Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
Vulnerability Details :

CVE-2022-32473

Summary
Assigner-mitre
Assigner Org ID-8254265b-2729-46b6-b9e3-3dfca2d5bfca
Published At-15 Feb, 2023 | 00:00
Updated At-20 Mar, 2025 | 13:41
Rejected At-
Credits

An issue was discovered in Insyde InsydeH2O with kernel 5.0 through 5.5. DMA attacks on the HddPassword shared buffer used by SMM and non-SMM code could cause TOCTOU race-condition issues that could lead to corruption of SMRAM and escalation of privileges. This attack can be mitigated using IOMMU protection for the ACPI runtime memory used for the command buffer. This attack can be mitigated by copying the firmware block services data to SMRAM before checking it.

Vendors
-
Not available
Products
-
Metrics (CVSS)
VersionBase scoreBase severityVector
Weaknesses
Attack Patterns
Solution/Workaround
References
HyperlinkResource Type
EPSS History
Score
Latest Score
-
N/A
No data available for selected date range
Percentile
Latest Percentile
-
N/A
No data available for selected date range
Stakeholder-Specific Vulnerability Categorization (SSVC)
▼Common Vulnerabilities and Exposures (CVE)
cve.org
Assigner:mitre
Assigner Org ID:8254265b-2729-46b6-b9e3-3dfca2d5bfca
Published At:15 Feb, 2023 | 00:00
Updated At:20 Mar, 2025 | 13:41
Rejected At:
▼CVE Numbering Authority (CNA)

An issue was discovered in Insyde InsydeH2O with kernel 5.0 through 5.5. DMA attacks on the HddPassword shared buffer used by SMM and non-SMM code could cause TOCTOU race-condition issues that could lead to corruption of SMRAM and escalation of privileges. This attack can be mitigated using IOMMU protection for the ACPI runtime memory used for the command buffer. This attack can be mitigated by copying the firmware block services data to SMRAM before checking it.

Affected Products
Vendor
n/a
Product
n/a
Versions
Affected
  • n/a
Problem Types
TypeCWE IDDescription
textN/An/a
Type: text
CWE ID: N/A
Description: n/a
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://www.insyde.com/security-pledge
N/A
https://www.insyde.com/security-pledge/SA-2023005
N/A
Hyperlink: https://www.insyde.com/security-pledge
Resource: N/A
Hyperlink: https://www.insyde.com/security-pledge/SA-2023005
Resource: N/A
▼Authorized Data Publishers (ADP)
1. CVE Program Container
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://www.insyde.com/security-pledge
x_transferred
https://www.insyde.com/security-pledge/SA-2023005
x_transferred
Hyperlink: https://www.insyde.com/security-pledge
Resource:
x_transferred
Hyperlink: https://www.insyde.com/security-pledge/SA-2023005
Resource:
x_transferred
2. CISA ADP Vulnrichment
Affected Products
Problem Types
TypeCWE IDDescription
CWECWE-367CWE-367 Time-of-check Time-of-use (TOCTOU) Race Condition
Type: CWE
CWE ID: CWE-367
Description: CWE-367 Time-of-check Time-of-use (TOCTOU) Race Condition
Metrics
VersionBase scoreBase severityVector
3.17.0HIGH
CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
Version: 3.1
Base score: 7.0
Base severity: HIGH
Vector:
CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
Information is not available yet
▼National Vulnerability Database (NVD)
nvd.nist.gov
Source:cve@mitre.org
Published At:15 Feb, 2023 | 03:15
Updated At:20 Mar, 2025 | 14:15

An issue was discovered in Insyde InsydeH2O with kernel 5.0 through 5.5. DMA attacks on the HddPassword shared buffer used by SMM and non-SMM code could cause TOCTOU race-condition issues that could lead to corruption of SMRAM and escalation of privileges. This attack can be mitigated using IOMMU protection for the ACPI runtime memory used for the command buffer. This attack can be mitigated by copying the firmware block services data to SMRAM before checking it.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Date Added: N/A
Due Date: N/A
Vulnerability Name: N/A
Required Action: N/A
Metrics
TypeVersionBase scoreBase severityVector
Primary3.17.0HIGH
CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
Secondary3.17.0HIGH
CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
Type: Primary
Version: 3.1
Base score: 7.0
Base severity: HIGH
Vector:
CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
Type: Secondary
Version: 3.1
Base score: 7.0
Base severity: HIGH
Vector:
CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
CPE Matches

Insyde Software Corp. (ISC)
insyde
>>insydeh2o>>Versions from 5.0(inclusive) to 5.2.05.27.27(exclusive)
cpe:2.3:a:insyde:insydeh2o:*:*:*:*:*:*:*:*
Insyde Software Corp. (ISC)
insyde
>>insydeh2o>>Versions from 5.3(inclusive) to 5.3.05.36.27(exclusive)
cpe:2.3:a:insyde:insydeh2o:*:*:*:*:*:*:*:*
Insyde Software Corp. (ISC)
insyde
>>insydeh2o>>Versions from 5.4(inclusive) to 5.4.05.44.27(exclusive)
cpe:2.3:a:insyde:insydeh2o:*:*:*:*:*:*:*:*
Insyde Software Corp. (ISC)
insyde
>>insydeh2o>>Versions from 5.5(inclusive) to 5.5.05.52.27(exclusive)
cpe:2.3:a:insyde:insydeh2o:*:*:*:*:*:*:*:*
Weaknesses
CWE IDTypeSource
CWE-367Primarynvd@nist.gov
CWE-367Secondary134c704f-9b21-4f2e-91b3-4a467353bcc0
CWE ID: CWE-367
Type: Primary
Source: nvd@nist.gov
CWE ID: CWE-367
Type: Secondary
Source: 134c704f-9b21-4f2e-91b3-4a467353bcc0
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
https://www.insyde.com/security-pledgecve@mitre.org
Vendor Advisory
https://www.insyde.com/security-pledge/SA-2023005cve@mitre.org
Vendor Advisory
https://www.insyde.com/security-pledgeaf854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
https://www.insyde.com/security-pledge/SA-2023005af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
Hyperlink: https://www.insyde.com/security-pledge
Source: cve@mitre.org
Resource:
Vendor Advisory
Hyperlink: https://www.insyde.com/security-pledge/SA-2023005
Source: cve@mitre.org
Resource:
Vendor Advisory
Hyperlink: https://www.insyde.com/security-pledge
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Vendor Advisory
Hyperlink: https://www.insyde.com/security-pledge/SA-2023005
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Vendor Advisory

Change History

0
Information is not available yet

Similar CVEs

134Records found

CVE-2023-35378
Matching Score-4
Assigner-Microsoft Corporation
ShareView Details
Matching Score-4
Assigner-Microsoft Corporation
CVSS Score-7||HIGH
EPSS-0.08% / 23.28%
||
7 Day CHG~0.00%
Published-08 Aug, 2023 | 17:08
Updated-01 Jan, 2025 | 01:58
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Windows Projected File System Elevation of Privilege Vulnerability

Windows Projected File System Elevation of Privilege Vulnerability

Action-Not Available
Vendor-Microsoft Corporation
Product-windows_10_21h2windows_10_1809windows_11_22h2windows_11_21h2windows_10_22h2windows_server_2022windows_server_2019Windows Server 2022Windows 10 Version 21H2Windows 11 version 22H2Windows Server 2019 (Server Core installation)Windows 10 Version 1809Windows 11 version 21H2Windows Server 2019Windows 10 Version 22H2
CWE ID-CWE-367
Time-of-check Time-of-use (TOCTOU) Race Condition
CWE ID-CWE-362
Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')
CVE-2025-22394
Matching Score-4
Assigner-Dell
ShareView Details
Matching Score-4
Assigner-Dell
CVSS Score-6.7||MEDIUM
EPSS-0.01% / 1.70%
||
7 Day CHG~0.00%
Published-15 Jan, 2025 | 04:41
Updated-04 Feb, 2025 | 15:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Dell Display Manager, versions prior to 2.3.2.18, contain a Time-of-check Time-of-use (TOCTOU) Race Condition vulnerability. A low privileged attacker with local access could potentially exploit this vulnerability, leading to code execution and possibly privilege escalation.

Action-Not Available
Vendor-Dell Inc.
Product-display_managerDell Display Manager
CWE ID-CWE-367
Time-of-check Time-of-use (TOCTOU) Race Condition
CVE-2022-41744
Matching Score-4
Assigner-Trend Micro, Inc.
ShareView Details
Matching Score-4
Assigner-Trend Micro, Inc.
CVSS Score-7||HIGH
EPSS-0.05% / 13.97%
||
7 Day CHG~0.00%
Published-10 Oct, 2022 | 00:00
Updated-03 Aug, 2024 | 12:49
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A Time-of-Check Time-Of-Use vulnerability in the Trend Micro Apex One Vulnerability Protection integrated component could allow a local attacker to escalate privileges and turn a specific working directory into a mount point on affected installations. Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.

Action-Not Available
Vendor-Microsoft CorporationTrend Micro Incorporated
Product-apex_onewindowsTrend Micro Apex One
CWE ID-CWE-367
Time-of-check Time-of-use (TOCTOU) Race Condition
CVE-2025-21191
Matching Score-4
Assigner-Microsoft Corporation
ShareView Details
Matching Score-4
Assigner-Microsoft Corporation
CVSS Score-7||HIGH
EPSS-0.06% / 17.72%
||
7 Day CHG~0.00%
Published-08 Apr, 2025 | 17:23
Updated-07 Jul, 2025 | 18:57
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Windows Local Security Authority (LSA) Elevation of Privilege Vulnerability

Time-of-check time-of-use (toctou) race condition in Windows Local Security Authority (LSA) allows an authorized attacker to elevate privileges locally.

Action-Not Available
Vendor-Microsoft Corporation
Product-windows_11_24h2windows_server_2012windows_server_2025windows_11_23h2windows_10_21h2windows_server_2022windows_10_1607windows_server_2019windows_10_1507windows_server_2008windows_11_22h2windows_server_2016windows_server_2022_23h2windows_10_22h2windows_10_1809Windows 10 Version 1809Windows 11 Version 23H2Windows 11 Version 24H2Windows Server 2016 (Server Core installation)Windows Server 2019 (Server Core installation)Windows Server 2008 Service Pack 2Windows Server 2008 R2 Service Pack 1 (Server Core installation)Windows 10 Version 21H2Windows 11 version 22H2Windows 10 Version 22H2Windows 11 version 22H3Windows 10 Version 1507Windows Server 2012 (Server Core installation)Windows 10 Version 1607Windows Server 2016Windows Server 2025Windows Server 2012 R2Windows Server 2022Windows Server 2008 R2 Service Pack 1Windows Server 2012Windows Server 2025 (Server Core installation)Windows Server 2008 Service Pack 2Windows Server 2008 Service Pack 2 (Server Core installation)Windows Server 2022, 23H2 Edition (Server Core installation)Windows Server 2012 R2 (Server Core installation)Windows Server 2019
CWE ID-CWE-367
Time-of-check Time-of-use (TOCTOU) Race Condition
CVE-2021-1921
Matching Score-4
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-4
Assigner-Qualcomm, Inc.
CVSS Score-7.8||HIGH
EPSS-0.03% / 6.77%
||
7 Day CHG~0.00%
Published-12 Nov, 2021 | 06:15
Updated-03 Aug, 2024 | 16:25
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Possible memory corruption due to Improper handling of hypervisor unmap operations for concurrent memory operations in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-wsa8830wcd9380_firmwarewcn3990sd780gsd865_5gqca6595qca6431_firmwaresdx24sdx55m_firmwarewcn6856_firmwarewcd9360_firmwarewsa8835wcn3950_firmwarewcd9380sd888_5gqca6420_firmwareqca6390_firmwarewcd9370sd675_firmwarewcn6855_firmwareqca6426sdx24_firmwarewcn3990_firmwareqrb5165n_firmwaresm7325qca6430_firmwarewcn3980wcn6750wcn3998sd_8cx_firmwarewcd9385_firmwaresdxr2_5g_firmwarewcn3950whs9410wcd9340_firmwaresd855wsa8815wcn6850qsm8350_firmwareqsm8350sd_8c_firmwareqca6426_firmwarewcn7850qca6574au_firmwaresdx55_firmwarewcd9375_firmwarewcn3998_firmwarewcn3980_firmwareqca6391sdx55mwcd9360qca6420qca6436_firmwareqrb5165nqca6421_firmwareaqt1000_firmwarewcn6740_firmwaresd778gsa6155p_firmwarewhs9410_firmwarewcn7851qcs6490qrb5165_firmwaresdxr2_5gqcm6490_firmwareqrb5165wcn6851_firmwareqca6430qca6574auqca6421sd778g_firmwarewcd9340sa8195psdm830_firmwarewsa8810_firmwarewcd9341_firmwarewsa8810sd870qca6436wcn6851wcn6855sa6155pwcn7851_firmwarewcn6856sd_8cwcd9385wcd9341qca6431qcs6490_firmwareqca6595_firmwaresd870_firmwarewcn6740qca6391_firmwareqca6390wcd9375sd_8cxaqt1000sd780g_firmwarewcd9370_firmwaresdx55sd675wsa8830_firmwaresd855_firmwaresd865_5g_firmwareqcm6490sd888_5g_firmwarewcn6850_firmwarewcn7850_firmwarewsa8815_firmwarewsa8835_firmwaresa8195p_firmwaresdm830wcn6750_firmwaresm7325_firmwareSnapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile
CWE ID-CWE-367
Time-of-check Time-of-use (TOCTOU) Race Condition
CVE-2021-1567
Matching Score-4
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-4
Assigner-Cisco Systems, Inc.
CVSS Score-7||HIGH
EPSS-0.04% / 10.62%
||
7 Day CHG~0.00%
Published-16 Jun, 2021 | 17:45
Updated-07 Nov, 2024 | 22:08
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Cisco AnyConnect Secure Mobility Client for Windows with VPN Posture (HostScan) Module DLL Hijacking Vulnerability

A vulnerability in the DLL loading mechanism of Cisco AnyConnect Secure Mobility Client for Windows could allow an authenticated, local attacker to perform a DLL hijacking attack on an affected device if the VPN Posture (HostScan) Module is installed on the AnyConnect client. This vulnerability is due to a race condition in the signature verification process for DLL files that are loaded on an affected device. An attacker could exploit this vulnerability by sending a series of crafted interprocess communication (IPC) messages to the AnyConnect process. A successful exploit could allow the attacker to execute arbitrary code on the affected device with SYSTEM privileges. To exploit this vulnerability, the attacker must have valid credentials on the Windows system.

Action-Not Available
Vendor-Cisco Systems, Inc.
Product-anyconnect_secure_mobility_clientCisco AnyConnect Secure Mobility Client
CWE ID-CWE-367
Time-of-check Time-of-use (TOCTOU) Race Condition
CWE ID-CWE-427
Uncontrolled Search Path Element
CVE-2022-4149
Matching Score-4
Assigner-Netskope
ShareView Details
Matching Score-4
Assigner-Netskope
CVSS Score-7||HIGH
EPSS-0.03% / 8.21%
||
7 Day CHG~0.00%
Published-15 Jun, 2023 | 06:44
Updated-12 Dec, 2024 | 17:05
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Local privilege escalation using log file

The Netskope client service (prior to R96) on Windows runs as NT AUTHORITY\SYSTEM which writes log files to a writable directory (C:\Users\Public\netSkope) for a standard user. The files are created and written with a SYSTEM account except one file (logplaceholder) which inherits permission giving all users full access control list. Netskope client restricts access to this file by allowing only read permissions as a standard user. Whenever the Netskope client service restarts, it deletes the logplaceholder and recreates, creating a race condition, which can be exploited by a malicious local user to create the file and set ACL permissions on the file. Once the file is created by a malicious user with proper ACL permissions, all files within C:\Users\Public\netSkope\ becomes modifiable by the unprivileged user. By using Windows pseudo-symlink, these files can be pointed to other places in the system and thus malicious users will be able to elevate privileges.

Action-Not Available
Vendor-netskopeNetskopeMicrosoft Corporation
Product-windowsnetskopeNetskope Client
CWE ID-CWE-367
Time-of-check Time-of-use (TOCTOU) Race Condition
CVE-2020-9921
Matching Score-4
Assigner-Apple Inc.
ShareView Details
Matching Score-4
Assigner-Apple Inc.
CVSS Score-7||HIGH
EPSS-0.04% / 10.14%
||
7 Day CHG~0.00%
Published-22 Oct, 2020 | 18:04
Updated-04 Aug, 2024 | 10:43
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A memory corruption issue was addressed with improved memory handling. This issue is fixed in macOS Catalina 10.15.6. A malicious application may be able to execute arbitrary code with system privileges.

Action-Not Available
Vendor-Apple Inc.
Product-mac_os_xmacOS
CWE ID-CWE-787
Out-of-bounds Write
CWE ID-CWE-367
Time-of-check Time-of-use (TOCTOU) Race Condition
CVE-2023-33119
Matching Score-4
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-4
Assigner-Qualcomm, Inc.
CVSS Score-8.4||HIGH
EPSS-0.03% / 8.43%
||
7 Day CHG~0.00%
Published-06 May, 2024 | 14:32
Updated-11 Aug, 2025 | 15:06
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Time-of-check Time-of-use (TOCTOU) Race Condition in Hypervisor

Memory corruption while loading a VM from a signed VM image that is not coherent in the processor cache.

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-qdx1010_firmwareqcm8550_firmwarerobotics_rb3sd865_5gqca6595wcd9335wcd9370qca8081_firmwaresnapdragon_670_mobileqca6696wcd9340_firmwarewcd9341_firmwarewcd9395_firmwareqcc710_firmwareqca6426fastconnect_6700snapdragon_x50_5g_modem-rf_firmwarewsa8832_firmwareqca8337qdu1110qca6426_firmwarewcd9395sc8180xp-aaabqca6574au_firmwaresnapdragon_x72_5g_modem-rfqam8295pwcd9341qca6574auwcd9390snapdragon_888\+_5g_mobile_firmwaresa8620p_firmwarewsa8810_firmwarewsa8845h_firmwaresa9000p_firmwaresc8180xp-acafsrv1hsnapdragon_850_mobile_computefastconnect_6800_firmwareqcs5430sd835_firmwareqcm5430qcm5430_firmwaresa8770psnapdragon_678_mobile_firmwaressg2115pqcc710snapdragon_xr2_5g_firmwaresa8540pqsm8350_firmwarefastconnect_6900qru1032_firmwareqep8111sa7255pqfw7114wcd9385_firmwareqca6421qca6310qam8255p_firmwaresa8155_firmwareqca6335snapdragon_x65_5g_modem-rfwsa8845sa6155pqca6421_firmwaresc8180x-adqca6564au_firmwarewsa8810qam8650psnapdragon_835_mobilesa9000pqdu1000_firmwaresrv1h_firmwaresnapdragon_888_5g_mobile_firmwareqca6595ausnapdragon_888_5g_mobilesxr2250p_firmwareqdu1010wcd9326_firmwaresa6155p_firmwaresnapdragon_845_mobile_firmwarewsa8840srv1m_firmwareqcs8550_firmwaresnapdragon_x35_5g_modem-rf_firmwaresd835qdu1210_firmwaresnapdragon_8_gen_2_mobile_firmwaresnapdragon_x55_5g_modem-rfqfw7124_firmwareqca6436_firmwaresnapdragon_x55_5g_modem-rf_firmwaresnapdragon_8_gen_2_mobileqca6420wcd9370_firmwareqdu1110_firmwaresnapdragon_835_mobile_firmwareqdu1000sa7255p_firmwareqca6574asnapdragon_x72_5g_modem-rf_firmwaresnapdragon_8\+_gen_2_mobileqca6174awcd9340qdu1210snapdragon_auto_5g_modem-rf_gen_2qca6335_firmwareqcm6490sa8540p_firmwaresm8550p_firmwaresxr2250pqcm8550snapdragon_765_5g_mobile_firmwarevision_intelligence_300_firmwaresa8775pqca6574sxr2230p_firmwaresd675_firmwaresnapdragon_855_mobile_firmwareqca6430_firmwaresa8775p_firmwareqamsrv1hsdx57mwsa8845hwcd9326sa8155p_firmwareqca6564asa8155psnapdragon_765g_5g_mobile_firmwarewsa8830sm8550psa6145psnapdragon_768g_5g_mobile_firmwaresa8255p_firmwarear8035qamsrv1m_firmwaresa6155sa8650p_firmwareqcn6224snapdragon_865\+_5g_mobile_firmwareqca6698aqwcn3950_firmwaressg2125p_firmwarefastconnect_6200sd670sc8180x-acaf_firmwareqdx1011sa8150p_firmwarefastconnect_6700_firmwarevideo_collaboration_vc3_platform_firmwarewcn3990robotics_rb3_firmwaresnapdragon_x75_5g_modem-rf_firmwaresd670_firmwaresnapdragon_8_gen_3_mobilesnapdragon_855_mobileqcs6490sc8180xp-acaf_firmwarefastconnect_6200_firmwarewsa8830_firmwareqcn6224_firmwareqca6431qca6678aq_firmwarewsa8845_firmwarewsa8832sdx57m_firmwaresxr2130_firmwaresrv1mqca6678aqsnapdragon_860_mobile_firmwaresnapdragon_x35_5g_modem-rfar8035_firmwaresc8180xp-aaab_firmwaresc8380xpqca6320qca6564ausc8180xp-adsc8280xp-abbbwsa8815_firmwareqca8337_firmwaresg8275p_firmwareqca9377_firmwareqcm6490_firmwaresm7250p_firmwareqru1032vision_intelligence_400_firmwarewcn3950snapdragon_870_5g_mobile_firmwareqca6797aq_firmwaresnapdragon_auto_5g_modem-rf_gen_2_firmwaresa8295p_firmwaresnapdragon_870_5g_mobilesd_675_firmwaresnapdragon_678_mobilesm7250psc8180x-acafsa8155sd_8cx_firmwaresc8180x-ad_firmwareqca6584auqca6320_firmwareqcn6274_firmwareqru1062_firmwaresnapdragon_850_mobile_compute_firmwaresnapdragon_675_mobile_firmwaresnapdragon_768g_5g_mobilesc8380xp_firmwareqru1062qca6310_firmwaresnapdragon_845_mobilesnapdragon_8_gen_3_mobile_firmwarefastconnect_6800qfw7114_firmwareqca6595_firmwarefastconnect_7800_firmwaresnapdragon_675_mobilesnapdragon_865_5g_mobile_firmwarefastconnect_6900_firmwarewcd9380sa6145p_firmwareqam8255psa6155_firmwaresxr2230psnapdragon_xr2_5gsa8150psnapdragon_x24_lte_modemsc8180x-aaabsxr1230psc8180x-aaab_firmwarevideo_collaboration_vc3_platformaqt1000qam8295p_firmwaresd855qca6431_firmwarewcn3990_firmwareqca6698aq_firmwareqca6564a_firmwarewcd9385snapdragon_888\+_5g_mobileqsm8350snapdragon_8_gen_1_mobilesa8255psxr1230p_firmwarewcd9390_firmwaresnapdragon_865\+_5g_mobileqep8111_firmwareqca6430snapdragon_855\+_mobilesg8275psnapdragon_765_5g_mobileqdx1011_firmwaresnapdragon_860_mobilesc8180xp-ad_firmwaresdx55_firmwaressg2125pqru1052sxr2130snapdragon_x65_5g_modem-rf_firmwareqamsrv1mqca6174a_firmwaresnapdragon_x50_5g_modem-rfqam8650p_firmwaresnapdragon_670_mobile_firmwareqca6420_firmwareaqt1000_firmwareqcs6490_firmwarewcn3980_firmwarewcd9335_firmwaresd855_firmwareqca6436qca6584au_firmwareqcn6274snapdragon_x24_lte_modem_firmwarewsa8835qca6391_firmwarewsa8840_firmwareqfw7124qca6595au_firmwareqdu1010_firmwareqca6696_firmwarewcd9380_firmwareqca6574_firmwareqca8081wsa8815sd_8_gen1_5gqam8775pqca9377snapdragon_ar2_gen_1_firmwareqca6797aqsnapdragon_x75_5g_modem-rfsa8620pqca6574a_firmwaresdx55snapdragon_865_5g_mobilesnapdragon_855\+_mobile_firmwaresd675sd_8_gen1_5g_firmwarewcd9375_firmwareqca6391qcs5430_firmwareqru1052_firmwaresa8770p_firmwaresa8295pqcs8550sc8280xp-abbb_firmwarefastconnect_7800sa8650pqam8775p_firmwaresd865_5g_firmwaresnapdragon_8\+_gen_2_mobile_firmwarewcd9375vision_intelligence_300snapdragon_ar2_gen_1snapdragon_765g_5g_mobileqamsrv1h_firmwaresd_675sd_8cxvision_intelligence_400ssg2115p_firmwarewsa8835_firmwarewcn3980qdx1010snapdragon_8_gen_1_mobile_firmwareSnapdragonqam8255p_firmwareqca9377_firmwareqca8337_firmwareqca6431_firmwareqdu1010_firmwareqcn6224_firmwareqdu1110_firmwaresa8150p_firmwareqca6420_firmwareqca6595au_firmwareqcm5430_firmwareqca6584au_firmwareqep8111_firmwareqca6310_firmwareqca6430_firmwareqfw7114_firmwarequalcomm_video_collaboration_vc3_platform_firmwareqca6335_firmwareqamsrv1h_firmwareqca6574_firmwareqsm8350_firmwareqru1032_firmwareqam8295p_firmwareqca6426_firmwareqca6320_firmwarefastconnect_6200_firmwareqca6574a_firmwareqca6574au_firmwareqca8081_firmwaresa6155_firmwareqca6436_firmwareqca6421_firmwareaqt1000_firmwareqca6564au_firmwaresa6155p_firmwareqcm8550_firmwareqca6678aq_firmwareqcn6274_firmwareqcm6490_firmwarefastconnect_6900_firmwaresa8155_firmwarerobotics_rb3_platform_firmwareqcs8550_firmwareqca6797aq_firmwareqru1062_firmwaresa6145p_firmwareqdx1011_firmwarefastconnect_6700_firmwareqca6564a_firmwaresa7255p_firmwarefastconnect_7800_firmwareqdx1010_firmwareqdu1000_firmwareqamsrv1m_firmwareqca6698aq_firmwareqca6174a_firmwareqam8650p_firmwareqam8775p_firmwareqca6696_firmwareqca6595_firmwareqcs6490_firmwareqcs5430_firmwareqca6391_firmwareqru1052_firmwareqcc710_firmwarefastconnect_6800_firmwareqfw7124_firmwareqdu1210_firmwarear8035_firmware
CWE ID-CWE-367
Time-of-check Time-of-use (TOCTOU) Race Condition
CVE-2023-32554
Matching Score-4
Assigner-Trend Micro, Inc.
ShareView Details
Matching Score-4
Assigner-Trend Micro, Inc.
CVSS Score-7||HIGH
EPSS-0.04% / 10.91%
||
7 Day CHG~0.00%
Published-26 Jun, 2023 | 21:56
Updated-04 Dec, 2024 | 21:25
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A Time-of-Check Time-Of-Use vulnerability in the Trend Micro Apex One and Apex One as a Service agent could allow a local attacker to escalate privileges on affected installations. Please note: a local attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. This is similar to, but not identical to CVE-2023-32555.

Action-Not Available
Vendor-Microsoft CorporationTrend Micro Incorporated
Product-apex_onewindowsTrend Micro Apex Onetrend_micro_apex_one
CWE ID-CWE-367
Time-of-check Time-of-use (TOCTOU) Race Condition
CVE-2022-34398
Matching Score-4
Assigner-Dell
ShareView Details
Matching Score-4
Assigner-Dell
CVSS Score-7.5||HIGH
EPSS-0.04% / 10.00%
||
7 Day CHG~0.00%
Published-01 Feb, 2023 | 05:28
Updated-26 Mar, 2025 | 18:53
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Dell BIOS contains a Time-of-check Time-of-use vulnerability. A local authenticated malicious user could\u00a0potentially exploit this vulnerability by using a specifically timed DMA transaction during an SMI to gain arbitrary code execution on the system.

Action-Not Available
Vendor-Dell Inc.
Product-optiplex_7760_all-in-one_firmwarelatitude_5401optiplex_7770_all-in-oneinspiron_3470latitude_e7270precision_3541_firmwarealienware_m15_r1alienware_x15_r2vostro_3669inspiron_5680vostro_3881_firmwarelatitude_7200_2-in-1inspiron_5477_firmwarelatitude_5511_firmwarelatitude_7380_firmwareprecision_3550vostro_3888inspiron_5490_all-in-one_firmwaredell_g3_15_3590inspiron_5570latitude_7370vostro_3888_firmwarelatitude_7370_firmwareoptiplex_5070_firmwarealienware_aurora_r13precision_7540latitude_3390_2-in-1latitude_3310_2-in-1wyse_5070latitude_5490alienware_area_51m_r1_firmwarelatitude_5590optiplex_5080latitude_5511latitude_7390_2-in-1latitude_7214_rugged_extreme_firmwareprecision_5530_2-in-1alienware_m17_r2vostro_3070_firmwarelatitude_3190_2-in-1optiplex_7071alienware_x14_firmwarealienware_m15_r1_firmwaredell_g5_5000_firmwareinspiron_3583alienware_m17_r3_firmwarelatitude_5300precision_7720edge_gateway_5000vostro_3481alienware_x14latitude_9410_firmwarevostro_7590precision_5530_firmwarelatitude_e7270_firmwarelatitude_5280_firmwarelatitude_3180latitude_5300_2-in-1latitude_7424_rugged_extreme_firmwareoptiplex_5050optiplex_3070_firmwarealienware_aurora_r11latitude_7410_firmwarevostro_3667latitude_7300alienware_x15_r2_firmwarelatitude_e7470_firmwareprecision_3620_toweroptiplex_5260_all-in-oneprecision_7720_firmwarelatitude_5310_2-in-1precision_3431_toweroptiplex_3060_firmwareinspiron_3780inspiron_3782latitude_3590_firmwarelatitude_7490_firmwarealienware_m15_r2latitude_7390_firmwarelatitude_5500_firmwareprecision_7710latitude_5410_firmwareprecision_5520vostro_5090_firmwarelatitude_5310_2-in-1_firmwarexps_8950latitude_7400latitude_5591optiplex_5270_all-in-one_firmwareinspiron_3502_firmwareprecision_3520dell_g3_3579inspiron_3471inspiron_3880_firmwareoptiplex_5050_firmwareprecision_7520_firmwareoptiplex_7071_firmwareoptiplex_3050precision_7820_tower_firmwareoptiplex_5080_firmwareoptiplex_7460_all-in-onevostro_3471optiplex_5070dell_latitude_3480_firmwareinspiron_3480_firmwarealienware_m15_r3optiplex_5060_firmwareoptiplex_3050_all-in-one_firmwarexps_15_9575_2-in-1optiplex_3090_firmwarevostro_3581_firmwareprecision_7530_firmwarealienware_m17_r4_firmwarealienware_x17_r1vostro_3581latitude_9410inspiron_7777optiplex_7070optiplex_7080_firmwarevostro_3583_firmwarelatitude_5420_rugged_firmwareinspiron_3521latitude_3190_firmwarelatitude_5310aurora_r14_firmwareinspiron_5490_all-in-oneoptiplex_7460_all-in-one_firmwareinspiron_5401_all-in-one_firmwaredell_g3_3779_firmwarelatitude_5420_ruggedvostro_3268_firmwarealienware_aurora_r8latitude_7220_rugged_extreme_tabletlatitude_5500alienware_x15_r1precision_7550_firmwarelatitude_7390_2-in-1_firmwareinspiron_5400latitude_7480_firmwareinspiron_5477chengming_3991latitude_5288_firmwarevostro_5090inspiron_5480latitude_3190inspiron_3510_firmwarelatitude_7220ex_rugged_extreme_tablet_firmwarealienware_aurora_r8_firmwarexps_8950_firmwareinspiron_3881_firmwarelatitude_5488latitude_5290_2-in-1_firmwareinspiron_3471_firmwarevostro_3669_firmwarelatitude_7380optiplex_5480_all-in-one_firmwareprecision_3540alienware_aurora_r11_firmwarealienware_x17_r2_firmwarelatitude_5501latitude_7400_firmwareprecision_7710_firmwareinspiron_3580_firmwarelatitude_3590inspiron_3781_firmwarewyse_5070_firmwareprecision_5720_all-in-onechengming_3990vostro_3670_firmwarelatitude_7214_rugged_extremeinspiron_3510inspiron_3280_firmwarelatitude_3310latitude_7414_rugged_extreme_firmwarelatitude_5290_2-in-1precision_7520vostro_3583alienware_x17_r2wyse_5470_all-in-one_firmwarelatitude_5491_firmwarevostro_5880_firmwareprecision_7820_toweroptiplex_3090latitude_7290latitude_7212_rugged_extreme_tablet_firmwarealienware_area_51m_r1precision_7540_firmwarelatitude_13_3380_firmwareinspiron_3582latitude_7480latitude_7285_2-in-1_firmwareoptiplex_3060vostro_3881wyse_5470_firmwareoptiplex_5060latitude_5285_2-in-1edge_gateway_5000_firmwarechengming_3988_firmwareinspiron_3584inspiron_5770alienware_m17_r2_firmwarewyse_5470_all-in-onelatitude_3580precision_5820_tower_firmwareprecision_3530_firmwarelatitude_3190_2-in-1_firmwarelatitude_5580_firmwareinspiron_5480_firmwareinspiron_5481_2-in-1latitude_7210_2-in-1latitude_3189optiplex_xe3_firmwareinspiron_7590xps_15_9575_2-in-1_firmwarevostro_5880vostro_3580latitude_13_3380vostro_3268precision_7750optiplex_7070_firmwarevostro_3584optiplex_5270_all-in-oneoptiplex_xe3embedded_box_pc_5000dell_g5_15_5590embedded_box_pc_3000_firmwarevostro_3481_firmwareinspiron_3502latitude_5491inspiron_3580vostro_3267_firmwarevostro_3470_firmwareoptiplex_7080alienware_aurora_r12optiplex_5480_all-in-onealienware_aurora_r9dell_g7_15_7590_firmwarelatitude_7280alienware_area_51m_r2_firmwarelatitude_5400alienware_m15_r4_firmwarealienware_aurora_r13_firmwarelatitude_5410latitude_5480precision_3541xps_8940optiplex_7050_firmwareprecision_7730_firmwareprecision_3551latitude_5401_firmwarealienware_m17_r3precision_5820_towerprecision_7730latitude_5414_rugged_firmwareprecision_3640_tower_firmwarelatitude_5424_rugged_firmwarelatitude_7275_2-in-1_firmwarelatitude_7300_firmwarealienware_x15_r1_firmwareembedded_box_pc_3000latitude_5510dell_g3_3779optiplex_7770_all-in-one_firmwarelatitude_5400_firmwarewyse_5470alienware_m17_r4optiplex_7780_all-in-one_firmwareinspiron_7700_all-in-onevostro_3671_firmwareprecision_3440precision_7510_firmwareprecision_3440_firmwareprecision_5530_2-in-1_firmwarealienware_x17_r1_firmwarexps_8930optiplex_7470_all-in-onelatitude_3310_2-in-1_firmwareoptiplex_5250_firmwareinspiron_5680_firmwarealienware_m15_r3_firmwareinspiron_3671_firmwareprecision_3550_firmwarevostro_3668_firmwarelatitude_7410latitude_3310_firmwarelatitude_5501_firmwaredell_g3_15_3590_firmwareinspiron_3781optiplex_3280_all-in-one_firmwarelatitude_5411optiplex_3050_firmwarealienware_aurora_r10_firmwareoptiplex_7450_firmwareoptiplex_7450inspiron_7590_firmwareinspiron_3521_firmwareprecision_7740_firmwaredell_g5_5090_firmwarelatitude_7285_2-in-1latitude_3189_firmwarealienware_m15_r2_firmwarelatitude_7389vostro_3681inspiron_7591_firmwaredell_g5_15_5590_firmwareinspiron_5570_firmwareprecision_7920_towerlatitude_5290latitude_7400_2-in-1_firmwarelatitude_5289_firmwarechengming_3980_firmwareinspiron_3481inspiron_3780_firmwareprecision_3530inspiron_3582_firmwarelatitude_5411_firmwarelatitude_3120_firmwareinspiron_3470_firmwareaurora_r14latitude_5590_firmwareoptiplex_7070_ultraprecision_7740vostro_3267inspiron_3671inspiron_3481_firmwareprecision_5530latitude_7275_2-in-1latitude_7310_firmwareprecision_5540optiplex_3050_all-in-onedell_latitude_3580_firmwareinspiron_3584_firmwarelatitude_9510optiplex_3280_all-in-onewyse_7040_thininspiron_3480inspiron_3583_firmwareinspiron_5770_firmwarelatitude_3490precision_3930_rack_firmwareinspiron_3670latitude_3180_firmwarevostro_3681_firmwarealienware_m17_r1_firmwarevostro_3580_firmwareinspiron_3581_firmwarelatitude_9510_firmwareprecision_3430_tower_firmwarelatitude_3300_firmwarelatitude_7400_2-in-1precision_3640_towerdell_g5_5090latitude_3490_firmwarelatitude_5300_2-in-1_firmwarevostro_3668latitude_7210_2-in-1_firmwareoptiplex_7760_all-in-onelatitude_7280_firmwarelatitude_5510_firmwarevostro_3670edge_gateway_3000latitude_5280inspiron_3670_firmwarelatitude_7212_rugged_extreme_tabletoptiplex_7780_all-in-onelatitude_7220_rugged_extreme_tablet_firmwareprecision_3540_firmwarelatitude_5300_firmwareinspiron_7777_firmwareinspiron_3482_firmwareinspiron_3880latitude_5289inspiron_5481_2-in-1_firmwarelatitude_5480_firmwareprecision_3431_tower_firmwarevostro_3471_firmwareoptiplex_3080_firmwareprecision_3930_rackprecision_7550precision_3420_towerinspiron_7700_all-in-one_firmwareinspiron_3881inspiron_3482dell_g3_3579_firmwarexps_13_9380latitude_7220ex_rugged_extreme_tabletlatitude_7414_rugged_extremeprecision_3420_tower_firmwareoptiplex_3080alienware_m17_r1alienware_area_51m_r2dell_g5_5000dell_g7_17_7790_firmwarelatitude_3480latitude_5490_firmwarelatitude_5591_firmwarelatitude_5310_firmwareinspiron_3782_firmwarevostro_3070alienware_m15_r4precision_3430_towervostro_3671precision_5520_firmwareinspiron_7591latitude_7310inspiron_5401_all-in-oneinspiron_7790wyse_7040_thin_firmwarechengming_3988inspiron_7790_firmwarexps_15_7590latitude_3300latitude_5580precision_3620_tower_firmwareedge_gateway_3000_firmwareprecision_5540_firmwarevostro_3584_firmwarelatitude_3390_2-in-1_firmwareoptiplex_7480_all-in-onechengming_3990_firmwarexps_8940_firmwaredell_g7_15_7590latitude_3120vostro_3480precision_3520_firmwarechengming_3980precision_3551_firmwareoptiplex_7070_ultra_firmwareoptiplex_5260_all-in-one_firmwareoptiplex_7060latitude_7200_2-in-1_firmwarelatitude_5290_firmwarelatitude_7424_rugged_extremevostro_3582_firmwareprecision_3630_towervostro_3470latitude_5414_ruggedoptiplex_7480_all-in-one_firmwarealienware_aurora_r9_firmwareoptiplex_3070inspiron_3280latitude_7390latitude_7290_firmwareprecision_7530xps_8930_firmwaredell_g7_17_7790precision_3240_compactprecision_7750_firmwareprecision_5720_all-in-one_firmwarealienware_aurora_r12_firmwarelatitude_5285_2-in-1_firmwareprecision_7510vostro_3480_firmwarechengming_3991_firmwarevostro_7590_firmwarexps_15_7590_firmwareembedded_box_pc_5000_firmwarealienware_aurora_r10optiplex_7050precision_3510_firmwareprecision_3510xps_13_9380_firmwarelatitude_7490latitude_5288latitude_7389_firmwareoptiplex_7060_firmwareprecision_3240_compact_firmwareoptiplex_7470_all-in-one_firmwarelatitude_e7470precision_3630_tower_firmwareoptiplex_5250inspiron_3581vostro_3582vostro_3667_firmwareprecision_7920_tower_firmwareinspiron_5400_firmwarelatitude_5424_ruggedlatitude_5488_firmwareCPG BIOS
CWE ID-CWE-367
Time-of-check Time-of-use (TOCTOU) Race Condition
CVE-2022-33257
Matching Score-4
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-4
Assigner-Qualcomm, Inc.
CVSS Score-9.3||CRITICAL
EPSS-0.04% / 11.83%
||
7 Day CHG~0.00%
Published-07 Mar, 2023 | 04:43
Updated-03 Aug, 2024 | 08:01
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Time-of-check time-of-use race condition in Core

Memory corruption in Core due to time-of-check time-of-use race condition during dump collection in trust zone.

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-qca9377_firmwaresd_8cx_gen3_firmwareqca8337qca6431_firmwaresdx65wcn3950_firmwaresa8150p_firmwareqcs2290qca6595au_firmwaresa6155qca6335csra6620_firmwareqcs605_firmwaresd_675_firmwarecsra6640_firmwarewcn3998qam8295psd_8cx_gen2_firmwareqcn6024_firmwaresm4125wcn3950sd_8_gen1_5g_firmwareqsm8350_firmwareqsm8350sd460_firmwaresm7315_firmwarewcn7850qca6574au_firmwarewcd9375_firmwareqca8081_firmwaresa6155_firmwarewcn3998_firmwareqca6420sd680_firmwarewcn3999sd_8cx_gen2qrb5165_firmwareqrb5165m_firmwareqca6698aqsa8155_firmwareqca4004_firmwaresd662_firmwareqcs405qca6430wcd9306_firmwarewcd9340sd765gsw5100qca6436sd680wcn6851sa6155pqcs603_firmwarewcn7851_firmwareqca6698aq_firmwarewcd9341qca6431qca6696_firmwaresd750gsd870_firmwarewcn3910_firmwaresxr2150p_firmwaresd_8cxsa8150pqca4004wsa8830_firmwaresd855_firmwaresd865_5g_firmwaresnapdragon_4_gen_1wcn3988wcn7850_firmwaresm8475qcn7606_firmwaresa8295p_firmwarewcn6750_firmwarewcn3991qca8337_firmwarewcd9380_firmwaressg2125psw5100pqca6564ausdx55m_firmwarewcn6856_firmwaresd670_firmwareqca6574wcd9380sd690_5g_firmwaresdx50m_firmwaresxr1230psdx24_firmwareqca6430_firmwareqcn9012_firmwarewcd9335_firmwarewcn3980qca6335_firmwareqcm4325_firmwareqcs605wcd9340_firmwarewsa8815wcn6850wcn3910qca6426_firmwareqca9984sd695qcn9024wcn3980_firmwaresdx55mqcc5100_firmwareqca6421_firmwaresa8295pwcn6740_firmwaresd678_firmwarear8031_firmwareqrb5165wcn6851_firmwareqcs603sd670qca6564a_firmwareqcn9024_firmwaresdx57mqcm4290_firmwaresd480sd870wcn6855wsa8832sa8540psw5100p_firmwareqsm8250sa6145psd695_firmwarear8031qca6595_firmwareqcs405_firmwaremdm9205_firmwareqca6391_firmwaresd780g_firmwarewcd9370_firmwaresdx55sd888_firmwaresa8155pcsra6640sd675sdx70mssg2115p_firmwaresxr2150par8035_firmwareqsm8250_firmwareqcm2290qcn7606wcn3991_firmwarewsa8830sd678qcs2290_firmwaresnapdragon_4_gen_1_firmwarecsra6620qcs4290sd765g_firmwareqca6420_firmwareqca6390_firmwaresd690_5gwcd9370sd675_firmwaressg2115pqca6426wcn3990_firmwareqrb5165n_firmwareqca9984_firmwareqca9377sd_8cx_firmwarewcd9385_firmwaresdxr2_5g_firmwarewcd9326_firmwaresd662qam8295p_firmwareqcn9011_firmwaresa8155sa9000p_firmwaresdx55_firmwareqca6595auwcn3999_firmwaresm7250p_firmwareqca6436_firmwareqrb5165nqca6564au_firmwaresd778gsa6155p_firmwareqca6310wcd9306wcn7851qcs6490sdxr2_5gwcn3988_firmwaresa6145p_firmwareqca6421sd778g_firmwarewsa8810_firmwaresd765_firmwarewcd9326wcd9335sg4150pqca8081qca6174a_firmwareqcs4290_firmwarewcd9385qcs6490_firmwaresd_8cx_gen3sdx70m_firmwarear8035qca6390sd750g_firmwareaqt1000wcd9375qcm6490sd888_5g_firmwarewcn6850_firmwarewsa8815_firmwarewsa8835_firmwareqca6564asg4150p_firmwareqcm4325qcm2290_firmwarewcn3990sd_675sd780gsd865_5gqca6595qcc5100sdx24qcn9012sd888wsa8835sxr1230p_firmwaresd665_firmwaresa8540p_firmwaresd888_5gssg2125p_firmwareqca6574awcn6855_firmwareqca6174asm7325pqca6310_firmwarewcn6750mdm9205sa9000pqca6574_firmwaresd855sm4125_firmwaresm7325p_firmwaresd665sdx57m_firmwaresd765qca6574a_firmwaresd768g_firmwareqrb5165msd850_firmwaresm7315sd460qca6391aqt1000_firmwaresdx65_firmwareqcm4290qcm6490_firmwaresdx50mwsa8832_firmwaresd480_firmwareqcn9011qca6574ausa8155p_firmwarewcd9341_firmwarewsa8810wcn6856sd768gwcn6740qca6696sd845_firmwareqcn6024sd845sm7250psw5100_firmwaresd850Snapdragonqca9377_firmwaresd_8cx_gen3_firmwarewcn3991_firmwareqcs2290_firmwareqca6431_firmwaresnapdragon_4_gen_1_firmwarewcn3950_firmwaresa8150p_firmwaresd765g_firmwareqca6420_firmwareqca6595au_firmwareqca6390_firmwarecsra6620_firmwareqcs605_firmwaresd_675_firmwaresd675_firmwarecsra6640_firmwarewcn3990_firmwareqrb5165n_firmwareqca9984_firmwaresd_8cx_firmwarewcd9385_firmwaresdxr2_5g_firmwaresd_8cx_gen2_firmwareqcn6024_firmwarewcd9326_firmwaresd_8_gen1_5g_firmwareqsm8350_firmwaresd460_firmwareqam8295p_firmwareqcn9011_firmwaresa9000p_firmwaresm7315_firmwareqca6574au_firmwaresdx55_firmwarewcd9375_firmwareqca8081_firmwaresa6155_firmwarewcn3998_firmwaresm7250p_firmwarewcn3999_firmwareqca6436_firmwareqca6564au_firmwaresd680_firmwaresa6155p_firmwareqrb5165_firmwareqrb5165m_firmwaresa8155_firmwareqca4004_firmwaresd662_firmwarewcn3988_firmwaresa6145p_firmwarewcd9306_firmwaresd778g_firmwarewsa8810_firmwaresd765_firmwareqcs603_firmwarewcn7851_firmwareqca6698aq_firmwareqca6174a_firmwareqcs4290_firmwareqca6696_firmwareqcs6490_firmwaresd870_firmwaresdx70m_firmwarewcn3910_firmwaresxr2150p_firmwaresd750g_firmwarewsa8830_firmwaresd855_firmwaresd865_5g_firmwarewsa8815_firmwaresd888_5g_firmwarewcn6850_firmwarewcn7850_firmwarewsa8835_firmwaresa8295p_firmwareqcn7606_firmwarewcn6750_firmwaresg4150p_firmwareqcm2290_firmwareqca8337_firmwarewcd9380_firmwaresdx55m_firmwarewcn6856_firmwaresd670_firmwaresxr1230p_firmwaresd665_firmwaresa8540p_firmwaressg2125p_firmwaresd690_5g_firmwaresdx50m_firmwarewcn6855_firmwaresdx24_firmwareqca6310_firmwareqca6430_firmwareqcn9012_firmwarewcd9335_firmwareqca6335_firmwareqcm4325_firmwareqca6574_firmwarewcd9340_firmwaresm4125_firmwaresm7325p_firmwaresdx57m_firmwareqca6426_firmwareqca6574a_firmwaresd768g_firmwaresd850_firmwarewcn3980_firmwareqcc5100_firmwareqca6421_firmwareaqt1000_firmwarewcn6740_firmwaresdx65_firmwaresd678_firmwarear8031_firmwareqcm6490_firmwarewsa8832_firmwaresd480_firmwarewcn6851_firmwaresa8155p_firmwareqca6564a_firmwareqcn9024_firmwarewcd9341_firmwareqcm4290_firmwaresw5100p_firmwaresd695_firmwareqca6595_firmwareqcs405_firmwaremdm9205_firmwareqca6391_firmwaresd845_firmwaresd780g_firmwarewcd9370_firmwaresd888_firmwaressg2115p_firmwaresw5100_firmwarear8035_firmwareqsm8250_firmware
CWE ID-CWE-367
Time-of-check Time-of-use (TOCTOU) Race Condition
CVE-2020-8016
Matching Score-4
Assigner-SUSE
ShareView Details
Matching Score-4
Assigner-SUSE
CVSS Score-4.9||MEDIUM
EPSS-0.09% / 27.25%
||
7 Day CHG~0.00%
Published-02 Apr, 2020 | 14:05
Updated-16 Sep, 2024 | 19:30
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
race condition in the packaging of texlive-filesysten

A Race Condition Enabling Link Following vulnerability in the packaging of texlive-filesystem of SUSE Linux Enterprise Module for Desktop Applications 15-SP1, SUSE Linux Enterprise Software Development Kit 12-SP4, SUSE Linux Enterprise Software Development Kit 12-SP5; openSUSE Leap 15.1 allows local users to corrupt files or potentially escalate privileges. This issue affects: SUSE Linux Enterprise Module for Desktop Applications 15-SP1 texlive-filesystem versions prior to 2017.135-9.5.1. SUSE Linux Enterprise Software Development Kit 12-SP4 texlive-filesystem versions prior to 2013.74-16.5.1. SUSE Linux Enterprise Software Development Kit 12-SP5 texlive-filesystem versions prior to 2013.74-16.5.1. openSUSE Leap 15.1 texlive-filesystem versions prior to 2017.135-lp151.8.3.1.

Action-Not Available
Vendor-openSUSESUSE
Product-linux_enterprise_software_development_kittexlive-filesystemlinux_enterprise_desktopleapSUSE Linux Enterprise Module for Desktop Applications 15-SP1SUSE Linux Enterprise Software Development Kit 12-SP5SUSE Linux Enterprise Software Development Kit 12-SP4openSUSE Leap 15.1
CWE ID-CWE-367
Time-of-check Time-of-use (TOCTOU) Race Condition
CVE-2022-33214
Matching Score-4
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-4
Assigner-Qualcomm, Inc.
CVSS Score-8.4||HIGH
EPSS-0.06% / 17.10%
||
7 Day CHG~0.00%
Published-17 Oct, 2022 | 00:00
Updated-14 May, 2025 | 15:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Memory corruption in display due to time-of-check time-of-use of metadata reserved size in Snapdragon Auto, Snapdragon Compute, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Wearables

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-sm4375wcn6855_firmwareqca6391_firmwareqcs4290sd888_5g_firmwareqca6574_firmwaresdx50m_firmwaresw5100_firmwareqca6430sa8155wcn7850_firmwarewcd9375_firmwaresd855_firmwaresm4125qcm4290_firmwaresd680_firmwareqca6574au_firmwarewcn3990wsa8835_firmwareqca6696_firmwareqcs2290qcs410sa6145pwcn6855qam8295pwsa8830qca6696sm8475sd778g_firmwaresm7325pwcn3910sa6155pqca6420sm4375_firmwarewcn3998_firmwarewcn6750_firmwaresdx55qca6390_firmwaresm7250pqcn7606wcn6740_firmwaresd765sdx55_firmwaresd750g_firmwareqca6574a_firmwarewcd9385_firmwaresa8195p_firmwarewcn3950_firmwarewsa8815_firmwaresd439qcm6490sd678qcs410_firmwaresd660_firmwaresd660qcs6125sa4155psa6145p_firmwarewcd9335qca6430_firmwaresd675_firmwareqcs2290_firmwareaqt1000qca6391wcd9370_firmwaresa8295pwcn3991_firmwaresa8295p_firmwaresd662wsa8835sa8195psm7250p_firmwarewcn6851_firmwaresd768g_firmwarewcn3980_firmwaresd480_firmwaresm7315_firmwareqca6574aqcs610wcn6750qca6595auwcn3615_firmwarewcn6851sd690_5gqcs6490_firmwaresa4150psd865_5gwcn6850_firmwaresd865_5g_firmwarewcn3660b_firmwarewsa8830_firmwarewcd9341wcn3660bwcn3991sd460wcn3998qca6574ausd888_firmwaresm7315wcn3990_firmwarewcn6856_firmwaresdx55mqcm2290_firmwareqcm6125_firmwarewcd9341_firmwarewcn3615qca6420_firmwaresd_675sa4150p_firmwarewcd9335_firmwarewsa8815sd750gwcd9326sw5100p_firmwaresda429wwcn6856wcn6740wcn7850sd690_5g_firmwaresda429w_firmwaresd_8_gen1_5g_firmwaresd460_firmwarewcd9380wcn3988qcm6125sa8155p_firmwaresd780g_firmwaresd870_firmwarewcd9326_firmwarewcn3988_firmwareqca6574sd870sd765_firmwarewcn7851_firmwaresa6150p_firmwareqcs6490sd778gqam8295p_firmwaresw5100sd680sd_675_firmwareqcs6125_firmwaresd768gwcn3610_firmwarewcn3680bwcn6850wsa8810sd855qcs4290_firmwaresa8145psd439_firmwareqcc5100_firmwarewcd9380_firmwaresd678_firmwaresa8145p_firmwaresd888_5gsa8155_firmwaresd662_firmwaresd720g_firmwaresd780gsd480sm6250qca6390wcn3910_firmwaresd695qcm4290sa6155sa6150pqca6595au_firmwaresm4125_firmwarewcn3610qcm2290sd695_firmwareqcm6490_firmwarewsa8810_firmwaresd730_firmwaresdx55m_firmwaresm6250_firmwarewcd9375wcd9370sa8150p_firmwarewcn7851qcn7606_firmwarewcd9385sa6155p_firmwaresa8150psd765gwcn3950sw5100psd730sa6155_firmwareaqt1000_firmwaresd888sd720gsdx50msd675wcn3680b_firmwarewcn3980sm7325p_firmwareqcc5100sa8155pqcs610_firmwaresd765g_firmwaresa4155p_firmwareSnapdragon Auto, Snapdragon Compute, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Wearables
CWE ID-CWE-367
Time-of-check Time-of-use (TOCTOU) Race Condition
CVE-2024-53032
Matching Score-4
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-4
Assigner-Qualcomm, Inc.
CVSS Score-7.8||HIGH
EPSS-0.01% / 1.71%
||
7 Day CHG~0.00%
Published-03 Mar, 2025 | 10:07
Updated-07 Mar, 2025 | 11:47
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Time-of-check Time-of-use (TOCTOU) Race Condition in Automotive OS Platform

Memory corruption may occur in keyboard virtual device due to guest VM interaction.

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-sa9000pqca6595au_firmwaresa8650p_firmwareqam8775psa8255pqamsrv1m_firmwareqca6595qca6688aq_firmwaresa8770psa8775psrv1h_firmwaresa8620p_firmwareqam8650p_firmwareqca6595_firmwaresrv1mqam8620psa8775p_firmwareqamsrv1msa9000p_firmwaresrv1hqca6574ausa7255psrv1m_firmwaresa8620psa7775psa8650pqam8620p_firmwaresa8540p_firmwaresa7255p_firmwareqam8775p_firmwareqam8295p_firmwareqam8255pqca6688aqqca6698aqsa7775p_firmwaresa8255p_firmwaresa8770p_firmwaresa8295p_firmwareqca6696_firmwareqam8295pqamsrv1hsrv1l_firmwareqca6574au_firmwareqamsrv1h_firmwareqca6595auqam8255p_firmwaresa8295psrv1lqca6698aq_firmwareqam8650pqca6696sa8540pSnapdragon
CWE ID-CWE-367
Time-of-check Time-of-use (TOCTOU) Race Condition
CVE-2022-31640
Matching Score-4
Assigner-HP Inc.
ShareView Details
Matching Score-4
Assigner-HP Inc.
CVSS Score-7||HIGH
EPSS-0.10% / 28.99%
||
7 Day CHG~0.00%
Published-14 Jun, 2023 | 16:30
Updated-30 Dec, 2024 | 16:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Potential vulnerabilities have been identified in the system BIOS of certain HP PC products, which might allow arbitrary code execution, escalation of privilege, denial of service, and information disclosure.

Action-Not Available
Vendor-HP Inc.
Product-probook_640_g3zbook_studio_g5_firmwareelitedesk_800_g3elitebook_725_g4elitebook_845_g8eliteone_800_g3_healthcare_edition_firmwarezbook_17_g4_firmwareprobook_640_g7z2_tower_g4engage_flex_pro-c_retail_systemzhan_66_pro_14_g2probook_630_g8_firmwareelitebook_x360_830_g5_firmwareelitebook_x360_830_g5elitedesk_805_g6prodesk_400_g5_firmwarez240_towerelite_x2_1013_g3pro_x360_fortis_g10engage_flex_pro-c_retail_system_firmwareprodesk_480_g6elitedesk_800_g4_firmwareproone_440_g9eliteone_800_g3_healthcare_editionprodesk_400_g4probook_445_g6z2_tower_g9pro_tower_400_g9_firmwareelitebook_840_g7_firmwareprobook_445_g7zbook_17_g6eliteone_840_g9_firmwareprobook_650_g8_firmwareeliteone_800_g4zbook_studio_g9elitebook_630_g9_firmwarezbook_fury_17_g7_firmwareprobook_645_g4_firmwarezhan_66_pro_14_g3elitebook_836_g6probook_440_g4zbook_17_g6_firmwareproone_400_g4_firmwarez2_mini_g3elitebook_850_g5_firmwareprodesk_600_g3elitebook_x360_1020_g2elite_tower_600_g9_firmwareelite_slice_g2_firmwareelitebook_x360_1030_g7_firmwarezbook_17_g4elite_tower_880_g9_firmwarezbook_fury_15_g7mt32elitebook_840_g4elitedesk_880_g8zhan_66_pro_15_g3zbook_power_g9mt22_firmwarez2_mini_g5_firmwareelite_x360_830_g9_firmwareelitebook_x360_1040_g8_firmwareproone_480_g3elitedesk_880_g4_firmwareelitedesk_880_g6elitebook_865_g9elitebook_846_g5_healthcare_edition_firmwareelitebook_848_g4probook_455_g4probook_x360_11_g6_eeelitebook_820_g4_firmwareelitebook_840_g5_firmwarepro_tower_480_g9z2_small_form_factor_g8_firmwareproone_440_g4eliteone_800_g6elitebook_835_g8z2_small_form_factor_g9_firmwareprodesk_480_g4prodesk_400_g6elitebook_x360_1030_g8probook_640_g5eliteone_840_g9elitedesk_800_g8elitebook_755_g4elitedesk_805_g8prodesk_600_g5probook_x360_11_g4_ee_firmwareprodesk_400_g4_firmwarez2_small_form_factor_g5zbook_firefly_g9elitebook_830_g6elite_dragonfly_g2z2_mini_g9_firmwareprobook_430_g6_firmwareprobook_650_g5_firmwarepro_mt440_g3_firmwareprobook_x360_435_g7_firmwareprobook_x360_11_g6_ee_firmwareelite_x2_1012_g2_firmwarez2_tower_g9_firmwareproone_400_g6_firmwareelitebook_x360_830_g7probook_445_g7_firmwareelitebook_x360_1040_g8probook_450_g5probook_450_g6_firmwareprodesk_680_g3_firmwareprobook_455_g5probook_430_g5_firmwareelitebook_836_g5_firmwarezbook_17_g5probook_650_g7_firmwarezhan_66_pro_15_g3_firmwareprobook_440_g7elite_tower_880_g9prodesk_480_g4_firmwareengage_one_all-in-one_systemelitebook_846r_g4probook_430_g4probook_470_g4eliteone_800_g4_healthcare_edition_firmwareelitebook_x360_1030_g2elitedesk_800_g4elitebook_865_g9_firmwarepro_x2_612_g2elite_tower_600_g9elitebook_830_g8_firmwarez240_small_form_factor_firmwareprodesk_480_g5_firmwareeliteone_1000_g2_firmwarepro_tower_400_g9elitebook_845_g9zbook_firefly_14_g7mp9_g4_retail_systemeliteone_800_g5probook_445_g8elitebook_855_g7_firmwareprobook_470_g5_firmwareelitebook_x360_830_g8elitebook_860_g9_firmwareelitedesk_800_g8_firmwareprobook_455_g7elite_tower_800_g9_firmwareelitebook_x360_830_g6probook_635_aero_g8_firmwareelitebook_835_g9_firmwarepro_sff_400_g9probook_445_g6_firmwareprobook_445_g9elitebook_645_g9_firmwareproone_440_g5_firmwarezbook_studio_g7elitebook_835_g8_firmwareelitedesk_800_g6proone_480_g3_firmwareelitebook_846_g5_healthcare_editionzbook_fury_15_g7_firmwarezbook_power_g8_firmwareproone_600_g3_firmwarezbook_14u_g5_firmwareprobook_640_g8_firmwaremt45_firmwareproone_440_g6z1_g9_towerz2_mini_g3_firmwareelitedesk_880_g3elite_mini_600_g9elitebook_845_g7_firmwarezhan_66_pro_a_14_g5elitebook_1040_g4probook_x360_11_g3_eeelitebook_735_g5elitebook_1040_g9_firmwareelitebook_735_g5_firmwareelitebook_846_g5_firmwarez1_entry_tower_g5_firmwareeliteone_1000_g2z2_mini_g5zbook_fury_17_g7elite_mini_800_g9elitedesk_880_g5_firmwareprodesk_480_g7_pci_firmwareprobook_fortis_g10elitebook_835_g7elite_x2_g8_zbook_fury_g8_firmwarezbook_14u_g6proone_600_g3elitebook_755_g5zbook_15u_g6_firmwarezbook_15_g4eliteone_800_g8_firmwaremt44_firmwareprobook_440_g8prodesk_480_g5mini_conferencing_firmwareelitebook_735_g6z2_mini_g4_firmwareprobook_455_g9probook_640_g5_firmwareprobook_440_g6probook_450_g6z1_g8_towerprodesk_680_g3probook_630_g8probook_650_g8probook_650_g4_firmwareprobook_450_g9zhan_x_13_g2zbook_studio_g5z2_mini_g4elitebook_860_g9eliteone_870_g9prodesk_405_g6_firmwareprobook_430_g8prodesk_405_g8_firmwareelitebook_x360_1040_g7elitebook_830_g9elite_x2_g4zbook_15_g5probook_455_g8elitebook_830_g8elitebook_840_g9_firmwarezhan_66_pro_a_14_g4elite_x2_g8__firmwareelitebook_x360_830_g8_firmwarezhan_66_pro_a_14_g3_firmwareprobook_445_g8_firmwarezhan_66_pro_14_g4elite_dragonfly_g3z2_small_form_factor_g4eliteone_800_g5_firmwareprobook_455_g5_firmwareengage_one_pro_aio_systemz240_small_form_factorproone_600_g4_firmwareelitebook_830_g7elitebook_640_g9mt31probook_455_g6_firmwareprobook_450_g4mt32_firmwareprobook_440_g6_firmwareelitebook_850_g4elitebook_x360_830_g6_firmwareelitebook_830_g6_firmwareelite_tower_680_g9zhan_66_pro_g1_firmwareelite_x2_g4_firmwarezhan_66_pro_13_g2_firmwareelitebook_x360_830_g7_firmwareengage_go_10_mobile_system_firmwareelite_dragonfly_g3_firmwareelite_dragonfly_g2_firmwareprobook_x360_11_g7_eemt43_firmwareelitebook_x360_1030_g3_firmwareelite_x360_1040_g9_firmwareelite_mini_800_g9_firmwareelitebook_645_g9proone_400_g4elitebook_840_g6_healthcare_editionelite_sff_600_g9prodesk_600_g4zhan_66_pro_15_g2_firmwarezhan_66_pro_14_g4_firmwarezbook_firefly_15_g7mt31_firmwarez2_tower_g4_firmwarezbook_studio_g4eliteone_800_g8z1_entry_tower_g5z238_microtower_firmwareeliteone_800_g5_healthcare_editionzbook_power_g9_firmwaremt43probook_440_g4_firmwareelitebook_845_g8_firmwareprobook_640_g8elitebook_830_g9_firmwarezhan_66_pro_g1rp9_g1_retail_system_firmwareelitebook_840_g7elitebook_1050_g1elitebook_850_g5prodesk_400_g7zbook_power_g7proone_600_g4elite_x360_830_g9eliteone_800_g4_healthcare_editionelite_mini_600_g9_firmwarez238_microtowerelitedesk_880_g6_firmwareelitebook_630_g9elitedesk_705_g4elitebook_x360_1040_g6_firmwarezbook_firefly_g9_firmwareelitebook_x360_1030_g4_firmwareprobook_x360_11_g3_ee_firmwarezhan_66_pro_14_g3_firmwareproone_400_g3probook_430_g4_firmwarezhan_66_pro_a_14_g3zbook_power_g8probook_440_g8_firmwareelitebook_x360_1020_g2_firmwarezbook_15_g6_firmwareelite_sff_800_g9zbook_fury_16_g9zbook_create_g7_firmwareproone_440_g6_firmwareprobook_fortis_g10_firmwareelitebook_840_g5elitebook_850_g4_firmwareprobook_440_g5mt21_firmwareproone_440_g9_firmwarezhan_66_pro_a_14_g4_firmwarezhan_66_pro_g3elitebook_1050_g1_firmwareelitebook_755_g5_firmwareprobook_640_g4probook_455_g9_firmwareprobook_445r_g6_firmwarezhan_66_pro_g3_firmwareproone_400_g5_firmwareprobook_455_g4_firmwarez2_tower_g5z2_tower_g8_firmwaremt46elitedesk_800_g3_firmwareprodesk_600_g6_firmwareproone_600_g6zhan_66_pro_13_g2elite_dragonflyzbook_firefly_g8probook_440_g5_firmwarez2_small_form_factor_g5_firmwareelite_dragonfly_maxzbook_14u_g6_firmwareprobook_445r_g6zbook_15_g6z1_entry_tower_g6elitebook_835_g7_firmwareelitebook_745_g5_firmwareelitebook_850_g6_firmwareelitebook_820_g4z2_tower_g8eliteone_1000_g1eliteone_800_g3_firmwareprobook_430_g8_firmwareelitedesk_880_g4elitedesk_880_g5probook_fortis_g9_firmwareprobook_635_aero_g7eliteone_800_g6_firmwareprobook_470_g5prodesk_400_g3z1_g9_tower_firmwareelitebook_840_g8probook_640_g4_firmwareelitebook_846_g5zbook_fury_g8zbook_studio_g4_firmwareelitebook_828_g4probook_455r_g6_firmwareprodesk_405_g4proone_400_g3_firmwareengage_go_mobile_systemelitebook_755_g4_firmwarezbook_17_g5_firmwareelitebook_830_g5elitedesk_880_g8_firmwareeliteone_800_g4_firmwareelitebook_640_g9_firmwareelitebook_x360_1040_g6proone_600_g6_firmwareelitebook_840_g6_firmwarezhan_66_pro_15_g2prodesk_680_g4_firmwareprodesk_600_g5_firmwareelitebook_735_g6_firmwarez240_tower_firmwareprodesk_480_g7_pcizbook_firefly_14_g7_firmwareelitebook_745_g5mini_conferencingprobook_440_g9probook_x360_11_g2_ee_firmwarepro_x360_fortis_g9_firmwareelitebook_855_g8elitebook_745_g6_firmwareprobook_470_g4_firmwareelite_sff_800_g9_firmwareeliteone_800_g3elitebook_836_g6_firmwareelitebook_x360_1030_g7probook_x360_11_g5_eeeliteone_870_g9_firmwareprobook_440_g9_firmwareelitebook_x360_1040_g7_firmwareprobook_x360_440_g1z1_entry_tower_g6_firmwarez2_small_form_factor_g8elite_tower_800_g9elitebook_x360_1040_g5elitebook_850_g8elitebook_835_g9elite_sff_600_g9_firmwarerp9_g1_retail_systemelitebook_x360_1030_g4zbook_15_g4_firmwareprobook_x360_440_g1_firmwareprodesk_405_g6elitebook_846r_g4_firmwarezbook_15_g5_firmwareproone_440_g5elitebook_840_g5_healthcare_edition_firmwareprobook_455_g8_firmwareprobook_x360_435_g8elitebook_840_g4_firmwareelitedesk_705_g4_firmwareproone_400_g5elitebook_840_g6_healthcare_edition_firmwareprodesk_680_g6_pci_firmwareprobook_655_g3probook_640_g7_firmwareprodesk_600_g4_firmwareelitebook_840_g6engage_flex_mini_retail_system_firmwareprobook_455_g6elitebook_850_g8_firmwareprobook_x360_11_g4_eeprodesk_400_g6_firmwarezbook_studio_g9_firmwareelitedesk_800_g5prodesk_405_g4_firmwaremt44probook_640_g3_firmwareprobook_450_g8pro_x2_612_g2_firmwareelitebook_745_g4_firmwarezbook_studio_g8_firmwareelitebook_840_aero_g8_firmwareelite_x2_1012_g2probook_450_g9_firmwareprobook_445_g9_firmwareelitebook_840_g9zbook_studio_x360_g5zbook_15u_g6zbook_studio_x360_g5_firmwareengage_go_10_mobile_systemzbook_x2_g4_firmwaremt21probook_650_g3pro_x360_fortis_g10_firmwareelite_dragonfly_max_firmwareprobook_x360_435_g8_firmwarezbook_studio_g7_firmwarezbook_firefly_15_g7_firmwareelitedesk_705_g5eliteone_800_g5_healthcare_edition_firmwareelite_x360_1040_g9engage_one_pro_aio_system_firmwarezbook_15u_g5elitedesk_805_g6_firmwareelitebook_840_g5_healthcare_editionelitebook_855_g8_firmwareelite_x2_1013_g3_firmwareprobook_x360_435_g7z2_small_form_factor_g4_firmwareelitebook_828_g4_firmwareelitebook_830_g7_firmwarepro_x360_fortis_g9z2_mini_g9elitebook_850_g6probook_450_g7engage_go_mobile_system_firmwareengage_one_all-in-one_system_firmwareelitebook_848_g4_firmwarezhan_66_pro_a_14_g5_firmwareelitedesk_800_g6_firmwareprobook_450_g7_firmwareelitebook_745_g4pro_mini_400_g9elitebook_725_g4_firmwareelite_tower_680_g9_firmwareprobook_650_g4zbook_fury_16_g9_firmwareprobook_650_g5zbook_create_g7prodesk_400_g3_firmwarezhan_66_pro_14_g2_firmwareeliteone_1000_g1_firmwareproone_440_g4_firmwareelitebook_745_g6elitebook_650_g9_firmwareprobook_430_g6engage_flex_pro_retail_system_firmwareelitebook_1040_g9elitebook_x360_1030_g3proone_600_g5_firmwarezhan_66_pro_g5_firmwarez1_all-in-one_g3_firmwareelitedesk_800_g5_firmwareprodesk_600_g6zhan_x_13_g2_firmwarepro_mini_400_g9_firmwareprobook_455r_g6elitedesk_705_g5_firmwareprobook_430_g7elitebook_650_g9prodesk_600_g3_firmwareprobook_450_g8_firmwarepro_sff_400_g9_firmwareelitebook_836_g5probook_650_g3_firmwareelitebook_855_g7probook_x360_11_g7_ee_firmwareprodesk_400_g7_firmwaremt46_firmwareprobook_650_g7probook_455_g7_firmwareelitebook_x360_1030_g2_firmwareproone_400_g6probook_x360_11_g2_eeelite_dragonfly_firmwareprobook_450_g4_firmwareelitebook_840_g8_firmwarepro_tower_480_g9_firmwareelitebook_850_g7mt22z2_tower_g5_firmwareelitebook_x360_1040_g5_firmwareproone_600_g5probook_430_g5probook_430_g7_firmwarezbook_power_g7_firmwareprobook_x360_11_g5_ee_firmwareelite_slice_g2elitebook_845_g7elitebook_850_g7_firmwareprodesk_400_g5elitebook_655_g9elitebook_1040_g4_firmwareelitedesk_880_g3_firmwareprobook_450_g5_firmwareelitebook_840_aero_g8zbook_firefly_g8_firmwareprobook_645_g3zbook_14u_g5elitebook_x360_1030_g8_firmwaremp9_g4_retail_system_firmwareelitebook_840r_g4probook_645_g4z1_g8_tower_firmwarez2_small_form_factor_g9engage_flex_mini_retail_systemzbook_studio_g8elitebook_845_g9_firmwareprobook_655_g3_firmwareprodesk_680_g4probook_635_aero_g8probook_440_g7_firmwareprodesk_680_g6_pcimt45zbook_15u_g5_firmwareelitebook_655_g9_firmwareengage_flex_pro_retail_systemelitedesk_805_g8_firmwarezbook_x2_g4z1_all-in-one_g3probook_645_g3_firmwareelitebook_830_g5_firmwareprobook_635_aero_g7_firmwareelitebook_840r_g4_firmwarezhan_66_pro_g5prodesk_480_g6_firmwareprodesk_405_g8pro_mt440_g3probook_fortis_g9HP PC BIOS
CWE ID-CWE-367
Time-of-check Time-of-use (TOCTOU) Race Condition
CVE-2024-50592
Matching Score-4
Assigner-SEC Consult Vulnerability Lab
ShareView Details
Matching Score-4
Assigner-SEC Consult Vulnerability Lab
CVSS Score-7||HIGH
EPSS-0.02% / 4.53%
||
7 Day CHG~0.00%
Published-08 Nov, 2024 | 12:15
Updated-08 Nov, 2024 | 19:01
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Local Privilege Escalation via Race Condition

An attacker with local access the to medical office computer can escalate his Windows user privileges to "NT AUTHORITY\SYSTEM" by exploiting a race condition in the Elefant Update Service during the repair or update process. When using the repair function, the service queries the server for a list of files and their hashes. In addition, instructions to execute binaries to finalize the repair process are included. The executables are executed as "NT AUTHORITY\SYSTEM" after they are copied over to the user writable installation folder (C:\Elefant1). This means that a user can overwrite either "PostESUUpdate.exe" or "Update_OpenJava.exe" in the time frame after the copy and before the execution of the final repair step. The overwritten executable is then executed as "NT AUTHORITY\SYSTEM".

Action-Not Available
Vendor-HASOMEDhasomed
Product-Elefant Software Updaterelefant_software_updater
CWE ID-CWE-367
Time-of-check Time-of-use (TOCTOU) Race Condition
CVE-2022-31641
Matching Score-4
Assigner-HP Inc.
ShareView Details
Matching Score-4
Assigner-HP Inc.
CVSS Score-7||HIGH
EPSS-0.10% / 28.99%
||
7 Day CHG~0.00%
Published-14 Jun, 2023 | 16:31
Updated-30 Dec, 2024 | 16:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Potential vulnerabilities have been identified in the system BIOS of certain HP PC products, which might allow arbitrary code execution, escalation of privilege, denial of service, and information disclosure.

Action-Not Available
Vendor-HP Inc.
Product-probook_640_g3zbook_studio_g5_firmwareelitedesk_800_g3elitebook_725_g4elitebook_845_g8eliteone_800_g3_healthcare_edition_firmwarezbook_17_g4_firmwareprobook_640_g7z2_tower_g4engage_flex_pro-c_retail_systemzhan_66_pro_14_g2probook_630_g8_firmwareelitebook_x360_830_g5_firmwareelitebook_x360_830_g5elitedesk_805_g6prodesk_400_g5_firmwarez240_towerelite_x2_1013_g3pro_x360_fortis_g10engage_flex_pro-c_retail_system_firmwareprodesk_480_g6elitedesk_800_g4_firmwareproone_440_g9eliteone_800_g3_healthcare_editionprodesk_400_g4probook_445_g6z2_tower_g9pro_tower_400_g9_firmwareelitebook_840_g7_firmwareprobook_445_g7zbook_17_g6eliteone_840_g9_firmwareprobook_650_g8_firmwareeliteone_800_g4zbook_studio_g9elitebook_630_g9_firmwarezbook_fury_17_g7_firmwareprobook_645_g4_firmwarezhan_66_pro_14_g3elitebook_836_g6probook_440_g4zbook_17_g6_firmwareproone_400_g4_firmwarez2_mini_g3elitebook_850_g5_firmwareprodesk_600_g3elitebook_x360_1020_g2elite_tower_600_g9_firmwareelite_slice_g2_firmwareelitebook_x360_1030_g7_firmwarezbook_17_g4elite_tower_880_g9_firmwarezbook_fury_15_g7mt32elitebook_840_g4elitedesk_880_g8zhan_66_pro_15_g3zbook_power_g9mt22_firmwarez2_mini_g5_firmwareelite_x360_830_g9_firmwareelitebook_x360_1040_g8_firmwareproone_480_g3elitedesk_880_g4_firmwareelitedesk_880_g6elitebook_865_g9elitebook_846_g5_healthcare_edition_firmwareelitebook_848_g4probook_455_g4probook_x360_11_g6_eeelitebook_820_g4_firmwareelitebook_840_g5_firmwarepro_tower_480_g9z2_small_form_factor_g8_firmwareproone_440_g4eliteone_800_g6elitebook_835_g8z2_small_form_factor_g9_firmwareprodesk_480_g4prodesk_400_g6elitebook_x360_1030_g8probook_640_g5eliteone_840_g9elitedesk_800_g8elitebook_755_g4elitedesk_805_g8prodesk_600_g5probook_x360_11_g4_ee_firmwareprodesk_400_g4_firmwarez2_small_form_factor_g5zbook_firefly_g9elitebook_830_g6elite_dragonfly_g2z2_mini_g9_firmwareprobook_430_g6_firmwareprobook_650_g5_firmwarepro_mt440_g3_firmwareprobook_x360_435_g7_firmwareprobook_x360_11_g6_ee_firmwareelite_x2_1012_g2_firmwarez2_tower_g9_firmwareproone_400_g6_firmwareelitebook_x360_830_g7probook_445_g7_firmwareelitebook_x360_1040_g8probook_450_g5probook_450_g6_firmwareprodesk_680_g3_firmwareprobook_455_g5probook_430_g5_firmwareelitebook_836_g5_firmwarezbook_17_g5probook_650_g7_firmwarezhan_66_pro_15_g3_firmwareprobook_440_g7elite_tower_880_g9prodesk_480_g4_firmwareengage_one_all-in-one_systemelitebook_846r_g4probook_430_g4probook_470_g4eliteone_800_g4_healthcare_edition_firmwareelitebook_x360_1030_g2elitedesk_800_g4elitebook_865_g9_firmwarepro_x2_612_g2elite_tower_600_g9elitebook_830_g8_firmwarez240_small_form_factor_firmwareprodesk_480_g5_firmwareeliteone_1000_g2_firmwarepro_tower_400_g9elitebook_845_g9zbook_firefly_14_g7mp9_g4_retail_systemeliteone_800_g5probook_445_g8elitebook_855_g7_firmwareprobook_470_g5_firmwareelitebook_x360_830_g8elitebook_860_g9_firmwareelitedesk_800_g8_firmwareprobook_455_g7elite_tower_800_g9_firmwareelitebook_x360_830_g6probook_635_aero_g8_firmwareelitebook_835_g9_firmwarepro_sff_400_g9probook_445_g6_firmwareprobook_445_g9elitebook_645_g9_firmwareproone_440_g5_firmwarezbook_studio_g7elitebook_835_g8_firmwareelitedesk_800_g6proone_480_g3_firmwareelitebook_846_g5_healthcare_editionzbook_fury_15_g7_firmwarezbook_power_g8_firmwareproone_600_g3_firmwarezbook_14u_g5_firmwareprobook_640_g8_firmwaremt45_firmwareproone_440_g6z1_g9_towerz2_mini_g3_firmwareelitedesk_880_g3elite_mini_600_g9elitebook_845_g7_firmwarezhan_66_pro_a_14_g5elitebook_1040_g4probook_x360_11_g3_eeelitebook_735_g5elitebook_1040_g9_firmwareelitebook_735_g5_firmwareelitebook_846_g5_firmwarez1_entry_tower_g5_firmwareeliteone_1000_g2z2_mini_g5zbook_fury_17_g7elite_mini_800_g9elitedesk_880_g5_firmwareprodesk_480_g7_pci_firmwareprobook_fortis_g10elitebook_835_g7elite_x2_g8_zbook_fury_g8_firmwarezbook_14u_g6proone_600_g3elitebook_755_g5zbook_15u_g6_firmwarezbook_15_g4eliteone_800_g8_firmwaremt44_firmwareprobook_440_g8prodesk_480_g5mini_conferencing_firmwareelitebook_735_g6z2_mini_g4_firmwareprobook_455_g9probook_640_g5_firmwareprobook_440_g6probook_450_g6z1_g8_towerprodesk_680_g3probook_630_g8probook_650_g8probook_650_g4_firmwareprobook_450_g9zhan_x_13_g2zbook_studio_g5z2_mini_g4elitebook_860_g9eliteone_870_g9prodesk_405_g6_firmwareprobook_430_g8prodesk_405_g8_firmwareelitebook_x360_1040_g7elitebook_830_g9elite_x2_g4zbook_15_g5probook_455_g8elitebook_830_g8elitebook_840_g9_firmwarezhan_66_pro_a_14_g4elite_x2_g8__firmwareelitebook_x360_830_g8_firmwarezhan_66_pro_a_14_g3_firmwareprobook_445_g8_firmwarezhan_66_pro_14_g4elite_dragonfly_g3z2_small_form_factor_g4eliteone_800_g5_firmwareprobook_455_g5_firmwareengage_one_pro_aio_systemz240_small_form_factorproone_600_g4_firmwareelitebook_830_g7elitebook_640_g9mt31probook_455_g6_firmwareprobook_450_g4mt32_firmwareprobook_440_g6_firmwareelitebook_850_g4elitebook_x360_830_g6_firmwareelitebook_830_g6_firmwareelite_tower_680_g9zhan_66_pro_g1_firmwareelite_x2_g4_firmwarezhan_66_pro_13_g2_firmwareelitebook_x360_830_g7_firmwareengage_go_10_mobile_system_firmwareelite_dragonfly_g3_firmwareelite_dragonfly_g2_firmwareprobook_x360_11_g7_eemt43_firmwareelitebook_x360_1030_g3_firmwareelite_x360_1040_g9_firmwareelite_mini_800_g9_firmwareelitebook_645_g9proone_400_g4elitebook_840_g6_healthcare_editionelite_sff_600_g9prodesk_600_g4zhan_66_pro_15_g2_firmwarezhan_66_pro_14_g4_firmwarezbook_firefly_15_g7mt31_firmwarez2_tower_g4_firmwarezbook_studio_g4eliteone_800_g8z1_entry_tower_g5z238_microtower_firmwareeliteone_800_g5_healthcare_editionzbook_power_g9_firmwaremt43probook_440_g4_firmwareelitebook_845_g8_firmwareprobook_640_g8elitebook_830_g9_firmwarezhan_66_pro_g1rp9_g1_retail_system_firmwareelitebook_840_g7elitebook_1050_g1elitebook_850_g5prodesk_400_g7zbook_power_g7proone_600_g4elite_x360_830_g9eliteone_800_g4_healthcare_editionelite_mini_600_g9_firmwarez238_microtowerelitedesk_880_g6_firmwareelitebook_630_g9elitedesk_705_g4elitebook_x360_1040_g6_firmwarezbook_firefly_g9_firmwareelitebook_x360_1030_g4_firmwareprobook_x360_11_g3_ee_firmwarezhan_66_pro_14_g3_firmwareproone_400_g3probook_430_g4_firmwarezhan_66_pro_a_14_g3zbook_power_g8probook_440_g8_firmwareelitebook_x360_1020_g2_firmwarezbook_15_g6_firmwareelite_sff_800_g9zbook_fury_16_g9zbook_create_g7_firmwareproone_440_g6_firmwareprobook_fortis_g10_firmwareelitebook_840_g5elitebook_850_g4_firmwareprobook_440_g5mt21_firmwareproone_440_g9_firmwarezhan_66_pro_a_14_g4_firmwarezhan_66_pro_g3elitebook_1050_g1_firmwareelitebook_755_g5_firmwareprobook_640_g4probook_455_g9_firmwareprobook_445r_g6_firmwarezhan_66_pro_g3_firmwareproone_400_g5_firmwareprobook_455_g4_firmwarez2_tower_g5z2_tower_g8_firmwaremt46elitedesk_800_g3_firmwareprodesk_600_g6_firmwareproone_600_g6zhan_66_pro_13_g2elite_dragonflyzbook_firefly_g8probook_440_g5_firmwarez2_small_form_factor_g5_firmwareelite_dragonfly_maxzbook_14u_g6_firmwareprobook_445r_g6zbook_15_g6z1_entry_tower_g6elitebook_835_g7_firmwareelitebook_745_g5_firmwareelitebook_850_g6_firmwareelitebook_820_g4z2_tower_g8eliteone_1000_g1eliteone_800_g3_firmwareprobook_430_g8_firmwareelitedesk_880_g4elitedesk_880_g5probook_fortis_g9_firmwareprobook_635_aero_g7eliteone_800_g6_firmwareprobook_470_g5prodesk_400_g3z1_g9_tower_firmwareelitebook_840_g8probook_640_g4_firmwareelitebook_846_g5zbook_fury_g8zbook_studio_g4_firmwareelitebook_828_g4probook_455r_g6_firmwareprodesk_405_g4proone_400_g3_firmwareengage_go_mobile_systemelitebook_755_g4_firmwarezbook_17_g5_firmwareelitebook_830_g5elitedesk_880_g8_firmwareeliteone_800_g4_firmwareelitebook_640_g9_firmwareelitebook_x360_1040_g6proone_600_g6_firmwareelitebook_840_g6_firmwarezhan_66_pro_15_g2prodesk_680_g4_firmwareprodesk_600_g5_firmwareelitebook_735_g6_firmwarez240_tower_firmwareprodesk_480_g7_pcizbook_firefly_14_g7_firmwareelitebook_745_g5mini_conferencingprobook_440_g9probook_x360_11_g2_ee_firmwarepro_x360_fortis_g9_firmwareelitebook_855_g8elitebook_745_g6_firmwareprobook_470_g4_firmwareelite_sff_800_g9_firmwareeliteone_800_g3elitebook_836_g6_firmwareelitebook_x360_1030_g7probook_x360_11_g5_eeeliteone_870_g9_firmwareprobook_440_g9_firmwareelitebook_x360_1040_g7_firmwareprobook_x360_440_g1z1_entry_tower_g6_firmwarez2_small_form_factor_g8elite_tower_800_g9elitebook_x360_1040_g5elitebook_850_g8elitebook_835_g9elite_sff_600_g9_firmwarerp9_g1_retail_systemelitebook_x360_1030_g4zbook_15_g4_firmwareprobook_x360_440_g1_firmwareprodesk_405_g6elitebook_846r_g4_firmwarezbook_15_g5_firmwareproone_440_g5elitebook_840_g5_healthcare_edition_firmwareprobook_455_g8_firmwareprobook_x360_435_g8elitebook_840_g4_firmwareelitedesk_705_g4_firmwareproone_400_g5elitebook_840_g6_healthcare_edition_firmwareprodesk_680_g6_pci_firmwareprobook_655_g3probook_640_g7_firmwareprodesk_600_g4_firmwareelitebook_840_g6engage_flex_mini_retail_system_firmwareprobook_455_g6elitebook_850_g8_firmwareprobook_x360_11_g4_eeprodesk_400_g6_firmwarezbook_studio_g9_firmwareelitedesk_800_g5prodesk_405_g4_firmwaremt44probook_640_g3_firmwareprobook_450_g8pro_x2_612_g2_firmwareelitebook_745_g4_firmwarezbook_studio_g8_firmwareelitebook_840_aero_g8_firmwareelite_x2_1012_g2probook_450_g9_firmwareprobook_445_g9_firmwareelitebook_840_g9zbook_studio_x360_g5zbook_15u_g6zbook_studio_x360_g5_firmwareengage_go_10_mobile_systemzbook_x2_g4_firmwaremt21probook_650_g3pro_x360_fortis_g10_firmwareelite_dragonfly_max_firmwareprobook_x360_435_g8_firmwarezbook_studio_g7_firmwarezbook_firefly_15_g7_firmwareelitedesk_705_g5eliteone_800_g5_healthcare_edition_firmwareelite_x360_1040_g9engage_one_pro_aio_system_firmwarezbook_15u_g5elitedesk_805_g6_firmwareelitebook_840_g5_healthcare_editionelitebook_855_g8_firmwareelite_x2_1013_g3_firmwareprobook_x360_435_g7z2_small_form_factor_g4_firmwareelitebook_828_g4_firmwareelitebook_830_g7_firmwarepro_x360_fortis_g9z2_mini_g9elitebook_850_g6probook_450_g7engage_go_mobile_system_firmwareengage_one_all-in-one_system_firmwareelitebook_848_g4_firmwarezhan_66_pro_a_14_g5_firmwareelitedesk_800_g6_firmwareprobook_450_g7_firmwareelitebook_745_g4pro_mini_400_g9elitebook_725_g4_firmwareelite_tower_680_g9_firmwareprobook_650_g4zbook_fury_16_g9_firmwareprobook_650_g5zbook_create_g7prodesk_400_g3_firmwarezhan_66_pro_14_g2_firmwareeliteone_1000_g1_firmwareproone_440_g4_firmwareelitebook_745_g6elitebook_650_g9_firmwareprobook_430_g6engage_flex_pro_retail_system_firmwareelitebook_1040_g9elitebook_x360_1030_g3proone_600_g5_firmwarezhan_66_pro_g5_firmwarez1_all-in-one_g3_firmwareelitedesk_800_g5_firmwareprodesk_600_g6zhan_x_13_g2_firmwarepro_mini_400_g9_firmwareprobook_455r_g6elitedesk_705_g5_firmwareprobook_430_g7elitebook_650_g9prodesk_600_g3_firmwareprobook_450_g8_firmwarepro_sff_400_g9_firmwareelitebook_836_g5probook_650_g3_firmwareelitebook_855_g7probook_x360_11_g7_ee_firmwareprodesk_400_g7_firmwaremt46_firmwareprobook_650_g7probook_455_g7_firmwareelitebook_x360_1030_g2_firmwareproone_400_g6probook_x360_11_g2_eeelite_dragonfly_firmwareprobook_450_g4_firmwareelitebook_840_g8_firmwarepro_tower_480_g9_firmwareelitebook_850_g7mt22z2_tower_g5_firmwareelitebook_x360_1040_g5_firmwareproone_600_g5probook_430_g5probook_430_g7_firmwarezbook_power_g7_firmwareprobook_x360_11_g5_ee_firmwareelite_slice_g2elitebook_845_g7elitebook_850_g7_firmwareprodesk_400_g5elitebook_655_g9elitebook_1040_g4_firmwareelitedesk_880_g3_firmwareprobook_450_g5_firmwareelitebook_840_aero_g8zbook_firefly_g8_firmwareprobook_645_g3zbook_14u_g5elitebook_x360_1030_g8_firmwaremp9_g4_retail_system_firmwareelitebook_840r_g4probook_645_g4z1_g8_tower_firmwarez2_small_form_factor_g9engage_flex_mini_retail_systemzbook_studio_g8elitebook_845_g9_firmwareprobook_655_g3_firmwareprodesk_680_g4probook_635_aero_g8probook_440_g7_firmwareprodesk_680_g6_pcimt45zbook_15u_g5_firmwareelitebook_655_g9_firmwareengage_flex_pro_retail_systemelitedesk_805_g8_firmwarezbook_x2_g4z1_all-in-one_g3probook_645_g3_firmwareelitebook_830_g5_firmwareprobook_635_aero_g7_firmwareelitebook_840r_g4_firmwarezhan_66_pro_g5prodesk_480_g6_firmwareprodesk_405_g8pro_mt440_g3probook_fortis_g9HP PC BIOS
CWE ID-CWE-367
Time-of-check Time-of-use (TOCTOU) Race Condition
CVE-2022-31642
Matching Score-4
Assigner-HP Inc.
ShareView Details
Matching Score-4
Assigner-HP Inc.
CVSS Score-7||HIGH
EPSS-0.11% / 29.64%
||
7 Day CHG~0.00%
Published-14 Jun, 2023 | 16:32
Updated-30 Dec, 2024 | 16:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Potential vulnerabilities have been identified in the system BIOS of certain HP PC products, which might allow arbitrary code execution, escalation of privilege, denial of service, and information disclosure.

Action-Not Available
Vendor-HP Inc.
Product-probook_640_g3zbook_studio_g5_firmwareelitedesk_800_g3elitebook_725_g4elitebook_845_g8eliteone_800_g3_healthcare_edition_firmwarezbook_17_g4_firmwareprobook_640_g7z2_tower_g4engage_flex_pro-c_retail_systemzhan_66_pro_14_g2probook_630_g8_firmwareelitebook_x360_830_g5_firmwareelitebook_x360_830_g5elitedesk_805_g6prodesk_400_g5_firmwarez240_towerelite_x2_1013_g3pro_x360_fortis_g10engage_flex_pro-c_retail_system_firmwareprodesk_480_g6elitedesk_800_g4_firmwareproone_440_g9eliteone_800_g3_healthcare_editionprodesk_400_g4probook_445_g6z2_tower_g9pro_tower_400_g9_firmwareelitebook_840_g7_firmwareprobook_445_g7zbook_17_g6eliteone_840_g9_firmwareprobook_650_g8_firmwareeliteone_800_g4zbook_studio_g9elitebook_630_g9_firmwarezbook_fury_17_g7_firmwareprobook_645_g4_firmwarezhan_66_pro_14_g3elitebook_836_g6probook_440_g4zbook_17_g6_firmwareproone_400_g4_firmwarez2_mini_g3elitebook_850_g5_firmwareprodesk_600_g3elitebook_x360_1020_g2elite_tower_600_g9_firmwareelite_slice_g2_firmwareelitebook_x360_1030_g7_firmwarezbook_17_g4elite_tower_880_g9_firmwarezbook_fury_15_g7mt32elitebook_840_g4elitedesk_880_g8zhan_66_pro_15_g3zbook_power_g9mt22_firmwarez2_mini_g5_firmwareelite_x360_830_g9_firmwareelitebook_x360_1040_g8_firmwareproone_480_g3elitedesk_880_g4_firmwareelitedesk_880_g6elitebook_865_g9elitebook_846_g5_healthcare_edition_firmwareelitebook_848_g4probook_455_g4probook_x360_11_g6_eeelitebook_820_g4_firmwareelitebook_840_g5_firmwarepro_tower_480_g9z2_small_form_factor_g8_firmwareproone_440_g4eliteone_800_g6elitebook_835_g8z2_small_form_factor_g9_firmwareprodesk_480_g4prodesk_400_g6elitebook_x360_1030_g8probook_640_g5eliteone_840_g9elitedesk_800_g8elitebook_755_g4elitedesk_805_g8prodesk_600_g5probook_x360_11_g4_ee_firmwareprodesk_400_g4_firmwarez2_small_form_factor_g5zbook_firefly_g9elitebook_830_g6elite_dragonfly_g2z2_mini_g9_firmwareprobook_430_g6_firmwareprobook_650_g5_firmwarepro_mt440_g3_firmwareprobook_x360_435_g7_firmwareprobook_x360_11_g6_ee_firmwareelite_x2_1012_g2_firmwarez2_tower_g9_firmwareproone_400_g6_firmwareelitebook_x360_830_g7probook_445_g7_firmwareelitebook_x360_1040_g8probook_450_g5probook_450_g6_firmwareprodesk_680_g3_firmwareprobook_455_g5probook_430_g5_firmwareelitebook_836_g5_firmwarezbook_17_g5probook_650_g7_firmwarezhan_66_pro_15_g3_firmwareprobook_440_g7elite_tower_880_g9prodesk_480_g4_firmwareengage_one_all-in-one_systemelitebook_846r_g4probook_430_g4probook_470_g4eliteone_800_g4_healthcare_edition_firmwareelitebook_x360_1030_g2elitedesk_800_g4elitebook_865_g9_firmwarepro_x2_612_g2elite_tower_600_g9elitebook_830_g8_firmwarez240_small_form_factor_firmwareprodesk_480_g5_firmwareeliteone_1000_g2_firmwarepro_tower_400_g9elitebook_845_g9zbook_firefly_14_g7mp9_g4_retail_systemeliteone_800_g5probook_445_g8elitebook_855_g7_firmwareprobook_470_g5_firmwareelitebook_x360_830_g8elitebook_860_g9_firmwareelitedesk_800_g8_firmwareprobook_455_g7elite_tower_800_g9_firmwareelitebook_x360_830_g6probook_635_aero_g8_firmwareelitebook_835_g9_firmwarepro_sff_400_g9probook_445_g6_firmwareprobook_445_g9elitebook_645_g9_firmwareproone_440_g5_firmwarezbook_studio_g7elitebook_835_g8_firmwareelitedesk_800_g6proone_480_g3_firmwareelitebook_846_g5_healthcare_editionzbook_fury_15_g7_firmwarezbook_power_g8_firmwareproone_600_g3_firmwarezbook_14u_g5_firmwareprobook_640_g8_firmwaremt45_firmwareproone_440_g6z1_g9_towerz2_mini_g3_firmwareelitedesk_880_g3elite_mini_600_g9elitebook_845_g7_firmwarezhan_66_pro_a_14_g5elitebook_1040_g4probook_x360_11_g3_eeelitebook_735_g5elitebook_1040_g9_firmwareelitebook_735_g5_firmwareelitebook_846_g5_firmwarez1_entry_tower_g5_firmwareeliteone_1000_g2z2_mini_g5zbook_fury_17_g7elite_mini_800_g9elitedesk_880_g5_firmwareprodesk_480_g7_pci_firmwareprobook_fortis_g10elitebook_835_g7elite_x2_g8_zbook_fury_g8_firmwarezbook_14u_g6proone_600_g3elitebook_755_g5zbook_15u_g6_firmwarezbook_15_g4eliteone_800_g8_firmwaremt44_firmwareprobook_440_g8prodesk_480_g5mini_conferencing_firmwareelitebook_735_g6z2_mini_g4_firmwareprobook_455_g9probook_640_g5_firmwareprobook_440_g6probook_450_g6z1_g8_towerprodesk_680_g3probook_630_g8probook_650_g8probook_650_g4_firmwareprobook_450_g9zhan_x_13_g2zbook_studio_g5z2_mini_g4elitebook_860_g9eliteone_870_g9prodesk_405_g6_firmwareprobook_430_g8prodesk_405_g8_firmwareelitebook_x360_1040_g7elitebook_830_g9elite_x2_g4zbook_15_g5probook_455_g8elitebook_830_g8elitebook_840_g9_firmwarezhan_66_pro_a_14_g4elite_x2_g8__firmwareelitebook_x360_830_g8_firmwarezhan_66_pro_a_14_g3_firmwareprobook_445_g8_firmwarezhan_66_pro_14_g4elite_dragonfly_g3z2_small_form_factor_g4eliteone_800_g5_firmwareprobook_455_g5_firmwareengage_one_pro_aio_systemz240_small_form_factorproone_600_g4_firmwareelitebook_830_g7elitebook_640_g9mt31probook_455_g6_firmwareprobook_450_g4mt32_firmwareprobook_440_g6_firmwareelitebook_850_g4elitebook_x360_830_g6_firmwareelitebook_830_g6_firmwareelite_tower_680_g9zhan_66_pro_g1_firmwareelite_x2_g4_firmwarezhan_66_pro_13_g2_firmwareelitebook_x360_830_g7_firmwareengage_go_10_mobile_system_firmwareelite_dragonfly_g3_firmwareelite_dragonfly_g2_firmwareprobook_x360_11_g7_eemt43_firmwareelitebook_x360_1030_g3_firmwareelite_x360_1040_g9_firmwareelite_mini_800_g9_firmwareelitebook_645_g9proone_400_g4elitebook_840_g6_healthcare_editionelite_sff_600_g9prodesk_600_g4zhan_66_pro_15_g2_firmwarezhan_66_pro_14_g4_firmwarezbook_firefly_15_g7mt31_firmwarez2_tower_g4_firmwarezbook_studio_g4eliteone_800_g8z1_entry_tower_g5z238_microtower_firmwareeliteone_800_g5_healthcare_editionzbook_power_g9_firmwaremt43probook_440_g4_firmwareelitebook_845_g8_firmwareprobook_640_g8elitebook_830_g9_firmwarezhan_66_pro_g1rp9_g1_retail_system_firmwareelitebook_840_g7elitebook_1050_g1elitebook_850_g5prodesk_400_g7zbook_power_g7proone_600_g4elite_x360_830_g9eliteone_800_g4_healthcare_editionelite_mini_600_g9_firmwarez238_microtowerelitedesk_880_g6_firmwareelitebook_630_g9elitedesk_705_g4elitebook_x360_1040_g6_firmwarezbook_firefly_g9_firmwareelitebook_x360_1030_g4_firmwareprobook_x360_11_g3_ee_firmwarezhan_66_pro_14_g3_firmwareproone_400_g3probook_430_g4_firmwarezhan_66_pro_a_14_g3zbook_power_g8probook_440_g8_firmwareelitebook_x360_1020_g2_firmwarezbook_15_g6_firmwareelite_sff_800_g9zbook_fury_16_g9zbook_create_g7_firmwareproone_440_g6_firmwareprobook_fortis_g10_firmwareelitebook_840_g5elitebook_850_g4_firmwareprobook_440_g5mt21_firmwareproone_440_g9_firmwarezhan_66_pro_a_14_g4_firmwarezhan_66_pro_g3elitebook_1050_g1_firmwareelitebook_755_g5_firmwareprobook_640_g4probook_455_g9_firmwareprobook_445r_g6_firmwarezhan_66_pro_g3_firmwareproone_400_g5_firmwareprobook_455_g4_firmwarez2_tower_g5z2_tower_g8_firmwaremt46elitedesk_800_g3_firmwareprodesk_600_g6_firmwareproone_600_g6zhan_66_pro_13_g2elite_dragonflyzbook_firefly_g8probook_440_g5_firmwarez2_small_form_factor_g5_firmwareelite_dragonfly_maxzbook_14u_g6_firmwareprobook_445r_g6zbook_15_g6z1_entry_tower_g6elitebook_835_g7_firmwareelitebook_745_g5_firmwareelitebook_850_g6_firmwareelitebook_820_g4z2_tower_g8eliteone_1000_g1eliteone_800_g3_firmwareprobook_430_g8_firmwareelitedesk_880_g4elitedesk_880_g5probook_fortis_g9_firmwareprobook_635_aero_g7eliteone_800_g6_firmwareprobook_470_g5prodesk_400_g3z1_g9_tower_firmwareelitebook_840_g8probook_640_g4_firmwareelitebook_846_g5zbook_fury_g8zbook_studio_g4_firmwareelitebook_828_g4probook_455r_g6_firmwareprodesk_405_g4proone_400_g3_firmwareengage_go_mobile_systemelitebook_755_g4_firmwarezbook_17_g5_firmwareelitebook_830_g5elitedesk_880_g8_firmwareeliteone_800_g4_firmwareelitebook_640_g9_firmwareelitebook_x360_1040_g6proone_600_g6_firmwareelitebook_840_g6_firmwarezhan_66_pro_15_g2prodesk_680_g4_firmwareprodesk_600_g5_firmwareelitebook_735_g6_firmwarez240_tower_firmwareprodesk_480_g7_pcizbook_firefly_14_g7_firmwareelitebook_745_g5mini_conferencingprobook_440_g9probook_x360_11_g2_ee_firmwarepro_x360_fortis_g9_firmwareelitebook_855_g8elitebook_745_g6_firmwareprobook_470_g4_firmwareelite_sff_800_g9_firmwareeliteone_800_g3elitebook_836_g6_firmwareelitebook_x360_1030_g7probook_x360_11_g5_eeeliteone_870_g9_firmwareprobook_440_g9_firmwareelitebook_x360_1040_g7_firmwareprobook_x360_440_g1z1_entry_tower_g6_firmwarez2_small_form_factor_g8elite_tower_800_g9elitebook_x360_1040_g5elitebook_850_g8elitebook_835_g9elite_sff_600_g9_firmwarerp9_g1_retail_systemelitebook_x360_1030_g4zbook_15_g4_firmwareprobook_x360_440_g1_firmwareprodesk_405_g6elitebook_846r_g4_firmwarezbook_15_g5_firmwareproone_440_g5elitebook_840_g5_healthcare_edition_firmwareprobook_455_g8_firmwareprobook_x360_435_g8elitebook_840_g4_firmwareelitedesk_705_g4_firmwareproone_400_g5elitebook_840_g6_healthcare_edition_firmwareprodesk_680_g6_pci_firmwareprobook_655_g3probook_640_g7_firmwareprodesk_600_g4_firmwareelitebook_840_g6engage_flex_mini_retail_system_firmwareprobook_455_g6elitebook_850_g8_firmwareprobook_x360_11_g4_eeprodesk_400_g6_firmwarezbook_studio_g9_firmwareelitedesk_800_g5prodesk_405_g4_firmwaremt44probook_640_g3_firmwareprobook_450_g8pro_x2_612_g2_firmwareelitebook_745_g4_firmwarezbook_studio_g8_firmwareelitebook_840_aero_g8_firmwareelite_x2_1012_g2probook_450_g9_firmwareprobook_445_g9_firmwareelitebook_840_g9zbook_studio_x360_g5zbook_15u_g6zbook_studio_x360_g5_firmwareengage_go_10_mobile_systemzbook_x2_g4_firmwaremt21probook_650_g3pro_x360_fortis_g10_firmwareelite_dragonfly_max_firmwareprobook_x360_435_g8_firmwarezbook_studio_g7_firmwarezbook_firefly_15_g7_firmwareelitedesk_705_g5eliteone_800_g5_healthcare_edition_firmwareelite_x360_1040_g9engage_one_pro_aio_system_firmwarezbook_15u_g5elitedesk_805_g6_firmwareelitebook_840_g5_healthcare_editionelitebook_855_g8_firmwareelite_x2_1013_g3_firmwareprobook_x360_435_g7z2_small_form_factor_g4_firmwareelitebook_828_g4_firmwareelitebook_830_g7_firmwarepro_x360_fortis_g9z2_mini_g9elitebook_850_g6probook_450_g7engage_go_mobile_system_firmwareengage_one_all-in-one_system_firmwareelitebook_848_g4_firmwarezhan_66_pro_a_14_g5_firmwareelitedesk_800_g6_firmwareprobook_450_g7_firmwareelitebook_745_g4pro_mini_400_g9elitebook_725_g4_firmwareelite_tower_680_g9_firmwareprobook_650_g4zbook_fury_16_g9_firmwareprobook_650_g5zbook_create_g7prodesk_400_g3_firmwarezhan_66_pro_14_g2_firmwareeliteone_1000_g1_firmwareproone_440_g4_firmwareelitebook_745_g6elitebook_650_g9_firmwareprobook_430_g6engage_flex_pro_retail_system_firmwareelitebook_1040_g9elitebook_x360_1030_g3proone_600_g5_firmwarezhan_66_pro_g5_firmwarez1_all-in-one_g3_firmwareelitedesk_800_g5_firmwareprodesk_600_g6zhan_x_13_g2_firmwarepro_mini_400_g9_firmwareprobook_455r_g6elitedesk_705_g5_firmwareprobook_430_g7elitebook_650_g9prodesk_600_g3_firmwareprobook_450_g8_firmwarepro_sff_400_g9_firmwareelitebook_836_g5probook_650_g3_firmwareelitebook_855_g7probook_x360_11_g7_ee_firmwareprodesk_400_g7_firmwaremt46_firmwareprobook_650_g7probook_455_g7_firmwareelitebook_x360_1030_g2_firmwareproone_400_g6probook_x360_11_g2_eeelite_dragonfly_firmwareprobook_450_g4_firmwareelitebook_840_g8_firmwarepro_tower_480_g9_firmwareelitebook_850_g7mt22z2_tower_g5_firmwareelitebook_x360_1040_g5_firmwareproone_600_g5probook_430_g5probook_430_g7_firmwarezbook_power_g7_firmwareprobook_x360_11_g5_ee_firmwareelite_slice_g2elitebook_845_g7elitebook_850_g7_firmwareprodesk_400_g5elitebook_655_g9elitebook_1040_g4_firmwareelitedesk_880_g3_firmwareprobook_450_g5_firmwareelitebook_840_aero_g8zbook_firefly_g8_firmwareprobook_645_g3zbook_14u_g5elitebook_x360_1030_g8_firmwaremp9_g4_retail_system_firmwareelitebook_840r_g4probook_645_g4z1_g8_tower_firmwarez2_small_form_factor_g9engage_flex_mini_retail_systemzbook_studio_g8elitebook_845_g9_firmwareprobook_655_g3_firmwareprodesk_680_g4probook_635_aero_g8probook_440_g7_firmwareprodesk_680_g6_pcimt45zbook_15u_g5_firmwareelitebook_655_g9_firmwareengage_flex_pro_retail_systemelitedesk_805_g8_firmwarezbook_x2_g4z1_all-in-one_g3probook_645_g3_firmwareelitebook_830_g5_firmwareprobook_635_aero_g7_firmwareelitebook_840r_g4_firmwarezhan_66_pro_g5prodesk_480_g6_firmwareprodesk_405_g8pro_mt440_g3probook_fortis_g9HP PC BIOS
CWE ID-CWE-367
Time-of-check Time-of-use (TOCTOU) Race Condition
CVE-2020-7460
Matching Score-4
Assigner-FreeBSD
ShareView Details
Matching Score-4
Assigner-FreeBSD
CVSS Score-7||HIGH
EPSS-1.55% / 80.68%
||
7 Day CHG~0.00%
Published-06 Aug, 2020 | 16:49
Updated-04 Aug, 2024 | 09:25
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In FreeBSD 12.1-STABLE before r363918, 12.1-RELEASE before p8, 11.4-STABLE before r363919, 11.4-RELEASE before p2, and 11.3-RELEASE before p12, the sendmsg system call in the compat32 subsystem on 64-bit platforms has a time-of-check to time-of-use vulnerability allowing a mailcious userspace program to modify control message headers after they were validation.

Action-Not Available
Vendor-n/aFreeBSD Foundation
Product-freebsdFreeBSD
CWE ID-CWE-367
Time-of-check Time-of-use (TOCTOU) Race Condition
CVE-2023-26299
Matching Score-4
Assigner-HP Inc.
ShareView Details
Matching Score-4
Assigner-HP Inc.
CVSS Score-7||HIGH
EPSS-0.15% / 36.68%
||
7 Day CHG~0.00%
Published-30 Jun, 2023 | 15:40
Updated-04 Dec, 2024 | 16:06
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A potential Time-of-Check to Time-of-Use (TOCTOU) vulnerability has been identified in certain HP PC products using AMI UEFI Firmware (system BIOS), which might allow arbitrary code execution. AMI has released updates to mitigate the potential vulnerability.

Action-Not Available
Vendor-HP Inc.
Product-pro_tower_290_g9_desktop_firmware280_pro_g5_small_form_factor_firmware205_g4_22_all-in-one290_g1t430_firmware200_pro_g4_22_all-in-one_firmwarezhan_86_pro_g2_microtower_firmwareproone_240_g10_firmwaredesktop_pro_g1_microtower_firmware260_g4_desktop_mini_firmware280_g3_firmware280_g6_firmware470_g10desktop_pro_g1_microtowerpro_small_form_factor_280_g9_desktop_firmware240_g10_firmware282_pro_g4_microtower_firmware290_g3349_g7247_g8_firmwarepro_tower_290_g9_desktop280_g5_firmware282_g5_firmwareproone_490_g3280_g5_small_form_factor_firmware470_g9280_g4_microtower_firmwareproone_240_g10280_g4_microtowerproone_440_g3pro_small_form_factor_zhan_66_g9_desktop280_g8_microtower280_pro_g3t430250_g10_firmware255_g10_firmware290_g2280_pro_g4_microtower_firmware290_g2_firmware245_g6_firmware290_g2_microtowerproone_496_g3288_g5_firmwareproone_440_g3_firmware280_g4_firmwarepro_tower_280_g9_desktop290_g2_microtower_firmwarepro_tower_zhan_99_g9_desktop245_g6200_g3205_pro_g4_22_all-in-onepro_tower_200_g9_desktop245_g8_firmwarezhan_99_g4z_vr_backpack_g1_workstation_firmwarezhan_99_pro_g1_microtower_firmware280_pro_g5_small_form_factor288_g6zhan_99_g4_firmware247_g8288_pro_g4_microtower_firmwarez_vr_backpack_g1_workstationt628280_g4288_g6_firmware255_g10proone_496_g3_firmwarezhan_99_g2_firmwareproone_240_g9_firmwarepro_small_form_factor_290_g9_desktop_firmware280_g3200_g4_22_all-in-onepro_tower_200_g9_desktop_firmwarezhan_86_pro_g2_microtower250_g10282_pro_g4_microtowerpro_tower_zhan_99_g9_desktop_firmware282_g6240_g10zhan_99_g2290_g4proone_490_g3_firmware280_g5260_g4_desktop_mini290_g4_firmware280_g5_small_form_factor280_pro_g4_microtower282_g6_firmware290_g1_firmware290_g3_small_form_factorpro_small_form_factor_zhan_66_g9_desktop_firmwarezhan_99_pro_g1_microtower200_g3_firmwarepro_small_form_factor_280_g9_desktoppro_small_form_factor_290_g9_desktop349_g7_firmware280_g8_microtower_firmwareproone_240_g9t628_firmware245_g7470_g10_firmware282_g5288_pro_g4_microtower280_pro_g3_firmwarevr_backpack_g2_firmware280_g6200_g4_22_all-in-one_firmware205_g4_22_all-in-one_firmwarepro_tower_280_g9_desktop_firmwarevr_backpack_g2470_g9_firmware245_g7_firmware200_pro_g4_22_all-in-one290_g3_small_form_factor_firmware288_g5290_g3_firmware205_pro_g4_22_all-in-one_firmware245_g8HP PC products using AMI UEFI Firmware
CWE ID-CWE-367
Time-of-check Time-of-use (TOCTOU) Race Condition
CVE-2024-45565
Matching Score-4
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-4
Assigner-Qualcomm, Inc.
CVSS Score-7.8||HIGH
EPSS-0.01% / 1.44%
||
7 Day CHG~0.00%
Published-06 May, 2025 | 08:31
Updated-09 May, 2025 | 19:17
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Time-of-check Time-of-use (TOCTOU) Race Condition in Camera Driver

Memory corruption when blob structure is modified by user-space after kernel verification.

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-snapdragon_429_mobile_firmwarewcn3620_firmwaresdm429wwcn3620sdm429w_firmwarewcn3660b_firmwaresnapdragon_429_mobilewcn3660bSnapdragon
CWE ID-CWE-367
Time-of-check Time-of-use (TOCTOU) Race Condition
CVE-2023-25394
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-7||HIGH
EPSS-0.03% / 7.09%
||
7 Day CHG~0.00%
Published-16 May, 2023 | 00:00
Updated-23 Jan, 2025 | 18:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Videostream macOS app 0.5.0 and 0.4.3 has a Race Condition. The Updater privileged script attempts to update Videostream every 5 hours.

Action-Not Available
Vendor-getvideostreamn/a
Product-videostreamn/a
CWE ID-CWE-367
Time-of-check Time-of-use (TOCTOU) Race Condition
CVE-2023-28576
Matching Score-4
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-4
Assigner-Qualcomm, Inc.
CVSS Score-6.4||MEDIUM
EPSS-0.02% / 4.64%
||
7 Day CHG~0.00%
Published-08 Aug, 2023 | 09:15
Updated-02 Aug, 2024 | 13:43
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Time-of-check Time-of-use (TOCTOU) Race Condition in Camera Kernel Driver

The buffer obtained from kernel APIs such as cam_mem_get_cpu_buf() may be readable/writable in userspace after kernel accesses it. In other words, user mode may race and modify the packet header (e.g. header.count), causing checks (e.g. size checks) in kernel code to be invalid. This may lead to out-of-bounds read/write issues.

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-fastconnect_7800snapdragon_865_5gwcd9380_firmwarewsa8830qcs610sw5100psd865_5gfastconnect_6900fastconnect_6800fastconnect_6900_firmwaresnapdragon_8_gen_1_firmwarewcn3988_firmwareqcn9074snapdragon_870_5gwsa8835wcn3950_firmwaresnapdragon_8_gen_1wsa8810_firmwarewcd9380wcd9341_firmwarefastconnect_7800_firmwaresw5100wsa8810qca6436qcs410snapdragon_865\+_5gsnapdragon_x55_5gqcs610_firmwaresw5100p_firmwaresxr2130wcd9370snapdragon_865\+_5g_firmwarewcn3680bqca6426sxr2130_firmwarewcd9341wcn3980qca6391_firmwarewcn3950snapdragon_xr2_5g_firmwarewcd9370_firmwarewcn3660bwsa8815snapdragon_870_5g_firmwarewsa8830_firmwaresd865_5g_firmwareqca6426_firmwarewcn3660b_firmwarewcn3988wsa8815_firmwaresnapdragon_x55_5g_firmwarewcn3680b_firmwarewsa8835_firmwaresw5100_firmwareqcn9074_firmwarefastconnect_6800_firmwareqcs410_firmwaresnapdragon_865_5g_firmwareqca6391wcn3980_firmwareqca6436_firmwaresnapdragon_xr2_5gSnapdragon
CWE ID-CWE-367
Time-of-check Time-of-use (TOCTOU) Race Condition
CVE-2023-27470
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-7||HIGH
EPSS-1.00% / 76.08%
||
7 Day CHG+0.03%
Published-11 Sep, 2023 | 00:00
Updated-26 Sep, 2024 | 15:41
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

BASupSrvcUpdater.exe in N-able Take Control Agent through 7.0.41.1141 before 7.0.43 has a TOCTOU Race Condition via a pseudo-symlink at %PROGRAMDATA%\GetSupportService_N-Central\PushUpdates, leading to arbitrary file deletion.

Action-Not Available
Vendor-n-ablen/an-ableMicrosoft Corporation
Product-windowstake_controln/atake_control
CWE ID-CWE-367
Time-of-check Time-of-use (TOCTOU) Race Condition
CVE-2022-31466
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-7.9||HIGH
EPSS-0.04% / 8.68%
||
7 Day CHG~0.00%
Published-23 May, 2022 | 18:19
Updated-03 Aug, 2024 | 07:19
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
TOCTOU Vulnerability in Quick Heal Total Security

Time of Check - Time of Use (TOCTOU) vulnerability in Quick Heal Total Security prior to 12.1.1.27 allows a local attacker to achieve privilege escalation, potentially leading to deletion of system files. This is achieved through exploiting the time between detecting a file as malicious and when the action of quarantining or cleaning is performed, and using the time to replace the malicious file by a symlink.

Action-Not Available
Vendor-quickhealn/a
Product-total_securityn/a
CWE ID-CWE-59
Improper Link Resolution Before File Access ('Link Following')
CWE ID-CWE-367
Time-of-check Time-of-use (TOCTOU) Race Condition
CVE-2024-38418
Matching Score-4
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-4
Assigner-Qualcomm, Inc.
CVSS Score-7.8||HIGH
EPSS-0.01% / 1.71%
||
7 Day CHG~0.00%
Published-03 Feb, 2025 | 16:51
Updated-05 Feb, 2025 | 13:57
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Time-of-check Time-of-use (TOCTOU) Race Condition in Camera Linux

Memory corruption while parsing the memory map info in IOCTL calls.

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-fastconnect_7800_firmwareqca6426sdm429wqca6696sd865_5gcsrb31024qcs610sa8155p_firmwareqam8295p_firmwaresd865_5g_firmwarec-v2x_9150_firmwaresa8195p_firmwaresa8145p_firmwareqcn9074_firmwarewcn3620_firmwarevideo_collaboration_vc1_platform_firmwarewcn3680bwcd9380_firmwaresnapdragon_auto_4g_modemqca6574au_firmwareqsm8250_firmwareqca6391_firmwaresa8195psnapdragon_auto_4g_modem_firmwarewcn3950_firmwareqca6391wcn3660bsdm429w_firmwarec-v2x_9150wcn3980wcn3950video_collaboration_vc3_platform_firmwaresnapdragon_w5\+_gen_1_wearablesw5100sxr2230pwcd9370sa8540p_firmwaresnapdragon_x55_5g_modem-rfsw5100p_firmwaresa8295p_firmwaresnapdragon_865\+_5g_mobilesa8150p_firmwaresxr2230p_firmwaresnapdragon_429_mobile_firmwarewsa8835sa9000psxr2130csrb31024_firmwareqsm8250qca6426_firmwareqcn9074fastconnect_7800sa6155p_firmwarewcd9341_firmwaresnapdragon_8_gen_1_mobileqca6564au_firmwaresnapdragon_870_5g_mobilesnapdragon_865_5g_mobile_firmwareqam8295psnapdragon_xr2_5g_firmwarewcd9341wcn3988snapdragon_x55_5g_modem-rf_firmwaresnapdragon_865_5g_mobileqca6574ausa8150psa6150p_firmwarefastconnect_6900snapdragon_xr2_5gwcn3988_firmwaresw5100_firmwaresxr2250pfastconnect_6800snapdragon_429_mobileqcs410_firmwaresa8530p_firmwareqca6696_firmwaresnapdragon_8_gen_1_mobile_firmwarewsa8810_firmwarewcd9385_firmwaresa6150pwcn3680b_firmwarewsa8810wsa8832sa8295psa6145p_firmwareqcs610_firmwaresa6145psnapdragon_870_5g_mobile_firmwarewsa8815snapdragon_w5\+_gen_1_wearable_firmwareqcs410sdx55sdx55_firmwaresa6155psnapdragon_865\+_5g_mobile_firmwarewcd9380video_collaboration_vc3_platformwsa8830qca6436_firmwarewsa8815_firmwaresa8155pwsa8832_firmwaresa8145psw5100psa8530pwsa8830_firmwarewcn3620wcn3980_firmwareqca6564ausxr2130_firmwarevideo_collaboration_vc1_platformqca6436fastconnect_6900_firmwaresa8540pqca6595au_firmwaresa9000p_firmwarefastconnect_6800_firmwarewcd9385qca6595auwcn3660b_firmwarewsa8835_firmwaresxr2250p_firmwarewcd9370_firmwareSnapdragon
CWE ID-CWE-367
Time-of-check Time-of-use (TOCTOU) Race Condition
CVE-2022-27904
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-7||HIGH
EPSS-0.08% / 25.55%
||
7 Day CHG~0.00%
Published-30 Jun, 2022 | 23:25
Updated-03 Aug, 2024 | 05:41
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Automox Agent for macOS before version 39 was vulnerable to a time-of-check/time-of-use (TOCTOU) race-condition attack during the agent install process.

Action-Not Available
Vendor-automoxn/aApple Inc.
Product-automoxmacosn/a
CWE ID-CWE-367
Time-of-check Time-of-use (TOCTOU) Race Condition
CVE-2022-26859
Matching Score-4
Assigner-Dell
ShareView Details
Matching Score-4
Assigner-Dell
CVSS Score-6.1||MEDIUM
EPSS-0.01% / 0.31%
||
7 Day CHG~0.00%
Published-06 Sep, 2022 | 20:15
Updated-16 Sep, 2024 | 20:27
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Dell BIOS contains a race condition vulnerability. A local attacker could exploit this vulnerability by sending malicious input via SMI in order to bypass security checks during SMM.

Action-Not Available
Vendor-Dell Inc.
Product-latitude_5401vostro_5391_firmwareoptiplex_7770_all-in-onexps_15_9510_firmwareinspiron_3470latitude_e7270inspiron_7300_firmwarelatitude_3520vostro_3468precision_3561_firmwareinspiron_7570vostro_3669xps_17_9710_firmwareg5_15_5587inspiron_5590_firmwareprecision_7560g7_17_7790_firmwarelatitude_5179latitude_7380_firmwarevostro_3888xps_13_9370inspiron_5570inspiron_7490vostro_3888_firmwarelatitude_e5270precision_7540wyse_7040_thin_clientwyse_5070latitude_9420inspiron_5490_firmwarelatitude_5590optiplex_5080inspiron_5502latitude_5511latitude_7390_2-in-1inspiron_7501precision_5530_2-in-1inspiron_7300_2-in-1precision_5550xps_17_9700inspiron_7580_firmwareprecision_7720vostro_5581_firmwarelatitude_5300vostro_3400latitude_3380_firmwareoptiplex_7760_aiog3_3500precision_5530_firmwareoptiplex_5040vostro_15_7580optiplex_5050latitude_7320latitude_3470inspiron_15_gaming_7577latitude_7300optiplex_7090optiplex_3050_aioprecision_3620_towervostro_5468g7_17_7700_firmwarexps_13_9360optiplex_5055_firmwareprecision_3431_toweroptiplex_3060_firmwareinspiron_5490_aio_firmwareinspiron_7000latitude_3420latitude_3590_firmwarelatitude_7490_firmwarevostro_5491_firmwareprecision_5520latitude_5310_2-in-1_firmwareinspiron_7490_firmwareinspiron_5409latitude_7400latitude_5591optiplex_5270_all-in-one_firmwareinspiron_3471inspiron_3511_firmwarelatitude_3390optiplex_5050_firmwareprecision_7520_firmwareoptiplex_7071_firmwarelatitude_5175_firmwareinspiron_7586optiplex_3040_firmwarelatitude_3400optiplex_5070latitude_3420_firmwareg5_5000inspiron_13_5378_firmwarexps_15_9575_2-in-1inspiron_5491_2-in-1_firmwarelatitude_7285_firmwareoptiplex_3090_firmwareoptiplex_3240_all-in-onexps_13_9370_firmwarevostro_3581_firmwareinspiron_7506_2-in-1_firmwarelatitude_7320_detachable_firmwarevostro_3581latitude_9410optiplex_7070latitude_3570optiplex_7080_firmwarelatitude_5420_rugged_firmwareinspiron_5491_aio_firmwareinspiron_15_5578_firmwarelatitude_5310vostro_5391latitude_3301inspiron_5594latitude_5420_ruggedoptiplex_7090_ultra_firmwarevostro_3268_firmwarevostro_3660inspiron_7000_firmwarelatitude_7220_rugged_extreme_tabletprecision_3450inspiron_5510latitude_7390_2-in-1_firmwarelatitude_5495inspiron_5400latitude_7480_firmwarevostro_3568latitude_e5470_firmwarevostro_5591vostro_5090precision_5560latitude_3190vostro_5370latitude_7220ex_rugged_extreme_tablet_firmwareinspiron_5580_firmwareinspiron_3881_firmwarelatitude_5488latitude_5521vostro_3478latitude_7380optiplex_5480_all-in-one_firmwareprecision_3540inspiron_3910inspiron_7510_firmwareinspiron_3580_firmwarelatitude_7520inspiron_3781_firmwarevostro_5370_firmwarewyse_5070_firmwarevostro_3670_firmwareinspiron_15_gaming_7577_firmwarelatitude_3310latitude_7414_rugged_extreme_firmwarelatitude_5290_2-in-1precision_7520vostro_3660_firmwarewyse_5470_all-in-one_firmwareinspiron_5482precision_7820_toweroptiplex_3090latitude_7290vostro_5410latitude_7212_rugged_extreme_tablet_firmwareinspiron_5402precision_7540_firmwareinspiron_7700_aiolatitude_7480vostro_3401_firmwareinspiron_7391_firmwarevostro_3881vostro_5401edge_gateway_5000_firmwareinspiron_5593wyse_5470_firmwarelatitude_5420_firmwareprecision_3561inspiron_7580vostro_5390_firmwareinspiron_5770latitude_3580vostro_5300precision_5820_tower_firmwareinspiron_3493_firmwarelatitude_3190_2-in-1_firmwarevostro_5301xps_15_9510inspiron_5480_firmwareinspiron_3590latitude_7210_2-in-1optiplex_xe3_firmwareinspiron_7590vostro_5880vostro_3268optiplex_7070_firmwarealienware_m15_r6_firmwareoptiplex_5270_all-in-oneinspiron_5410_2-in-1optiplex_xe3vostro_3584precision_5510latitude_3301_firmwareinspiron_7370vostro_3481_firmwarelatitude_5491latitude_9520_firmwareprecision_5560_firmwarevostro_5468_firmwarevostro_3690_firmwareoptiplex_7040inspiron_7386latitude_5520_firmwareoptiplex_5090optiplex_5480_all-in-oneinspiron_5591_2-in-1_firmwarelatitude_7280latitude_5400latitude_5410inspiron_7373_firmwareprecision_3541xps_8940optiplex_7050_firmwareprecision_7730_firmwarelatitude_3379_firmwarelatitude_5401_firmwareprecision_3551vostro_5491precision_5820_towerprecision_7730inspiron_7380precision_3640_tower_firmwareinspiron_7610latitude_7275_2-in-1_firmwarevostro_5301_firmwareg7_17_7790vostro_5890embedded_box_pc_3000inspiron_5400_2-in-1latitude_7285inspiron_7570_firmwarelatitude_5400_firmwareinspiron_7610_firmwareoptiplex_7770_all-in-one_firmwareinspiron_5400_2-in-1_firmwareinspiron_7391vostro_3671_firmwareprecision_3440vostro_5402optiplex_7090_ultrag5_5000_firmwareoptiplex_7470_all-in-oneoptiplex_7460_firmwareoptiplex_5250_firmwareinspiron_3576inspiron_3671_firmwareinspiron_7500_2-in-1_firmwareinspiron_5510_firmwareprecision_3550_firmwarevostro_3668_firmwarelatitude_3310_firmwarevostro_15_7580_firmwarelatitude_7214inspiron_3781vostro_3690inspiron_3576_firmwareinspiron_5300_firmwareg7_7588_firmwarelatitude_3570_firmwareoptiplex_3050_firmwareoptiplex_7490_all-in-onevostro_7500inspiron_7590_firmwareinspiron_7791_firmwarevostro_3568_firmwareprecision_7740_firmwareinspiron_15_3567latitude_7389vostro_3681inspiron_5570_firmwareprecision_7920_towerlatitude_7400_2-in-1_firmwareinspiron_3481inspiron_3780_firmwareprecision_3530g7_7588latitude_5411_firmwarelatitude_3510_firmwareinspiron_3470_firmwareinspiron_3593optiplex_7070_ultrainspiron_5370precision_7740xps_13_9365inspiron_3481_firmwareprecision_5530latitude_7275_2-in-1latitude_7310_firmwareoptiplex_7440_aioinspiron_15_5579_firmwareinspiron_7306_2-in-1xps_13_9310_firmwareinspiron_3790_firmwarelatitude_9510optiplex_3280_all-in-oneinspiron_5770_firmwareinspiron_7586_firmwareprecision_5760_firmwarelatitude_3180_firmwarevostro_3681_firmwarevostro_3580_firmwareinspiron_3581_firmwareinspiron_17_7773latitude_9510_firmwarevostro_5890_firmwareinspiron_3910_firmwareinspiron_5406_2-in-1optiplex_5490_aio_firmwareprecision_7760_firmwarelatitude_3490_firmwarelatitude_5300_2-in-1_firmwareinspiron_3511vostro_3668xps_13_9305_firmwareinspiron_5410latitude_7280_firmwarevostro_5502vostro_3670edge_gateway_3000latitude_5280latitude_5179_firmwareoptiplex_7780_all-in-oneinspiron_5490inspiron_15_5578inspiron_3501_firmwarelatitude_5300_firmwarewyse_7040_thin_client_firmwareinspiron_3880inspiron_5580latitude_5480_firmwareprecision_3930_rackprecision_7550vostro_3490inspiron_5391g5_15_5590_firmwareinspiron_5598latitude_5320_firmwarexps_7590_firmwareoptiplex_3080latitude_3480precision_5750latitude_rugged_5430vostro_3671inspiron_7591latitude_7310inspiron_7790latitude_5421_firmwareinspiron_7500inspiron_7790_firmwareg15_5511latitude_3379precision_5760vostro_3584_firmwareoptiplex_7480_all-in-onechengming_3990_firmwarevostro_3478_firmwareprecision_3520_firmwareinspiron_5594_firmwarechengming_3980precision_3551_firmwareoptiplex_7070_ultra_firmwareinspiron_7700_aio_firmwarevostro_3400_firmwarevostro_5310_firmwareoptiplex_7060latitude_5290_firmwarelatitude_7424_rugged_extremeinspiron_13_5379_firmwareoptiplex_7480_all-in-one_firmwareg5_5090_firmwareoptiplex_3240_all-in-one_firmwarelatitude_7390vostro_3500g3_15_3590latitude_3390_firmwareprecision_3240_compactinspiron_14_3476precision_7750_firmwarelatitude_3520_firmwarelatitude_5285_2-in-1_firmwareinspiron_5490_aiovostro_3401chengming_3991_firmwarevostro_3480_firmwarevostro_7590_firmwareprecision_3510_firmwareinspiron_7400inspiron_7370_firmwareprecision_3650_tower_firmwarelatitude_7389_firmwareinspiron_7500_2-in-1optiplex_7470_all-in-one_firmwarevostro_3510latitude_e7470precision_3630_tower_firmwareoptiplex_5040_firmwarexps_13_9310_2-in-1inspiron_3581inspiron_13_7378vostro_5568inspiron_5400_firmwareinspiron_15_5566_firmwarelatitude_5424_ruggedlatitude_5488_firmwareinspiron_5583inspiron_7500_firmwareprecision_3541_firmwareinspiron_5591_2-in-1g5_5500g5_15_5587_firmwareinspiron_15_7572inspiron_7506_2-in-1vostro_5568_firmwareg7_7500precision_3650_towerinspiron_7373latitude_7200_2-in-1latitude_5511_firmwarevostro_3490_firmwarevostro_3881_firmwareoptiplex_7040_firmwareinspiron_5493precision_3550inspiron_3891_firmwarelatitude_7370_firmwarelatitude_7370optiplex_3090_ultra_firmwarelatitude_7420_firmwareoptiplex_5070_firmwareinspiron_5501vostro_5501_firmwarelatitude_3310_2-in-1inspiron_5390_firmwareoptiplex_3090_ultralatitude_5490vostro_3070_firmwareinspiron_7390_firmwarexps_7590latitude_3190_2-in-1optiplex_7071edge_gateway_5000vostro_3481inspiron_3891inspiron_7786vostro_5310xps_13_9305latitude_9410_firmwarevostro_7590latitude_e7270_firmwarelatitude_5280_firmwarelatitude_3180inspiron_7300_2-in-1_firmwareinspiron_7706_2-in-1_firmwarelatitude_5300_2-in-1latitude_7424_rugged_extreme_firmwarelatitude_e5470optiplex_7090_firmwareoptiplex_3070_firmwareg15_5511_firmwarelatitude_7410_firmwarevostro_3667latitude_e7470_firmwareoptiplex_5260_all-in-oneprecision_7720_firmwarelatitude_5310_2-in-1vostro_3910inspiron_5491_aioinspiron_13_5378inspiron_3780inspiron_7380_firmwareg5_5500_firmwarelatitude_rugged_7330_firmwarelatitude_7390_firmwarelatitude_5500_firmwareprecision_7710latitude_5410_firmwarevostro_5090_firmwarelatitude_3400_firmwarevostro_3890latitude_3510precision_3560_firmwareinspiron_5584precision_3520inspiron_17_7773_firmwareinspiron_7573_firmwarelatitude_5495_firmwarelatitude_e5570vostro_5401_firmwareinspiron_3880_firmwareinspiron_5310_firmwareinspiron_5501_firmwareg5_5090optiplex_3050precision_7820_tower_firmwareoptiplex_5055optiplex_5080_firmwarelatitude_e5270_firmwareinspiron_5493_firmwarevostro_3471xps_17_9700_firmwareinspiron_3480_firmwareoptiplex_5060_firmwarevostro_3590vostro_5390vostro_3578vostro_5590_firmwarelatitude_3470_firmwareprecision_7530_firmwareinspiron_3790vostro_3583_firmwareinspiron_15_5566latitude_3190_firmwareinspiron_5494xps_15_9500latitude_5500inspiron_15_5582inspiron_5508_firmwareprecision_7550_firmwarelatitude_3500_firmwarechengming_3991latitude_5288_firmwareinspiron_7501_firmwareinspiron_5480optiplex_7760_aio_firmwareg15_5510_firmwarevostro_7510_firmwarelatitude_5290_2-in-1_firmwareinspiron_3471_firmwarevostro_3669_firmwarevostro_7510inspiron_7791latitude_5501latitude_7400_firmwareprecision_7710_firmwarelatitude_3590vostro_3501precision_3450_firmwareinspiron_7472_firmwarechengming_3990inspiron_5301vostro_3583latitude_5491_firmwarevostro_5880_firmwarexps_17_9710inspiron_3493precision_5750_firmwarelatitude_7214_firmwarexps_13_9365_firmwareoptiplex_3060optiplex_5060latitude_5285_2-in-1chengming_3988_firmwareinspiron_5482_firmwarelatitude_3410_firmwarelatitude_5520inspiron_7510vostro_5481wyse_5470_all-in-oneinspiron_7400_firmwareprecision_3530_firmwarelatitude_3320inspiron_5583_firmwarexps_13_9310_2-in-1_firmwarelatitude_5580_firmwarelatitude_3189inspiron_5410_2-in-1_firmwarexps_15_9575_2-in-1_firmwarevostro_3580precision_7750inspiron_7472latitude_5175inspiron_14_3467_firmwareembedded_box_pc_5000embedded_box_pc_3000_firmwarelatitude_3320_firmwareinspiron_3580vostro_3267_firmwarevostro_3470_firmwareg3_3579inspiron_7386_firmwareoptiplex_7080vostro_3578_firmwareg15_5510vostro_7500_firmwarelatitude_5480inspiron_5310vostro_5510_firmwarevostro_5471_firmwareinspiron_14_3476_firmwareoptiplex_3046vostro_3468_firmwarelatitude_5414_rugged_firmwarelatitude_5424_rugged_firmwarelatitude_rugged_7330inspiron_15_5582_firmwarelatitude_7300_firmwarelatitude_5421latitude_9420_firmwarelatitude_5510g7_17_7700inspiron_5401_aio_firmwarevostro_5300_firmwarewyse_5470optiplex_5090_firmwarevostro_3501_firmwareinspiron_3593_firmwareoptiplex_7780_all-in-one_firmwarevostro_3710_firmwareinspiron_5481inspiron_5494_firmwareprecision_3440_firmwareprecision_5530_2-in-1_firmwarexps_27_7760inspiron_7786_firmwarelatitude_3310_2-in-1_firmwareinspiron_15_5579latitude_5320latitude_7410inspiron_3590_firmwarelatitude_5501_firmwarexps_27_7760_firmwareoptiplex_3280_all-in-one_firmwarexps_15_9500_firmwarelatitude_5411precision_7760optiplex_7450_firmwareinspiron_7306_2-in-1_firmwareoptiplex_7450vostro_3500_firmwareoptiplex_3050_aio_firmwareinspiron_15_3567_firmwareg3_3579_firmwarelatitude_7320_detachableinspiron_5509latitude_3480_firmwarelatitude_3189_firmwarelatitude_9520xps_13_9360_firmwarevostro_3590_firmwareinspiron_5406_2-in-1_firmwareinspiron_5498optiplex_7440_aio_firmwarelatitude_7420inspiron_7591_firmwarelatitude_5290inspiron_5300inspiron_7706_2-in-1inspiron_5508latitude_5289_firmwareprecision_5550_firmwarechengming_3980_firmwareinspiron_5491_2-in-1g7_7500_firmwarelatitude_3120_firmwarelatitude_5590_firmwareinspiron_15_7572_firmwareinspiron_5590vostro_5481_firmwarevostro_5490inspiron_5301_firmwarevostro_3267inspiron_14_3467g3_15_3590_firmwareinspiron_3671inspiron_5408_firmwareinspiron_5498_firmwareprecision_5540vostro_5490_firmwareinspiron_3480latitude_7520_firmwarelatitude_3490precision_3930_rack_firmwarevostro_3710inspiron_3670latitude_5420inspiron_7300inspiron_3793_firmwareinspiron_5402_firmwareinspiron_7390precision_3430_tower_firmwareprecision_7560_firmwarelatitude_3300_firmwarevostro_5471latitude_7400_2-in-1precision_3640_towervostro_5510inspiron_3490vostro_5581latitude_7210_2-in-1_firmwarelatitude_rugged_5430_firmwarexps_13_9310latitude_5510_firmwarevostro_3510_firmwareinspiron_3670_firmwarevostro_15_7570inspiron_5410_firmwarelatitude_7212_rugged_extreme_tabletlatitude_e5570_firmwareinspiron_5408latitude_7220_rugged_extreme_tablet_firmwarevostro_5410_firmwarevostro_5502_firmwareprecision_3540_firmwareoptiplex_3046_firmwarelatitude_3380latitude_5289g3_3500_firmwareprecision_3431_tower_firmwarevostro_3471_firmwareoptiplex_3080_firmwarelatitude_3410precision_5510_firmwarevostro_5402_firmwareprecision_3420_towerg5_15_5590optiplex_7490_all-in-one_firmwareinspiron_3881xps_13_9380latitude_7220ex_rugged_extreme_tabletlatitude_7414_rugged_extremeprecision_3420_tower_firmwarelatitude_5490_firmwarelatitude_5591_firmwareinspiron_3501latitude_5310_firmwarelatitude_3500vostro_3070inspiron_3793precision_3430_towerinspiron_5481_firmwarealienware_m15_r6precision_5520_firmwarevostro_3890_firmwareoptiplex_5490_aiochengming_3988xps_15_7590latitude_3300latitude_5580precision_3620_tower_firmwareinspiron_5584_firmwareedge_gateway_3000_firmwareprecision_5540_firmwareinspiron_5401_firmwareinspiron_7573vostro_5501vostro_5590xps_8940_firmwarelatitude_7320_firmwarelatitude_3120vostro_3480precision_3560inspiron_5401_aiooptiplex_5260_all-in-one_firmwareinspiron_5509_firmwareinspiron_5593_firmwarelatitude_7200_2-in-1_firmwareprecision_3630_towerlatitude_3580_firmwareinspiron_5598_firmwarevostro_3470latitude_5414_ruggedoptiplex_3070inspiron_13_7378_firmwareoptiplex_3040vostro_3910_firmwarelatitude_7290_firmwareprecision_7530inspiron_5370_firmwareinspiron_5391_firmwareinspiron_5502_firmwareoptiplex_7460xps_15_7590_firmwareembedded_box_pc_5000_firmwareoptiplex_7050inspiron_3490_firmwareinspiron_5409_firmwareprecision_3510xps_13_9380_firmwareinspiron_13_5379inspiron_5390latitude_5288latitude_7490optiplex_7060_firmwareprecision_3240_compact_firmwarelatitude_5521_firmwareinspiron_5401optiplex_5250vostro_3667_firmwareprecision_7920_tower_firmwarevostro_5591_firmwarevostro_15_7570_firmwareCPG BIOS
CWE ID-CWE-367
Time-of-check Time-of-use (TOCTOU) Race Condition
CVE-2022-27834
Matching Score-4
Assigner-Samsung Mobile
ShareView Details
Matching Score-4
Assigner-Samsung Mobile
CVSS Score-2.9||LOW
EPSS-0.01% / 2.09%
||
7 Day CHG~0.00%
Published-11 Apr, 2022 | 19:37
Updated-03 Aug, 2024 | 05:41
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Use after free vulnerability in dsp_context_unload_graph function of DSP driver prior to SMR Apr-2022 Release 1 allows attackers to perform malicious actions.

Action-Not Available
Vendor-Google LLCSamsungSamsung Electronics
Product-androidexynos_9830exynos_980exynos_2100Samsung Mobile Devices
CWE ID-CWE-367
Time-of-check Time-of-use (TOCTOU) Race Condition
CWE ID-CWE-416
Use After Free
CVE-2020-3680
Matching Score-4
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-4
Assigner-Qualcomm, Inc.
CVSS Score-7||HIGH
EPSS-0.02% / 4.09%
||
7 Day CHG~0.00%
Published-02 Jun, 2020 | 15:05
Updated-04 Aug, 2024 | 07:44
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A race condition can occur when using the fastrpc memory mapping API. in Snapdragon Auto, Snapdragon Compute, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Wearables in APQ8009, APQ8053, MSM8909W, MSM8917, MSM8953, QCS605, QM215, SA415M, SDM429, SDM429W, SDM439, SDM450, SDM632, SDM670, SDM710, SDM845, SDX24, SXR1130

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-msm8953sdm450sdm429wsdm632_firmwaresdm845sdm450_firmwaresdm632sdx24sdm439sdm429sa415m_firmwaresdm710msm8909w_firmwareqm215sdm429w_firmwaresdm710_firmwareapq8009apq8009_firmwaremsm8917sdm670qcs605_firmwaresdm670_firmwaresdx24_firmwaresdm439_firmwaresa415mqm215_firmwareqcs605msm8953_firmwareapq8053msm8917_firmwaresdm429_firmwaresxr1130_firmwaresxr1130msm8909wapq8053_firmwaresdm845_firmwareSnapdragon Auto, Snapdragon Compute, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Wearables
CWE ID-CWE-367
Time-of-check Time-of-use (TOCTOU) Race Condition
CVE-2022-25716
Matching Score-4
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-4
Assigner-Qualcomm, Inc.
CVSS Score-6.7||MEDIUM
EPSS-0.03% / 5.63%
||
7 Day CHG~0.00%
Published-06 Jan, 2023 | 04:56
Updated-09 Apr, 2025 | 19:56
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Time-of-check Time-of-use Race Condition in Multimedia Framework

Memory corruption in Multimedia Framework due to unsafe access to the data members

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-wcn6850wsa8830_firmwarewcd9380_firmwarewcd9385wsa8830wsa8835sd888_5g_firmwarewcn6850_firmwarewsa8835_firmwarewcd9380sd888_5gwcd9385_firmwarewcn6851wcn6851_firmwareSnapdragon
CWE ID-CWE-367
Time-of-check Time-of-use (TOCTOU) Race Condition
CVE-2022-25696
Matching Score-4
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-4
Assigner-Qualcomm, Inc.
CVSS Score-8.4||HIGH
EPSS-0.06% / 17.10%
||
7 Day CHG~0.00%
Published-16 Sep, 2022 | 05:25
Updated-03 Aug, 2024 | 04:49
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Memory corruption in display due to time-of-check time-of-use race condition during map or unmap in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Wearables

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-wcn3991_firmwarewsa8830sd678qcs2290_firmwareqcs4290wcn3950_firmwaresd765g_firmwareqca6420_firmwareqca6595au_firmwareqcs2290qca6390_firmwaresd690_5gsd730_firmwarewcd9370sd_675_firmwaresd675_firmwarewcn3990_firmwarewcn3998wcd9385_firmwarewcn3950sm4125sd720gwcd9326_firmwarewcn3615_firmwaresd_8_gen1_5g_firmwarewcn3660bsd662sd710_firmwaresd460_firmwaresm7315_firmwarewcn7850qca6574au_firmwaresdx55_firmwarewcn3680b_firmwareqca6595auwcd9375_firmwarewcn3615wcn3998_firmwaresm7250p_firmwareqca6420apq8053_firmwaresm7450_firmwaresd680_firmwaresd778gsa6155p_firmwarewcn7851qcs6490sd662_firmwarewcn3988_firmwareqca6430sm6250sd778g_firmwaresa8195pwsa8810_firmwarequalcomm215_firmwaresd765gsw5100sd765_firmwaresd680wcd9326wcd9335sa6155pwcn6851wcn7851_firmwareqcs4290_firmwarewcd9385wcd9341qca6696_firmwareqcs6490_firmwaresd750gsd870_firmwareqca6390wcd9375sd750g_firmwareaqt1000wcn3910_firmwaresm6250_firmwaremsm8953_firmwarewsa8830_firmwaresd855_firmwaresd865_5g_firmwareqcm6490sd888_5g_firmwarewcn3988wcn6850_firmwarewcn7850_firmwarewsa8815_firmwaresa8195p_firmwaresm7450wsa8835_firmwaresm8475wcn6750_firmwareqcm2290_firmwarewcn3991wcd9380_firmwarewcn3990sd_675sw5100psd780gsd865_5gsdx55m_firmwarewcn6856_firmwaresd888sd670_firmwareqca6574wsa8835sd665_firmwarewcd9380sd888_5gqualcomm215qca6574asd690_5g_firmwaresdx50m_firmwarewcn6855_firmwaresm7325pqca6430_firmwarewcd9335_firmwarewcn3980sd439_firmwarewcn6750qca6574_firmwaresd855sm4125_firmwaresm7325p_firmwaresd665wcn3910wcn6850wsa8815sd765wcn3660b_firmwareqca6574a_firmwaresd695sd768g_firmwarewcn3980_firmwaresm7315sd730sd460qca6391sdx55msm8475_firmwareaqt1000_firmwarewcn6740_firmwaremsm8953sd678_firmwareqcm4290qcm6490_firmwaresdx50mwsa8832_firmwaresd480_firmwarewcn6851_firmwareqca6574ausa8155p_firmwaresd710sd670wcd9341_firmwareqcm4290_firmwaresd480sd870wcn6855wsa8810wsa8832sw5100p_firmwarewcn6856wcn3680bsd695_firmwaresd768gwcn6740qca6696qca6391_firmwaresd780g_firmwarewcd9370_firmwaresdx55sd888_firmwareapq8053sa8155psd675sd439sm7250psd720g_firmwaresw5100_firmwaresm8475p_firmwareqcm2290sm8475pSnapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Wearables
CWE ID-CWE-367
Time-of-check Time-of-use (TOCTOU) Race Condition
CVE-2022-23181
Matching Score-4
Assigner-Apache Software Foundation
ShareView Details
Matching Score-4
Assigner-Apache Software Foundation
CVSS Score-7||HIGH
EPSS-0.26% / 48.97%
||
7 Day CHG~0.00%
Published-27 Jan, 2022 | 00:00
Updated-03 Aug, 2024 | 03:36
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Local privilege escalation with FileStore

The fix for bug CVE-2020-9484 introduced a time of check, time of use vulnerability into Apache Tomcat 10.1.0-M1 to 10.1.0-M8, 10.0.0-M5 to 10.0.14, 9.0.35 to 9.0.56 and 8.5.55 to 8.5.73 that allowed a local attacker to perform actions with the privileges of the user that the Tomcat process is using. This issue is only exploitable when Tomcat is configured to persist sessions using the FileStore.

Action-Not Available
Vendor-The Apache Software FoundationDebian GNU/LinuxOracle Corporation
Product-debian_linuxfinancial_services_crime_and_compliance_management_studiomysql_enterprise_monitortomcatagile_engineering_data_managementcommunications_cloud_native_core_policymanaged_file_transferApache Tomcat
CWE ID-CWE-367
Time-of-check Time-of-use (TOCTOU) Race Condition
CVE-2022-22093
Matching Score-4
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-4
Assigner-Qualcomm, Inc.
CVSS Score-7.8||HIGH
EPSS-0.08% / 24.18%
||
7 Day CHG~0.00%
Published-16 Sep, 2022 | 05:25
Updated-03 Aug, 2024 | 03:00
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Memory corruption or temporary denial of service due to improper handling of concurrent hypervisor operations to attach or detach IRQs from virtual interrupt sources in Snapdragon Compute, Snapdragon Connectivity, Snapdragon Industrial IOT, Snapdragon Mobile

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-wcn3991_firmwarewcn3991wsa8830wcd9380_firmwaresd780gsd865_5gqca6431_firmwaresdx55m_firmwarewcn6856_firmwaresd888wsa8835wcd9380sd765g_firmwaresd888_5gqca6420_firmwareqca6390_firmwarewcd9370wcn6855_firmwaresm8475p_firmwaresm7325pqca6426qrb5165n_firmwareqca6430_firmwarewcn6750wcn3998sd_8cx_firmwarewcd9385_firmwaresdxr2_5g_firmwaresd_8cx_gen2_firmwaresd_8_gen1_5g_firmwarewcd9340_firmwarewsa8815sm7325p_firmwareqsm8350_firmwarewcn6850qsm8350sd765qca6426_firmwaresm7315_firmwarewcn7850sd768g_firmwarewcd9375_firmwarewcn3998_firmwareqrb5165msm7315sm7250p_firmwareqca6391sdx55mqca6420qca6436_firmwareqrb5165nqca6421_firmwaresm8475_firmwaresm7450_firmwareaqt1000_firmwaresd778gwcn6740_firmwaresd_8cx_gen2wcn7851qcs6490qrb5165_firmwareqrb5165m_firmwaresdxr2_5gqcm6490_firmwarewsa8832_firmwareqrb5165wcn6851_firmwareqca6430qca6421sd778g_firmwarewcd9340wsa8810_firmwaresd765gwcd9341_firmwarewsa8810sd765_firmwaresd870qca6436wcn6851wsa8832wcn6855wcn7851_firmwarewcn6856wcd9385wcd9341sd768gqca6431qcs6490_firmwaresd870_firmwarewcn6740qca6391_firmwareqca6390wcd9375sd_8cxaqt1000sd780g_firmwarewcd9370_firmwaresd888_firmwarewsa8830_firmwaresd865_5g_firmwareqcm6490sd888_5g_firmwarewcn6850_firmwarewcn7850_firmwarewsa8815_firmwarewsa8835_firmwaresm7250psm7450sm8475wcn6750_firmwaresm8475pSnapdragon Compute, Snapdragon Connectivity, Snapdragon Industrial IOT, Snapdragon Mobile
CWE ID-CWE-367
Time-of-check Time-of-use (TOCTOU) Race Condition
CVE-2022-22094
Matching Score-4
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-4
Assigner-Qualcomm, Inc.
CVSS Score-7.8||HIGH
EPSS-0.07% / 22.43%
||
7 Day CHG~0.00%
Published-16 Sep, 2022 | 05:25
Updated-03 Aug, 2024 | 03:00
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

memory corruption in Kernel due to race condition while getting mapping reference in Snapdragon Compute, Snapdragon Connectivity, Snapdragon Industrial IOT, Snapdragon Mobile

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-wcn3991_firmwarewcn3991wsa8830wcd9380_firmwaresd780gsd865_5gqca6431_firmwaresdx55m_firmwarewcn6856_firmwaresd888wsa8835wcd9380sd765g_firmwaresd888_5gqca6420_firmwareqca6390_firmwarewcd9370wcn6855_firmwaresm8475p_firmwaresm7325pqca6426qrb5165n_firmwareqca6430_firmwarewcn6750wcn3998sd_8cx_firmwarewcd9385_firmwaresdxr2_5g_firmwaresd_8cx_gen2_firmwaresd_8_gen1_5g_firmwarewcd9340_firmwarewsa8815sm7325p_firmwareqsm8350_firmwarewcn6850qsm8350sd765qca6426_firmwaresm7315_firmwarewcn7850sd768g_firmwarewcd9375_firmwarewcn3998_firmwareqrb5165msm7315sm7250p_firmwareqca6391sdx55mqca6420qca6436_firmwareqrb5165nqca6421_firmwaresm8475_firmwaresm7450_firmwareaqt1000_firmwaresd778gwcn6740_firmwaresd_8cx_gen2wcn7851qcs6490qrb5165_firmwareqrb5165m_firmwaresdxr2_5gqcm6490_firmwarewsa8832_firmwareqrb5165wcn6851_firmwareqca6430qca6421sd778g_firmwarewcd9340wsa8810_firmwaresd765gwcd9341_firmwarewsa8810sd765_firmwaresd870qca6436wcn6851wsa8832wcn6855wcn7851_firmwarewcn6856wcd9385wcd9341sd768gqca6431qcs6490_firmwaresd870_firmwarewcn6740qca6391_firmwareqca6390wcd9375sd_8cxaqt1000sd780g_firmwarewcd9370_firmwaresd888_firmwarewsa8830_firmwaresd865_5g_firmwareqcm6490sd888_5g_firmwarewcn6850_firmwarewcn7850_firmwarewsa8815_firmwarewsa8835_firmwaresm7250psm7450sm8475wcn6750_firmwaresm8475pSnapdragon Compute, Snapdragon Connectivity, Snapdragon Industrial IOT, Snapdragon Mobile
CWE ID-CWE-367
Time-of-check Time-of-use (TOCTOU) Race Condition
CVE-2023-43741
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-7||HIGH
EPSS-0.01% / 0.88%
||
7 Day CHG~0.00%
Published-22 Dec, 2023 | 00:00
Updated-27 Aug, 2024 | 20:14
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A time-of-check-time-of-use race condition vulnerability in Buildkite Elastic CI for AWS versions prior to 6.7.1 and 5.22.5 allows the buildkite-agent user to bypass a symbolic link check for the PIPELINE_PATH variable in the fix-buildkite-agent-builds-permissions script.

Action-Not Available
Vendor-buildkiten/a
Product-elastic_ci_stackn/a
CWE ID-CWE-367
Time-of-check Time-of-use (TOCTOU) Race Condition
CVE-2021-3969
Matching Score-4
Assigner-Lenovo Group Ltd.
ShareView Details
Matching Score-4
Assigner-Lenovo Group Ltd.
CVSS Score-7.8||HIGH
EPSS-0.42% / 60.96%
||
7 Day CHG~0.00%
Published-18 May, 2022 | 16:10
Updated-03 Aug, 2024 | 17:09
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A Time of Check Time of Use (TOCTOU) vulnerability was reported in IMController, a software component of Lenovo System Interface Foundation, prior to version 1.1.20.3that could allow a local attacker to elevate privileges.

Action-Not Available
Vendor-Lenovo Group Limited
Product-system_interface_foundationIMController
CWE ID-CWE-367
Time-of-check Time-of-use (TOCTOU) Race Condition
CVE-2021-3922
Matching Score-4
Assigner-Lenovo Group Ltd.
ShareView Details
Matching Score-4
Assigner-Lenovo Group Ltd.
CVSS Score-7.8||HIGH
EPSS-0.42% / 60.96%
||
7 Day CHG~0.00%
Published-18 May, 2022 | 16:10
Updated-03 Aug, 2024 | 17:09
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A race condition vulnerability was reported in IMController, a software component of Lenovo System Interface Foundation, prior to version 1.1.20.3 that could allow a local attacker to connect and interact with the IMController child process' named pipe.

Action-Not Available
Vendor-Lenovo Group Limited
Product-system_interface_foundationIMController
CWE ID-CWE-367
Time-of-check Time-of-use (TOCTOU) Race Condition
CWE ID-CWE-362
Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')
CVE-2022-20110
Matching Score-4
Assigner-MediaTek, Inc.
ShareView Details
Matching Score-4
Assigner-MediaTek, Inc.
CVSS Score-7||HIGH
EPSS-0.01% / 0.98%
||
7 Day CHG~0.00%
Published-03 May, 2022 | 19:56
Updated-03 Aug, 2024 | 02:02
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In ion, there is a possible use after free due to a race condition. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS06399915; Issue ID: ALPS06399901.

Action-Not Available
Vendor-Google LLCMediaTek Inc.
Product-mt6757cdmt6873mt6893mt8675mt8765mt6580mt8788mt6750mt8666mt8167mt6765mt6757cmt6737mt6883mt8696mt6853tmt6739mt6757mt8768mt6797mt6769mt6761mt6875mt6889mt8789mt8797mt8321mt6768mt8362amt8786mt8766mt8695mt6771mt8385mt6833mt6885mt6735mt6750smt6753mt6762mt6877mt6781mt8365mt6853mt8168androidmt6757chmt8185mt8791mt6779mt6785mt6763mt8173MT6580, MT6735, MT6737, MT6739, MT6750, MT6750S, MT6753, MT6757, MT6757C, MT6757CD, MT6757CH, MT6761, MT6762, MT6763, MT6765, MT6768, MT6769, MT6771, MT6779, MT6781, MT6785, MT6797, MT6833, MT6853, MT6853T, MT6873, MT6875, MT6877, MT6883, MT6885, MT6889, MT6893, MT8167, MT8168, MT8173, MT8185, MT8321, MT8362A, MT8365, MT8385, MT8666, MT8675, MT8695, MT8696, MT8765, MT8766, MT8768, MT8786, MT8788, MT8789, MT8791, MT8797
CWE ID-CWE-367
Time-of-check Time-of-use (TOCTOU) Race Condition
CVE-2022-27538
Matching Score-4
Assigner-HP Inc.
ShareView Details
Matching Score-4
Assigner-HP Inc.
CVSS Score-7||HIGH
EPSS-0.11% / 29.29%
||
7 Day CHG~0.00%
Published-30 Jan, 2023 | 20:41
Updated-27 Mar, 2025 | 19:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A potential Time-of-Check to Time-of-Use (TOCTOU) vulnerability has been identified in the BIOS for certain HP PC products which may allow arbitrary code execution, denial of service, and information disclosure. HP is releasing BIOS updates to mitigate the potential vulnerability.

Action-Not Available
Vendor-HP Inc.
Product-z2_small_form_factor_g9_firmwareproone_600_g4_21.5-inch_touch_all-in-one_business_pcelitebook_x360_1040_g7_firmwareelitebook_845_g8_firmwareprodesk_600_g5_small_form_factor_pczhan_66_pro_15_g2_firmwareeliteone_1000_g1_23.8-in_touch_all-in-one_business_pcprobook_430_g7elitebook_865_g9elitedesk_800_35w_g4_desktop_mini_pc_firmwareelitebook_x360_1030_g7_firmwareelitebook_735_g6_firmwareelitebook_x360_1030_g4_firmwareelitebook_840_g9_firmwarezhan_66_pro_13_g2probook_430_g8probook_440_g8elitebook_755_g5_firmwareprobook_x360_11_g4_education_edition_firmwarezbook_17_g6zbook_firefly_15_g7engage_flex_pro_retail_systemelitedesk_880_g8_tower_pcelite_sliceprodesk_405_g6_small_form_factorz2_small_form_factor_g5elitedesk_805_g6_small_form_factor_pc_firmwareelitedesk_705_g4_desktop_mini_pc_firmwareprobook_445r_g6_firmwareprodesk_400_g6_small_form_factor_pcelitedesk_800_g6_tower_pcelitebook_630_g9_firmwareprodesk_600_g5_desktop_mini_pcpro_mt440_g3elitedesk_800_g4_tower_pcprodesk_405_g8_small_form_factor_pc_firmwareelitebook_735_g5zbook_studio_16_g9z2_mini_g5_firmwareprobook_640_g4_firmwarezbook_studio_g7_firmwareprodesk_600_g3_desktop_mini_pc_firmwarez240_tower_firmwarezbook_power_g9zbook_power_g8eliteone_800_g3_23.8_non-touch_healthcare_edition_all-in-one_business_pc_firmwarepro_mini_400_g9elitebook_835_g7_firmwaremt46pro_mini_400_g9_firmwareproone_440_23.8_inch_g9_all-in-one_firmwarezbook_studio_x360_g5_firmwareeliteone_1000_g1_34-in_curved_all-in-one_business_pc_firmwareelitebook_830_g8_firmwareprobook_450_g8_firmwareprobook_650_g7elitebook_835_g9_firmwareprodesk_400_g3_desktop_mini_pc_firmwarez1_entry_tower_g5_workstation_firmwareprodesk_600_g5_microtower_pc\(with_pci_slot\)z2_mini_g3pro_x360_fortis_g10z2_tower_g4_firmwareeliteone_1000_g2_27-in_4k_uhd_all-in-one_business_pc_firmwareelitedesk_705_g4_desktop_mini_pcprobook_x360_11_g7_education_editionelite_tower_880_g9_firmwareengage_flex_pro_retail_system_firmwareprodesk_400_g3_desktop_mini_pcengage_flex_pro-c_retail_system_firmwareproone_440_g5_23.8-in_all-in-one_business_pc_firmwareelitedesk_800_g4_small_form_factor_pceliteone_800_g5_23.8-in_healthcare_edition_all-in-oneprobook_x360_11_g6_education_edition_firmwareprodesk_480_g4_microtower_pcelite_dragonfly_g2engage_one_pro_aio_system_firmwarezbook_14u_g5prodesk_480_g7_pci_microtower_pcelite_tower_680_g9probook_430_g7_firmwareelitebook_845_g9probook_455_g6_firmwareprobook_x360_11_g5_education_edition_firmwareprobook_445_g8prodesk_480_g6_microtower_pc_firmwareprobook_445_g8_firmwareeliteone_800_g3_23.8_non-touch_healthcare_edition_all-in-one_business_pcelitedesk_805_g6_desktop_mini_pc_firmwarez2_tower_g5_firmwareeliteone_800_g3_23.8-inch_non-touch_gpu_all-in-one_pcelitedesk_800_g5_tower_pcprodesk_400_g4_desktop_mini_pc_firmwareelitedesk_705_g5_small_form_factor_pc_firmwareprobook_fortis_g9_firmwareprodesk_600_g6_small_form_factor_pc_firmwareelitebook_845_g7elitebook_645_g9elitedesk_805_g6_small_form_factor_pczhan_66_pro_a_14_g3_firmwarepro_tower_400_g9_firmwareprodesk_405_g6_desktop_minielitebook_x360_1040_g6elitedesk_800_g6_desktop_mini_pc_firmwareprobook_455r_g6z240_small_form_factorelite_dragonflyzhan_x_13_g2zhan_66_pro_14_g3eliteone_800_g6_24_all-in-one_pcpro_sff_400_g9_firmwarezbook_15u_g6probook_630_g8z2_tower_g9elitebook_830_g9eliteone_800_g4_23.8-inch_touch_gpu_all-in-one_pczbook_firefly_g9elitebook_840_g8_firmwareengage_one_all-in-one_systemprobook_630_g8_firmwareengage_one_pro_aio_systemeliteone_800_g3_23.8-inch_touch_all-in-one_pceliteone_800_g8_24_all-in-one_pc_firmwareelitebook_655_g9_firmwareprobook_455r_g6_firmwareprodesk_600_g4_small_form_factor_pcengage_go_mobile_systemelitebook_650_g9_firmwareprobook_640_g8_firmwareprodesk_400_g6_microtower_pcelitedesk_800_g3_small_form_factor_pcz1_g8_towerzhan_99_pro_23.8_inch_g9_all-in-one_firmwareprobook_455_g8probook_430_g5_firmwarez1_entry_tower_g6_workstationzhan_66_pro_a_14_g5elite_x2_g4prodesk_400_g5_small_form_factor_pc_firmwareprodesk_480_g4_microtower_pc_firmwaremt45z240_small_form_factor_firmwareprobook_440_g9_firmwareelite_slice_firmwareelitedesk_805_g6_desktop_mini_pczbook_power_g7_firmwarezhan_66_pro_15_g3elitebook_745_g5z2_tower_g5proone_400_g3_20-inch_non-touch_all-in-one_pcz2_small_form_factor_g4_firmwareprodesk_600_g4_small_form_factor_pc_firmwareprodesk_400_g7_microtower_pc_firmwareprobook_x360_11_g5_education_editionmt46_firmwareelite_sff_600_g9_firmwareprodesk_405_g8_desktop_mini_pcz1_all-in-one_g3_firmwaremt22zbook_firefly_g8zhan_66_pro_g5_firmwareelitebook_840_aero_g8pro_sff_400_g9pro_mt440_g3_firmwareelitebook_x360_1040_g5_firmwareprodesk_680_g6_pci_microtower_pc_firmwareeliteone_800_g4_23.8-inch_non-touch_gpu_all-in-one_pcelitebook_x360_1040_g6_firmwareproone_400_g4_20-inch_non-touch_all-in-one_business_pc_firmwareelitedesk_705_g5_desktop_mini_pcelitedesk_805_g8_small_form_factor_pczhan_66_pro_14_g4_firmwarezhan_66_pro_g1zbook_fury_15_g7_firmwareprodesk_600_g5_microtower_pc\(with_pci_slot\)_firmwaremt31_mobile_thin_client_firmwareprodesk_600_g3_small_form_factor_pc_firmwareprobook_fortis_g10elitebook_840_g6zbook_15_g5z238_microtower_firmwareprodesk_680_g3_microtower_pczbook_studio_16_g9_firmwareelitedesk_800_35w_g4_desktop_mini_pcelitedesk_800_g5_desktop_mini_pcelitebook_x360_1040_g7z238_microtowerprodesk_400_g4_desktop_mini_pcprodesk_600_g6_small_form_factor_pcproone_440_g4_23.8-inch_non-touch_all-in-one_business_pc_firmwareelitebook_x360_830_g8prodesk_405_g6_small_form_factor_firmwarezhan_66_pro_g3_24_all-in-one_pc_firmwareprodesk_600_g6_microtower_pceliteone_800_g4_23.8-inch_touch_all-in-one_pc_firmwareelitebook_630_g9zhan_66_pro_g5elitebook_840_g6_firmwarez2_tower_g4elite_mini_800_g9mt45_firmwareprobook_455_g5_firmwareelitebook_845_g7_firmwareprodesk_400_g5_desktop_mini_pcprodesk_600_g4_microtower_pc_firmwarezhan_66_pro_g1_firmwareelitebook_1050_g1elite_tower_600_g9prodesk_600_g3_microtower_pc_firmwareelitebook_x360_830_g6_firmwarezbook_create_g7elitebook_855_g8_firmwareproone_440_g4_23.8-inch_non-touch_all-in-one_business_pcproone_600_g6_22_all-in-one_pceliteone_1000_g1_23.8-in_all-in-one_business_pceliteone_870_27_inch_g9_all-in-oneelitebook_840_g5_healthcare_editionprodesk_480_g5_microtower_pcelitebook_845_g8elitebook_655_g9elitedesk_800_g6_small_form_factor_pc_firmwarezhan_99_pro_23.8_inch_g9_all-in-oneelitedesk_800_g3_tower_pc_firmwareprobook_x360_435_g8_firmwarezbook_14u_g6_firmwareelitebook_830_g9_firmwareelite_tower_680_g9_firmwareprobook_645_g4probook_x360_11_g3_education_editionprobook_x360_440_g1_firmwareelitebook_x360_1030_g3elitedesk_800_g4_tower_pc_firmwarezbook_fury_g8_firmwareprodesk_400_g5_small_form_factor_pceliteone_800_g3_23.8-inch_non-touch_all-in-one_pc_firmwaremt44probook_450_g7prodesk_600_g6_pci_microtower_pcz2_small_form_factor_g8_firmwareelitedesk_880_g3_tower_pc_firmwareproone_600_g5_21.5-in_all-in-one_business_pcz2_mini_g4elitebook_755_g5probook_445r_g6probook_x360_435_g8zbook_fury_g8probook_650_g8_firmwarez1_g8_tower_firmwareelitebook_x360_1030_g4proone_600_g3_21.5-inch_non-touch_all-in-one_pc_firmwareelitedesk_800_g6_desktop_mini_pceliteone_800_g8_27_all-in-one_pc_firmwaremt22_firmwarezhan_66_pro_15_g2elitebook_745_g5_firmwareproone_440_g5_23.8-in_all-in-one_business_pczhan_66_pro_g3_24_all-in-one_pcz2_small_form_factor_g8elite_dragonfly_maxmt32_firmwareelitedesk_800_35w_g3_desktop_mini_pc_firmwareelitedesk_800_g6_tower_pc_firmwareelitebook_865_g9_firmwareprodesk_600_g6_microtower_pc_firmwareelitebook_650_g9zbook_15_g6elitedesk_880_g6_tower_pc_firmwarez2_tower_g8zhan_66_pro_a_14_g4_firmwareprodesk_600_g3_desktop_mini_pczbook_studio_g5elite_dragonfly_g3probook_650_g4mt44_firmwarepro_x360_fortis_g10_firmwareeliteone_800_g4_23.8-inch_touch_gpu_all-in-one_pc_firmwareprobook_640_g4elitebook_845_g9_firmwareprodesk_600_g5_small_form_factor_pc_firmwareelite_tower_800_g9probook_635_aero_g7_firmwareengage_go_10_mobile_systemelitedesk_800_g8_desktop_mini_pc_firmwareprobook_455_g6zbook_fury_17_g8engage_go_10_mobile_system_firmwareelitebook_840_g6_healthcare_edition_firmwareprobook_fortis_g10_firmwareprodesk_405_g4_desktop_mini_pcproone_400_g4_23.8-inch_non-touch_all-in-one_business_pcprodesk_405_g8_small_form_factor_pcprobook_640_g7probook_450_g5_firmwareelite_x2_g8_tabletzbook_fury_17_g7zbook_15u_g5elitedesk_805_g8_desktop_mini_pcelitedesk_800_65w_g3_desktop_mini_pceliteone_800_g3_23.8-inch_non-touch_gpu_all-in-one_pc_firmwareelitebook_830_g8engage_one_all-in-one_system_firmwareelite_x2_g4_firmwarezhan_66_pro_14_g3_firmwareeliteone_1000_g2_23.8-in_touch_all-in-one_business_pcproone_400_g6_24_all-in-one_pc_firmwareelite_sff_600_g9mt32elitebook_830_g5prodesk_480_g5_microtower_pc_firmwarez240_towerelitedesk_800_g8_small_form_factor_pc_firmwareelite_slice_g2zhan_66_pro_a_14_g5_firmwaremp9_g4_retail_systemelitedesk_880_g8_tower_pc_firmwareelitebook_840_g5_firmwarez2_small_form_factor_g5_firmwarezbook_14u_g6prodesk_400_g4_small_form_factor_pcprodesk_600_g4_desktop_mini_pc_firmwareeliteone_1000_g2_27-in_4k_uhd_all-in-one_business_pceliteone_800_g4_23.8-inch_non-touch_all-in-one_pc_firmwarezbook_power_g9_firmwareelitedesk_800_95w_g4_desktop_mini_pc_firmwareproone_600_g3_21.5-inch_non-touch_all-in-one_pcelite_sff_800_g9elitedesk_800_g8_small_form_factor_pcprobook_635_aero_g7eliteone_840_23.8_inch_g9_all-in-oneprodesk_400_g4_small_form_factor_pc_firmwareprodesk_680_g6_pci_microtower_pczhan_66_pro_15_g3_firmwarez1_entry_tower_g6_workstation_firmwareproone_600_g6_22_all-in-one_pc_firmwarezbook_studio_g8_firmwareelitebook_x360_830_g7elitebook_x360_1030_g3_firmwareelitebook_850_g8eliteone_800_g4_23.8-inch_non-touch_gpu_all-in-one_pc_firmwareelitebook_846_g5_firmwareprodesk_600_g3_microtower_pcprobook_635_aero_g8_firmwareelite_dragonfly_g2_firmwareproone_400_g5_23.8-inch_all-in-one_business_pcprobook_440_g5prodesk_600_g4_microtower_pcelitedesk_800_g8_desktop_mini_pcproone_400_g4_23.8-inch_non-touch_all-in-one_business_pc_firmwareproone_600_g4_21.5-inch_touch_all-in-one_business_pc_firmwareelite_tower_880_g9zbook_studio_g5_firmwarez2_mini_g9_firmwareelitedesk_880_g3_tower_pczbook_fury_15_g7prodesk_680_g3_microtower_pc_firmwareelitebook_840_aero_g8_firmwareprobook_640_g5_firmwareelite_slice_g2_firmwareelitebook_x360_1040_g8prodesk_400_g6_small_form_factor_pc_firmwareelitedesk_800_65w_g4_desktop_mini_pc_firmwareeliteone_800_g3_23.8-inch_touch_gpu_all-in-one_pc_firmwareproone_600_g5_21.5-in_all-in-one_business_pc_firmwareelitebook_735_g6eliteone_1000_g2_34-in_curved_all-in-one_business_pcprobook_450_g7_firmwareprobook_650_g4_firmwareprobook_640_g7_firmwarez2_mini_g4_firmwaremt31_mobile_thin_clientelitebook_830_g6_firmwarezbook_fury_16_g9_firmwareprobook_430_g6_firmwareproone_400_g5_20-inch_all-in-one_business_pc_firmwareprodesk_600_g5_microtower_pc_firmwareeliteone_1000_g1_27-in_4k_uhd_all-in-one_business_pc_firmwareelitedesk_880_g6_tower_pcelitebook_x360_1030_g8zbook_create_g7_firmwareeliteone_800_g6_27_all-in-one_pcprodesk_600_g6_desktop_mini_pczbook_17_g6_firmwareelitebook_840_g7probook_445_g6_firmwareprobook_445_g9_firmwarezbook_studio_g7elitebook_645_g9_firmwareelite_tower_800_g9_firmwarezhan_66_pro_14_g2prodesk_680_g4_microtower_pc\(with_pci_slot\)_firmwareprobook_440_g9z1_all-in-one_g3prodesk_400_g5_microtower_pczbook_fury_16_g9elite_x2_g8_tablet_firmwareprodesk_400_g5_microtower_pc_firmwareprodesk_405_g4_desktop_mini_pc_firmwareeliteone_800_g5_23.8-inch_all-in-one_firmwareprobook_x360_435_g7elitedesk_880_g4_tower_pcproone_440_23.8_inch_g9_all-in-oneelitedesk_800_g4_small_form_factor_pc_firmwarez2_mini_g3_firmwareelitebook_745_g6_firmwareprodesk_400_g6_desktop_mini_pc_firmwareproone_400_g3_20-inch_touch_all-in-one_pcengage_flex_pro-c_retail_systemprobook_470_g5elitebook_745_g6z2_tower_g8_firmwareelitedesk_880_g5_tower_pc_firmwareelitebook_830_g7elitedesk_705_g5_desktop_mini_pc_firmwareeliteone_840_23.8_inch_g9_all-in-one_firmwareelitebook_860_g9elite_dragonfly_max_firmwareelitebook_855_g7z1_entry_tower_g5_workstationelitedesk_705_g5_small_form_factor_pcprobook_645_g4_firmwareelitebook_835_g7elitebook_860_g9_firmwareelitebook_1040_g9prodesk_600_g4_desktop_mini_pcprodesk_600_g5_desktop_mini_pc_firmwareprodesk_680_g4_microtower_pc\(with_pci_slot\)probook_650_g5prodesk_600_g5_microtower_pcelitedesk_800_g8_tower_pcelitebook_840_g9proone_400_g4_20-inch_non-touch_all-in-one_business_pceliteone_800_g5_23.8-in_healthcare_edition_all-in-one_firmwarepro_tower_400_g9elite_x360_1040_g9_2-in-1_firmwareprobook_440_g7eliteone_1000_g1_27-in_4k_uhd_all-in-one_business_pcelite_mini_800_g9_firmwareelitebook_835_g9z2_tower_g9_firmwareelite_sff_800_g9_firmwareprobook_445_g6probook_640_g8probook_455_g9_firmwareelitebook_830_g5_firmwarezbook_firefly_15_g8_firmwaremp9_g4_retail_system_firmwareprobook_x360_11_g7_education_edition_firmwareprobook_650_g8elitebook_836_g6_firmwareelitedesk_805_g8_small_form_factor_pc_firmwareelitedesk_800_g5_small_form_factor_pc_firmwareproone_400_g5_23.8-inch_all-in-one_business_pc_firmwarezbook_firefly_g9_firmwareelitedesk_805_g8_desktop_mini_pc_firmwareprobook_635_aero_g8probook_445_g7_firmwareelitebook_850_g6_firmwarepro_x360_435_g9probook_455_g5elitebook_846_g5zbook_firefly_15_g7_firmwareprobook_440_g6zbook_studio_g8elitedesk_800_g3_tower_pczbook_studio_x360_g5elitebook_x360_830_g7_firmwareelitedesk_705_g4_small_form_factor_pc_firmwareproone_400_g6_20_all-in-one_pceliteone_800_g3_23.8-inch_touch_all-in-one_pc_firmwareprobook_450_g8zbook_17_g5eliteone_800_g4_23.8-in_healthcare_edition_all-in-one_business_pczbook_firefly_14_g7zhan_66_pro_a_14_g3probook_640_g5zbook_17_g5_firmwarez2_small_form_factor_g9elitebook_850_g5prodesk_600_g6_pci_microtower_pc_firmwareelitebook_840_g5eliteone_800_g4_23.8-in_healthcare_edition_all-in-one_business_pc_firmwareprobook_450_g9elitebook_835_g8_firmwarezbook_15u_g5_firmwareprobook_650_g7_firmwarezhan_66_pro_14_g4eliteone_1000_g1_23.8-in_all-in-one_business_pc_firmwareelitebook_850_g8_firmwareeliteone_800_g6_27_all-in-one_pc_firmwareelitebook_850_g7zbook_15_g6_firmwarezbook_fury_17_g8_firmwareprodesk_400_g7_small_form_factor_pc_firmwareelitebook_840_g5_healthcare_edition_firmwareprobook_x360_11_g3_education_edition_firmwarezbook_15u_g6_firmwareelitedesk_800_65w_g3_desktop_mini_pc_firmwareelitedesk_880_g5_tower_pczbook_firefly_15_g8elite_x2_1013_g3_firmwareprobook_450_g9_firmwareelitedesk_800_95w_g4_desktop_mini_pcproone_400_g5_20-inch_all-in-one_business_pcelitedesk_800_g3_small_form_factor_pc_firmwareelitebook_x360_1040_g5elitebook_x360_1040_g8_firmwareelitebook_x360_830_g5_firmwareprobook_445_g7proone_400_g6_24_all-in-one_pcelitebook_640_g9elitedesk_705_g4_microtower_pcdragonfly_folio_g3_2-in-1proone_480_g3_20-inch_non-touch_all-in_one_pcproone_400_g3_20-inch_non-touch_all-in-one_pc_firmwareelite_dragonfly_firmwareelitebook_x360_830_g8_firmwareprobook_445_g9probook_455_g9elite_dragonfly_g3_firmwarepro_x360_fortis_g9zhan_66_pro_14_g2_firmwareelitedesk_800_g8_tower_pc_firmwarezbook_15_g5_firmwareeliteone_800_g5_23.8-inch_all-in-onepro_x360_435_g9_firmwareprobook_450_g5elitebook_840r_g4_firmwareprobook_x360_435_g7_firmwareprobook_fortis_g9eliteone_800_g8_27_all-in-one_pcprobook_x360_11_g6_education_editioneliteone_800_g3_23.8-inch_touch_gpu_all-in-one_pcprodesk_600_g3_small_form_factor_pcelitedesk_880_g4_tower_pc_firmwareelitedesk_800_g5_desktop_mini_pc_firmwareelitebook_735_g5_firmwareelitebook_840r_g4elitebook_836_g5_firmwareeliteone_1000_g2_23.8-in_touch_all-in-one_business_pc_firmwareprodesk_405_g6_desktop_mini_firmwareeliteone_800_g3_23.8-inch_non-touch_all-in-one_pcelitebook_x360_1030_g7zhan_x_13_g2_firmwareeliteone_1000_g2_34-in_curved_all-in-one_business_pc_firmwareelite_x2_1013_g3eliteone_800_g8_24_all-in-one_pczhan_66_pro_a_14_g4prodesk_405_g8_desktop_mini_pc_firmwareelitedesk_800_65w_g4_desktop_mini_pcprobook_430_g6prodesk_400_g6_microtower_pc_firmwarezbook_firefly_g8_firmwareelitedesk_800_g6_small_form_factor_pcelitebook_850_g6eliteone_870_27_inch_g9_all-in-one_firmwareelitedesk_800_35w_g3_desktop_mini_pcprodesk_480_g6_microtower_pczbook_fury_17_g7_firmwareelitebook_1040_g9_firmwareelitebook_836_g6elitebook_x360_830_g5proone_440_g6_24_all-in-one_pc_firmwareelite_x360_1040_g9_2-in-1eliteone_1000_g1_34-in_curved_all-in-one_business_pcelitebook_836_g5prodesk_400_g5_desktop_mini_pc_firmwareproone_480_g3_20-inch_non-touch_all-in_one_pc_firmwareprobook_x360_440_g1proone_400_g3_20-inch_touch_all-in-one_pc_firmwareelitebook_835_g8elitebook_850_g5_firmwareprobook_440_g7_firmwarezbook_14u_g5_firmwarez2_mini_g9elitedesk_800_g5_tower_pc_firmwareelitebook_x360_830_g6probook_440_g5_firmwareelitebook_830_g6zbook_firefly_16_g9_firmwarezbook_firefly_16_g9probook_650_g5_firmwareprobook_450_g6z2_small_form_factor_g4elitebook_855_g7_firmwarezbook_power_g7elitedesk_705_g4_small_form_factor_pcprodesk_400_g6_desktop_mini_pcengage_go_mobile_system_firmwareprobook_440_g6_firmwareelite_tower_600_g9_firmwareeliteone_800_g4_23.8-inch_touch_all-in-one_pcelitebook_850_g7_firmwarezhan_66_pro_g3_22_all-in-one_pc_firmwarez2_mini_g5elitebook_x360_1030_g8_firmwareprobook_455_g7_firmwareelitebook_840_g8zbook_firefly_14_g7_firmwareprodesk_480_g7_pci_microtower_pc_firmwarezbook_power_g8_firmwareprobook_455_g8_firmwareprodesk_600_g6_desktop_mini_pc_firmwareproone_400_g6_20_all-in-one_pc_firmwareprodesk_400_g7_small_form_factor_pcelitebook_640_g9_firmwareelitebook_830_g7_firmwareprobook_470_g5_firmwareelitebook_840_g7_firmwarezhan_66_pro_g3_22_all-in-one_pcelitebook_855_g8eliteone_1000_g1_23.8-in_touch_all-in-one_business_pc_firmwareelite_mini_600_g9_firmwareelitedesk_705_g4_microtower_pc_firmwareelitedesk_800_g5_small_form_factor_pcproone_440_g6_24_all-in-one_pcdragonfly_folio_g3_2-in-1_firmwareeliteone_1000_g2_23.8-in_all-in-one_business_pceliteone_800_g4_23.8-inch_non-touch_all-in-one_pcprobook_440_g8_firmwareelitebook_840_g6_healthcare_editioneliteone_800_g6_24_all-in-one_pc_firmwareprodesk_400_g7_microtower_pcpro_x360_fortis_g9_firmwarezhan_66_pro_13_g2_firmwareprobook_450_g6_firmwareelitebook_1050_g1_firmwareeliteone_1000_g2_23.8-in_all-in-one_business_pc_firmwareprobook_430_g8_firmwareelite_mini_600_g9pro_tower_480_g9_firmwareprobook_x360_11_g4_education_editionprobook_430_g5probook_455_g7pro_tower_480_g9HP PC BIOS
CWE ID-CWE-367
Time-of-check Time-of-use (TOCTOU) Race Condition
CVE-2022-0915
Matching Score-4
Assigner-Logitech
ShareView Details
Matching Score-4
Assigner-Logitech
CVSS Score-6||MEDIUM
EPSS-0.04% / 11.86%
||
7 Day CHG~0.00%
Published-12 Apr, 2022 | 18:35
Updated-16 Sep, 2024 | 18:35
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Logitech Sync desktop application prior to 2.4.574 - TOCTOU during installation leads to privelege escalation

There is a Time-of-check Time-of-use (TOCTOU) Race Condition Vulnerability in Logitech Sync for Windows prior to 2.4.574. Successful exploitation of these vulnerabilities may escalate the permission to the system user.

Action-Not Available
Vendor-logitechLogitech
Product-syncSync
CWE ID-CWE-367
Time-of-check Time-of-use (TOCTOU) Race Condition
CVE-2022-0280
Matching Score-4
Assigner-Trellix
ShareView Details
Matching Score-4
Assigner-Trellix
CVSS Score-7.5||HIGH
EPSS-0.15% / 35.88%
||
7 Day CHG~0.00%
Published-10 Mar, 2022 | 22:35
Updated-02 Aug, 2024 | 23:25
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
McAfee Total Protection (MTP) - File Deletion vulnerability

A race condition vulnerability exists in the QuickClean feature of McAfee Total Protection for Windows prior to 16.0.43 that allows a local user to gain privilege elevation and perform an arbitrary file delete. This could lead to sensitive files being deleted and potentially cause denial of service. This attack exploits the way symlinks are created and how the product works with them.

Action-Not Available
Vendor-McAfee, LLCMicrosoft Corporation
Product-windowstotal_protectionMcAfee Total Protection for Windows
CWE ID-CWE-367
Time-of-check Time-of-use (TOCTOU) Race Condition
CVE-2023-37250
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-7||HIGH
EPSS-0.14% / 35.44%
||
7 Day CHG~0.00%
Published-20 Aug, 2023 | 00:00
Updated-08 Oct, 2024 | 14:24
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Unity Parsec has a TOCTOU race condition that permits local attackers to escalate privileges to SYSTEM if Parsec was installed in "Per User" mode. The application intentionally launches DLLs from a user-owned directory but intended to always perform integrity verification of those DLLs. This affects Parsec Loader versions through 8. Parsec Loader 9 is a fixed version.

Action-Not Available
Vendor-unityn/a
Product-parsecn/a
CWE ID-CWE-367
Time-of-check Time-of-use (TOCTOU) Race Condition
CVE-2020-25212
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-7||HIGH
EPSS-0.03% / 7.46%
||
7 Day CHG~0.00%
Published-09 Sep, 2020 | 15:52
Updated-04 Aug, 2024 | 15:33
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A TOCTOU mismatch in the NFS client code in the Linux kernel before 5.8.3 could be used by local attackers to corrupt memory or possibly have unspecified other impact because a size check is in fs/nfs/nfs4proc.c instead of fs/nfs/nfs4xdr.c, aka CID-b4487b935452.

Action-Not Available
Vendor-n/aLinux Kernel Organization, IncopenSUSEDebian GNU/LinuxCanonical Ltd.
Product-ubuntu_linuxdebian_linuxlinux_kernelleapn/a
CWE ID-CWE-787
Out-of-bounds Write
CWE ID-CWE-367
Time-of-check Time-of-use (TOCTOU) Race Condition
CVE-2023-34046
Matching Score-4
Assigner-VMware by Broadcom
ShareView Details
Matching Score-4
Assigner-VMware by Broadcom
CVSS Score-6.7||MEDIUM
EPSS-0.14% / 34.75%
||
7 Day CHG~0.00%
Published-20 Oct, 2023 | 08:59
Updated-07 Mar, 2025 | 19:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
VMware Fusion TOCTOU local privilege escalation vulnerability

VMware Fusion(13.x prior to 13.5) contains a TOCTOU (Time-of-check Time-of-use) vulnerability that occurs during installation for the first time (the user needs to drag or copy the application to a folder from the '.dmg' volume) or when installing an upgrade. A malicious actor with local non-administrative user privileges may exploit this vulnerability to escalate privileges to root on the system where Fusion is installed or being installed for the first time.

Action-Not Available
Vendor-Apple Inc.VMware (Broadcom Inc.)
Product-fusionmac_os_xFusion
CWE ID-CWE-367
Time-of-check Time-of-use (TOCTOU) Race Condition
CVE-2022-25165
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-7||HIGH
EPSS-1.64% / 81.16%
||
7 Day CHG~0.00%
Published-14 Apr, 2022 | 15:19
Updated-03 Aug, 2024 | 04:36
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An issue was discovered in Amazon AWS VPN Client 2.0.0. A TOCTOU race condition exists during the validation of VPN configuration files. This allows parameters outside of the AWS VPN Client allow list to be injected into the configuration file prior to the AWS VPN Client service (running as SYSTEM) processing the file. Dangerous arguments can be injected by a low-level user such as log, which allows an arbitrary destination to be specified for writing log files. This leads to an arbitrary file write as SYSTEM with partial control over the files content. This can be abused to cause an elevation of privilege or denial of service.

Action-Not Available
Vendor-amazonn/a
Product-aws_client_vpnn/a
CWE ID-CWE-367
Time-of-check Time-of-use (TOCTOU) Race Condition
CVE-2023-38041
Matching Score-4
Assigner-HackerOne
ShareView Details
Matching Score-4
Assigner-HackerOne
CVSS Score-7.8||HIGH
EPSS-0.43% / 61.36%
||
7 Day CHG~0.00%
Published-25 Oct, 2023 | 00:24
Updated-07 Mar, 2025 | 19:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A logged in user may elevate its permissions by abusing a Time-of-Check to Time-of-Use (TOCTOU) race condition. When a particular process flow is initiated, an attacker can exploit this condition to gain unauthorized elevated privileges on the affected system.

Action-Not Available
Vendor-Microsoft CorporationIvanti Software
Product-secure_access_clientwindowsSecure Access Client
CWE ID-CWE-367
Time-of-check Time-of-use (TOCTOU) Race Condition
CVE-2023-32555
Matching Score-4
Assigner-Trend Micro, Inc.
ShareView Details
Matching Score-4
Assigner-Trend Micro, Inc.
CVSS Score-7||HIGH
EPSS-0.04% / 10.91%
||
7 Day CHG~0.00%
Published-26 Jun, 2023 | 21:56
Updated-04 Dec, 2024 | 21:24
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A Time-of-Check Time-Of-Use vulnerability in the Trend Micro Apex One and Apex One as a Service agent could allow a local attacker to escalate privileges on affected installations. Please note: a local attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. This is similar to, but not identical to CVE-2023-32554.

Action-Not Available
Vendor-Microsoft CorporationTrend Micro Incorporated
Product-apex_onewindowsTrend Micro Apex Onetrend_micro_apex_one
CWE ID-CWE-367
Time-of-check Time-of-use (TOCTOU) Race Condition
CVE-2020-11233
Matching Score-4
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-4
Assigner-Qualcomm, Inc.
CVSS Score-7||HIGH
EPSS-0.03% / 5.27%
||
7 Day CHG~0.00%
Published-09 Jun, 2021 | 05:00
Updated-04 Aug, 2024 | 11:28
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Time-of-check time-of-use race condition While processing partition entries due to newly created buffer was read again from mmc without validation in Snapdragon Auto, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-qfe3100qca9377_firmwarepm8909qfe1040qfe2550mdm9640_firmwarepm660pmd9607_firmwarepmi8996pmi632qfe1040_firmwareqfe1045mdm9628_firmwareqfe2340_firmwaremdm9650qln1030smb1360_firmwarepmk8001qfe2340mdm9250smb1358_firmwarepmd9635_firmwareapq8009_firmwareqca6174_firmwareqcc1110_firmwareapq8076wtr3905wtr5975_firmwareapq8076_firmwareqca9377pmi632_firmwaresdw2500_firmwarewcd9326_firmwaremdm9628wcn3615_firmwaremdm9206_firmwareqsw8573_firmwarergr7640au_firmwarewtr2955wcn3660bwgr7640_firmwareqln1021aqqcc112qca4020mdm9230_firmwarepm8953_firmwareqca6574au_firmwareqca6584mdm9630qln1031_firmwarewcn3615wcn3680b_firmwaremsm8909wapq8009w_firmwarewcn3610_firmwareapq8053_firmwaresdx20mqca6564au_firmwarewcd9306qca9367_firmwarepm8937pm660_firmwarepm8996qca9367mdm9607_firmwaremdm9655_firmwareqcc1110smb1360sd205wcd9306_firmwareapq8017_firmwarewsa8810_firmwarepm8953qualcomm215_firmwaresmb231pm439_firmwareqca4020_firmwarewcd9326wcd9335qet4200aqqfe1045_firmwaremsm8937qfe3345pm8004_firmwareqca6174a_firmwaremdm9250_firmwaresmb1358pm439pmi8952mdm9655pm8937_firmwareqet4100_firmwaresmb1350qfe2550_firmwarepm8952_firmwaremdm9330_firmwaresd210wcn3620_firmwaresd820sdx20_firmwarewsa8815_firmwarepmi8937wcn3620sdw3100wtr3925_firmwarewtr3925sdw3100_firmwareapq8017qcc112_firmwarecsr6030_firmwareqca6564amdm9630_firmwareqet4100wcn3610mdm9640pmi8952_firmwareqfe3335_firmwaresmb1355wcd9330msm8996au_firmwarewtr2955_firmwarewgr7640csr6030qca6564aupmi8994_firmwarepmm8996au_firmwareqet4101_firmwaremsm8909w_firmwaremsm8996aupmk8001_firmwareqfe1035pmm8996ausmb1355_firmwaresmb1351_firmwarepmd9655_firmwarergr7640aumdm9230qualcomm215pm8996_firmwareqet4200aq_firmwarepm8909_firmwareqca6574amdm9206pm8916_firmwareqca9379_firmwareqca6174aqfe3100_firmwaresmb358s_firmwaresmb358swtr4905wtr5975qca6174wcd9335_firmwareqtc801s_firmwaresd439_firmwarepmd9645pm8956_firmwareqsw8573qfe3335qln1036aq_firmwarewsa8815qca6584_firmwaremsm8937_firmwaremdm9650_firmwarewcn3660b_firmwarewcn3680pmx20pmd9607qca6574a_firmwareapq8009qfe3320_firmwaresmb1351smb1357_firmwarewcd9330_firmwarewtr3905_firmwarepm215_firmwaremdm9626wtr2965_firmwareqfe1035_firmwarewcn3680_firmwaresdx20qln1021aq_firmwarepm8916qln1036aqqtc801spmd9635mdm9626_firmwarepmd9655qca6574auqfe3320mdm9607sd205_firmwareqca6564a_firmwareapq8009wpmd9645_firmwaresdx20m_firmwarewsa8810smb231_firmwarewtr4905_firmwaresd210_firmwareqfe3345_firmwarewcn3680bpm215apq8096auqln1030_firmwaresmb1350_firmwarewtr2965sd820_firmwarepmi8996_firmwarepmx20_firmwarepmi8937_firmwarepm8004sdw2500apq8053apq8096au_firmwaresd439qet4101pm8952pmi8994smb1357mdm9330qca9379pm8956qln1031Snapdragon Auto, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables
CWE ID-CWE-367
Time-of-check Time-of-use (TOCTOU) Race Condition
  • Previous
  • 1
  • 2
  • 3
  • Next
Details not found