_i7-10875h_firmwarecore_i5-11600tcore_i5-1240ucore_i7-10700k_firmwareceleron_g3920tceleron_g6900_firmwarecore_i3-10305tpentium_gold_g6400celeron_1007ucore_i7-1260pcore_i3-10325_firmwarexeon_w-1270pceleron_7305celeron_j1850pentium_gold_5405u_firmwarecore_i5-10600k_firmwarecore_i3-12300hepentium_gold_4417ucore_i3-10100epentium_gold_6500yceleron_4305u_firmwarecore_i7-11700fcore_i5-10600_firmwarecore_i7-12700te_firmwareceleron_g1610pentium_gold_4410ycore_i5-10400h_firmwareceleron_3755uceleron_787_firmwarecore_i7-10610u_firmwareceleron_n3010celeron_827e_firmwarepentium_gold_4415uceleron_j3355_firmwarecore_i7-1260p_firmwarecore_i7-1265ue_firmwarecore_i3-1220pcore_i3-12100te_firmwareceleron_857core_i5-1030g4celeron_1047uecore_i5-12600hx_firmwarecore_i7-12700hlxeon_w-1290_firmwarecore_i7-1180g7celeron_n5095_firmwarecore_i7-1260u_firmwareceleron_n4505_firmwareceleron_n5105_firmwareceleron_3965ucore_i7-10850hpentium_gold_g5600core_i7-12650hx_firmwarecore_i5-11600kfpentium_gold_g6400t_firmwareceleron_g3930e_firmwarepentium_gold_g6400tcore_i3-1000g4core_i7-1270pe_firmwarecore_i5-1245uceleron_2980uceleron_2981u_firmwareceleron_g4930tcore_i5-12450hx_firmwareceleron_n4020core_i7-12650hxcore_i9-11900tceleron_1020m_firmwarecore_i3-1120g4celeron_j3455ecore_i5-12500te_firmwarecore_i5-10505core_i5-1035g1_firmwarexeon_w-1250pcore_i9-12900fcore_i5-12400_firmwareceleron_3965u_firmwareceleron_g1820t_firmwarecore_i7-12800he_firmwarecore_i5-1038ng7core_i7-10810u_firmwarecore_i9-12900f_firmwarexeon_w-3225core_i9-12900hx_firmwarecore_i5-1145greceleron_3867u_firmwarexeon_w-3265_firmwarexeon_w-3245celeron_n3350_firmwarecore_i5-12500h_firmwareceleron_n4505core_i3-12100_firmwarecore_i5-1145gre_firmwarecore_i3-10100f_firmwareceleron_n2810celeron_n4100_firmwareceleron_g1620t_firmwareceleron_1037ucore_i9-10850k_firmwarecore_i7-12700k_firmwareceleron_g5900tceleron_877_firmwarecore_i5-1155g7celeron_g3940_firmwarecore_i5-10500e_firmwarecore_i5-11400fceleron_n4120_firmwarecore_i7-12700f_firmwareceleron_2955u_firmwareceleron_g1840t_firmwareceleron_g6900tcore_i3-12100f_firmwarecore_i7-10700tecore_i5-11400core_i7-10510u_firmwareceleron_n2830_firmwareceleron_927ue_firmwarecore_i7-11700f_firmwareceleron_g5900core_i5-12500t_firmwarecore_i7-11850hecore_i7-1060g7_firmwarecore_i5-10210u_firmwareceleron_1037u_firmwarepentium_gold_7505pentium_gold_g5400core_i3-10105celeron_j3355core_i7-10850h_firmwarecore_i3-10110ucore_i7-11700kceleron_n2808celeron_g3900tecore_i5-1235u_firmwarecore_i5-10600celeron_g1820te_firmwarecore_i5-12500e_firmwarecore_i5-11260h_firmwareceleron_n3160core_i5-10400fcore_i5-1250p_firmwareceleron_1000mceleron_g1620_firmwareceleron_j3455core_i3-10100yceleron_g4920_firmwarecore_i5-12600kxeon_w-1370p_firmwarecore_i3-1110g4core_i5-1135g7pentium_gold_g6500_firmwarecore_i3-1000g1core_i5-1130g7_firmwarecore_i7-10700celeron_b840core_i3-1000g4_firmwareceleron_787core_i9-10980hkxeon_w-3265mcore_i3-10100te_firmwarexeon_w-3223_firmwareceleron_4205u_firmwarecore_i9-11900k_firmwareceleron_b710_firmwarecore_i3-12100fcore_i3-1215ul_firmwareceleron_n3520core_i7-12800hlceleron_3867uceleron_b810celeron_g4932e_firmwarepentium_gold_g5400tceleron_n2815_firmwarecore_i3-1115greceleron_g4930ecore_i7-1265uexeon_w-3265m_firmwareceleron_3765uceleron_n3010_firmwareceleron_n2805core_i7-10510y_firmwarecore_i5-11400_firmwarecore_i9-11950hceleron_g530pentium_gold_g5420celeron_j1800_firmwarexeon_w-3245mceleron_n2806celeron_g5905tceleron_n2920_firmwarecore_i7-12700kfpentium_gold_g5500_firmwarexeon_w-1250_firmwarexeon_w-3335pentium_silver_n6000_firmwarepentium_gold_g6500txeon_w-1270xeon_w-1390p_firmwarecore_i7-1185g7_firmwarecore_i5-10500t_firmwarepentium_gold_8500core_i7-12700h_firmwareceleron_g5900t_firmwarecore_i5-10310uceleron_3855u_firmwareceleron_n2910_firmwarecore_i5-12600h_firmwarecore_i5-12600he_firmwareceleron_n4500_firmwarecore_i5-1140g7core_i9-10900e_firmwarecore_i9-11980hkceleron_j1900_firmwareceleron_j1750_firmwarecore_i7-12700hl_firmwarecore_i3-10325celeron_n2930core_i7-12700kcore_i3-1215ue_firmwareceleron_927uecore_i7-1270pcore_i9-12900_firmwarepentium_silver_n6000xeon_w-1250p_firmwareceleron_n3350eceleron_g540t_firmwareceleron_n3050celeron_n2815celeron_g4932ecore_i7-1060g7xeon_w-1390pcore_i5-10600kfcore_i3-12300hl_firmwareceleron_b830core_i7-1165g7_firmwareceleron_b840_firmwarecore_i3-10305_firmwareceleron_n3060core_i9-11980hk_firmwarepentium_gold_5405uceleron_g3950_firmwarecore_i7-1185gre_firmwarecore_i3-10305core_i5-10310y_firmwarecore_i7-12700t_firmwarecore_i9-12900e_firmwareceleron_1005m_firmwareceleron_g1850core_i7-1195g7_firmwarecore_i5-10400celeron_1047ue_firmwarecore_i7-1255ulcore_i7-12800hxcore_i7-12700e_firmwarecore_i7-1065g7core_i7-1185greceleron_g1840celeron_j3355eceleron_g1620celeron_2970m_firmwareceleron_n2807_firmwareIntel(R) Processors
CWE ID-CWE-367
Time-of-check Time-of-use (TOCTOU) Race Condition
CVE-2022-30773
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-6.4||MEDIUM
EPSS-0.04% / 10.11%
||
7 Day CHG~0.00%
Published-14 Nov, 2022 | 00:00
Updated-30 Apr, 2025 | 20:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

DMA attacks on the parameter buffer used by the IhisiSmm driver could change the contents after parameter values have been checked but before they are used (a TOCTOU attack). DMA attacks on the parameter buffer used by the IhisiSmm driver could change the contents after parameter values have been checked but before they are used (a TOCTOU attack). This issue was discovered by Insyde engineering. This issue is fixed in Kernel 5.4: 05.44.23 and Kernel 5.5: 05.52.23. CWE-367

Action-Not Available
Vendor-n/aInsyde Software Corp. (ISC)
Product-kerneln/a
CWE ID-CWE-367
Time-of-check Time-of-use (TOCTOU) Race Condition
CVE-2022-31243
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-6.4||MEDIUM
EPSS-0.04% / 11.05%
||
7 Day CHG~0.00%
Published-14 Nov, 2022 | 00:00
Updated-30 Apr, 2025 | 20:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Update description and links DMA transactions which are targeted at input buffers used for the software SMI handler used by the FvbServicesRuntimeDxe driver could cause SMRAM corruption through a TOCTOU attack.. "DMA transactions which are targeted at input buffers used for the software SMI handler used by the FvbServicesRuntimeDxe driver could cause SMRAM corruption. This issue was discovered by Insyde engineering based on the general description provided by Intel's iSTARE group. Fixed in Kernel 5.2: 05.27.21. Kernel 5.3: 05.36.21. Kernel 5.4: 05.44.21. Kernel 5.5: 05.52.21 https://www.insyde.com/security-pledge/SA-2022044

Action-Not Available
Vendor-n/aInsyde Software Corp. (ISC)
Product-kerneln/a
CWE ID-CWE-367
Time-of-check Time-of-use (TOCTOU) Race Condition
CVE-2022-30774
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-6.4||MEDIUM
EPSS-0.04% / 11.05%
||
7 Day CHG~0.00%
Published-14 Nov, 2022 | 00:00
Updated-30 Apr, 2025 | 20:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

DMA attacks on the parameter buffer used by the PnpSmm driver could change the contents after parameter values have been checked but before they are used (a TOCTOU attack) DMA attacks on the parameter buffer used by the PnpSmm driver could change the contents after parameter values have been checked but before they are used (a TOCTOU attack) . This issue was discovered by Insyde engineering during a security review. This iss was fixed in Kernel 5.2: 05.27.29, Kernel 5.3: 05.36.25, Kernel 5.4: 05.44.25, Kernel 5.5: 05.52.25. CWE-367 https://www.insyde.com/security-pledge/SA-2022043

Action-Not Available
Vendor-n/aInsyde Software Corp. (ISC)
Product-kerneln/a
CWE ID-CWE-367
Time-of-check Time-of-use (TOCTOU) Race Condition
CVE-2022-33986
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-6.4||MEDIUM
EPSS-0.04% / 10.11%
||
7 Day CHG~0.00%
Published-14 Nov, 2022 | 00:00
Updated-30 Apr, 2025 | 20:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

DMA attacks on the parameter buffer used by the VariableRuntimeDxe software SMI handler could lead to a TOCTOU attack. DMA attacks on the parameter buffer used by the software SMI handler used by the driver VariableRuntimeDxe could lead to a TOCTOU attack on the SMI handler and lead to corruption of SMRAM. This issue was discovered by Insyde engineering during a security review. This issue is fixed in Kernel 5.4: 05.44.23 and Kernel 5.5: 05.52.23. CWE-367 CWE-367 Report at: https://www.insyde.com/security-pledge/SA-2022056

Action-Not Available
Vendor-n/aInsyde Software Corp. (ISC)
Product-kerneln/a
CWE ID-CWE-367
Time-of-check Time-of-use (TOCTOU) Race Condition
CVE-2020-13162
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-7||HIGH
EPSS-0.35% / 56.55%
||
7 Day CHG~0.00%
Published-16 Jun, 2020 | 19:41
Updated-05 May, 2025 | 17:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A time-of-check time-of-use vulnerability in PulseSecureService.exe in Pulse Secure Client versions prior to 9.1.6 down to 5.3 R70 for Windows (which runs as NT AUTHORITY/SYSTEM) allows unprivileged users to run a Microsoft Installer executable with elevated privileges.

Action-Not Available
Vendor-n/aPulse Secure
Product-pulse_secure_desktop_clientpulse_secure_installer_servicen/a
CWE ID-CWE-367
Time-of-check Time-of-use (TOCTOU) Race Condition
CVE-2022-27904
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-7||HIGH
EPSS-0.08% / 25.56%
||
7 Day CHG~0.00%
Published-30 Jun, 2022 | 23:25
Updated-03 Aug, 2024 | 05:41
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Automox Agent for macOS before version 39 was vulnerable to a time-of-check/time-of-use (TOCTOU) race-condition attack during the agent install process.

Action-Not Available
Vendor-automoxn/aApple Inc.
Product-automoxmacosn/a
CWE ID-CWE-367
Time-of-check Time-of-use (TOCTOU) Race Condition
  • Previous
  • 1
  • 2
  • Next
Details not found