Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
Vulnerability Details :

CVE-2022-32477

Summary
Assigner-mitre
Assigner Org ID-8254265b-2729-46b6-b9e3-3dfca2d5bfca
Published At-15 Feb, 2023 | 00:00
Updated At-05 May, 2025 | 16:15
Rejected At-
Credits

An issue was discovered in Insyde InsydeH2O with kernel 5.0 through 5.5. DMA attacks on the FvbServicesRuntimeDxe shared buffer used by SMM and non-SMM code could cause TOCTOU race-condition issues that could lead to corruption of SMRAM and escalation of privileges. This attack can be mitigated using IOMMU protection for the ACPI runtime memory used for the command buffer. This attack can be mitigated by copying the firmware block services data to SMRAM before checking it.

Vendors
-
Not available
Products
-
Metrics (CVSS)
VersionBase scoreBase severityVector
Weaknesses
Attack Patterns
Solution/Workaround
References
HyperlinkResource Type
EPSS History
Score
Latest Score
-
N/A
No data available for selected date range
Percentile
Latest Percentile
-
N/A
No data available for selected date range
Stakeholder-Specific Vulnerability Categorization (SSVC)
▼Common Vulnerabilities and Exposures (CVE)
cve.org
Assigner:mitre
Assigner Org ID:8254265b-2729-46b6-b9e3-3dfca2d5bfca
Published At:15 Feb, 2023 | 00:00
Updated At:05 May, 2025 | 16:15
Rejected At:
▼CVE Numbering Authority (CNA)

An issue was discovered in Insyde InsydeH2O with kernel 5.0 through 5.5. DMA attacks on the FvbServicesRuntimeDxe shared buffer used by SMM and non-SMM code could cause TOCTOU race-condition issues that could lead to corruption of SMRAM and escalation of privileges. This attack can be mitigated using IOMMU protection for the ACPI runtime memory used for the command buffer. This attack can be mitigated by copying the firmware block services data to SMRAM before checking it.

Affected Products
Vendor
n/a
Product
n/a
Versions
Affected
  • n/a
Problem Types
TypeCWE IDDescription
textN/An/a
Type: text
CWE ID: N/A
Description: n/a
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://www.insyde.com/security-pledge
N/A
https://www.insyde.com/security-pledge/SA-2023009
N/A
Hyperlink: https://www.insyde.com/security-pledge
Resource: N/A
Hyperlink: https://www.insyde.com/security-pledge/SA-2023009
Resource: N/A
▼Authorized Data Publishers (ADP)
1. CVE Program Container
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://www.insyde.com/security-pledge
x_transferred
https://www.insyde.com/security-pledge/SA-2023009
x_transferred
Hyperlink: https://www.insyde.com/security-pledge
Resource:
x_transferred
Hyperlink: https://www.insyde.com/security-pledge/SA-2023009
Resource:
x_transferred
2. CISA ADP Vulnrichment
Affected Products
Problem Types
TypeCWE IDDescription
CWECWE-367CWE-367 Time-of-check Time-of-use (TOCTOU) Race Condition
Type: CWE
CWE ID: CWE-367
Description: CWE-367 Time-of-check Time-of-use (TOCTOU) Race Condition
Metrics
VersionBase scoreBase severityVector
3.17.0HIGH
CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
Version: 3.1
Base score: 7.0
Base severity: HIGH
Vector:
CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
Information is not available yet
▼National Vulnerability Database (NVD)
nvd.nist.gov
Source:cve@mitre.org
Published At:15 Feb, 2023 | 14:15
Updated At:05 May, 2025 | 17:18

An issue was discovered in Insyde InsydeH2O with kernel 5.0 through 5.5. DMA attacks on the FvbServicesRuntimeDxe shared buffer used by SMM and non-SMM code could cause TOCTOU race-condition issues that could lead to corruption of SMRAM and escalation of privileges. This attack can be mitigated using IOMMU protection for the ACPI runtime memory used for the command buffer. This attack can be mitigated by copying the firmware block services data to SMRAM before checking it.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Date Added: N/A
Due Date: N/A
Vulnerability Name: N/A
Required Action: N/A
Metrics
TypeVersionBase scoreBase severityVector
Primary3.17.0HIGH
CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
Secondary3.17.0HIGH
CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
Type: Primary
Version: 3.1
Base score: 7.0
Base severity: HIGH
Vector:
CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
Type: Secondary
Version: 3.1
Base score: 7.0
Base severity: HIGH
Vector:
CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
CPE Matches

Insyde Software Corp. (ISC)
insyde
>>insydeh2o>>Versions from 5.0(inclusive) to 5.2.05.27.27(exclusive)
cpe:2.3:a:insyde:insydeh2o:*:*:*:*:*:*:*:*
Insyde Software Corp. (ISC)
insyde
>>insydeh2o>>Versions from 5.3(inclusive) to 5.3.05.36.27(exclusive)
cpe:2.3:a:insyde:insydeh2o:*:*:*:*:*:*:*:*
Insyde Software Corp. (ISC)
insyde
>>insydeh2o>>Versions from 5.4(inclusive) to 5.4.05.44.27(exclusive)
cpe:2.3:a:insyde:insydeh2o:*:*:*:*:*:*:*:*
Insyde Software Corp. (ISC)
insyde
>>insydeh2o>>Versions from 5.5(inclusive) to 5.5.05.52.27(exclusive)
cpe:2.3:a:insyde:insydeh2o:*:*:*:*:*:*:*:*
Weaknesses
CWE IDTypeSource
CWE-367Primarynvd@nist.gov
CWE-367Secondary134c704f-9b21-4f2e-91b3-4a467353bcc0
CWE ID: CWE-367
Type: Primary
Source: nvd@nist.gov
CWE ID: CWE-367
Type: Secondary
Source: 134c704f-9b21-4f2e-91b3-4a467353bcc0
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
https://www.insyde.com/security-pledgecve@mitre.org
Vendor Advisory
https://www.insyde.com/security-pledge/SA-2023009cve@mitre.org
Vendor Advisory
https://www.insyde.com/security-pledgeaf854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
https://www.insyde.com/security-pledge/SA-2023009af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
Hyperlink: https://www.insyde.com/security-pledge
Source: cve@mitre.org
Resource:
Vendor Advisory
Hyperlink: https://www.insyde.com/security-pledge/SA-2023009
Source: cve@mitre.org
Resource:
Vendor Advisory
Hyperlink: https://www.insyde.com/security-pledge
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Vendor Advisory
Hyperlink: https://www.insyde.com/security-pledge/SA-2023009
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Vendor Advisory

Change History

0
Information is not available yet

Similar CVEs

134Records found

CVE-2023-32555
Matching Score-4
Assigner-Trend Micro, Inc.
ShareView Details
Matching Score-4
Assigner-Trend Micro, Inc.
CVSS Score-7||HIGH
EPSS-0.04% / 10.93%
||
7 Day CHG~0.00%
Published-26 Jun, 2023 | 21:56
Updated-04 Dec, 2024 | 21:24
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A Time-of-Check Time-Of-Use vulnerability in the Trend Micro Apex One and Apex One as a Service agent could allow a local attacker to escalate privileges on affected installations. Please note: a local attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. This is similar to, but not identical to CVE-2023-32554.

Action-Not Available
Vendor-Microsoft CorporationTrend Micro Incorporated
Product-apex_onewindowsTrend Micro Apex Onetrend_micro_apex_one
CWE ID-CWE-367
Time-of-check Time-of-use (TOCTOU) Race Condition
CVE-2023-28576
Matching Score-4
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-4
Assigner-Qualcomm, Inc.
CVSS Score-6.4||MEDIUM
EPSS-0.02% / 4.67%
||
7 Day CHG~0.00%
Published-08 Aug, 2023 | 09:15
Updated-02 Aug, 2024 | 13:43
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Time-of-check Time-of-use (TOCTOU) Race Condition in Camera Kernel Driver

The buffer obtained from kernel APIs such as cam_mem_get_cpu_buf() may be readable/writable in userspace after kernel accesses it. In other words, user mode may race and modify the packet header (e.g. header.count), causing checks (e.g. size checks) in kernel code to be invalid. This may lead to out-of-bounds read/write issues.

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-fastconnect_7800snapdragon_865_5gwcd9380_firmwarewsa8830qcs610sw5100psd865_5gfastconnect_6900fastconnect_6800fastconnect_6900_firmwaresnapdragon_8_gen_1_firmwarewcn3988_firmwareqcn9074snapdragon_870_5gwsa8835wcn3950_firmwaresnapdragon_8_gen_1wsa8810_firmwarewcd9380wcd9341_firmwarefastconnect_7800_firmwaresw5100wsa8810qca6436qcs410snapdragon_865\+_5gsnapdragon_x55_5gqcs610_firmwaresw5100p_firmwaresxr2130wcd9370snapdragon_865\+_5g_firmwarewcn3680bqca6426sxr2130_firmwarewcd9341wcn3980qca6391_firmwarewcn3950snapdragon_xr2_5g_firmwarewcd9370_firmwarewcn3660bwsa8815snapdragon_870_5g_firmwarewsa8830_firmwaresd865_5g_firmwareqca6426_firmwarewcn3660b_firmwarewcn3988wsa8815_firmwaresnapdragon_x55_5g_firmwarewcn3680b_firmwarewsa8835_firmwaresw5100_firmwareqcn9074_firmwarefastconnect_6800_firmwareqcs410_firmwaresnapdragon_865_5g_firmwareqca6391wcn3980_firmwareqca6436_firmwaresnapdragon_xr2_5gSnapdragon
CWE ID-CWE-367
Time-of-check Time-of-use (TOCTOU) Race Condition
CVE-2021-23892
Matching Score-4
Assigner-Trellix
ShareView Details
Matching Score-4
Assigner-Trellix
CVSS Score-8.2||HIGH
EPSS-0.08% / 25.41%
||
7 Day CHG~0.00%
Published-12 May, 2021 | 09:05
Updated-03 Aug, 2024 | 19:14
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

By exploiting a time of check to time of use (TOCTOU) race condition during the Endpoint Security for Linux Threat Prevention and Firewall (ENSL TP/FW) installation process, a local user can perform a privilege escalation attack to obtain administrator privileges for the purpose of executing arbitrary code through insecure use of predictable temporary file locations.

Action-Not Available
Vendor-McAfee, LLC
Product-endpoint_security_for_linux_threat_preventionMcAfee Endpoint Security (ENS) for Linux
CWE ID-CWE-59
Improper Link Resolution Before File Access ('Link Following')
CWE ID-CWE-367
Time-of-check Time-of-use (TOCTOU) Race Condition
CVE-2023-27470
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-7||HIGH
EPSS-1.00% / 76.08%
||
7 Day CHG+0.03%
Published-11 Sep, 2023 | 00:00
Updated-26 Sep, 2024 | 15:41
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

BASupSrvcUpdater.exe in N-able Take Control Agent through 7.0.41.1141 before 7.0.43 has a TOCTOU Race Condition via a pseudo-symlink at %PROGRAMDATA%\GetSupportService_N-Central\PushUpdates, leading to arbitrary file deletion.

Action-Not Available
Vendor-n-ablen/an-ableMicrosoft Corporation
Product-windowstake_controln/atake_control
CWE ID-CWE-367
Time-of-check Time-of-use (TOCTOU) Race Condition
CVE-2023-24861
Matching Score-4
Assigner-Microsoft Corporation
ShareView Details
Matching Score-4
Assigner-Microsoft Corporation
CVSS Score-7||HIGH
EPSS-0.11% / 30.46%
||
7 Day CHG~0.00%
Published-14 Mar, 2023 | 16:55
Updated-01 Jan, 2025 | 00:48
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Windows Graphics Component Elevation of Privilege Vulnerability

Windows Graphics Component Elevation of Privilege Vulnerability

Action-Not Available
Vendor-Microsoft Corporation
Product-windows_10_21h2windows_10_1809windows_server_2016windows_server_2012windows_server_2008windows_10_1507windows_11_21h2windows_10_22h2windows_server_2022windows_10_20h2windows_11_22h2windows_server_2019windows_10_1607Windows Server 2022Windows 10 Version 1607Windows 11 version 22H2Windows Server 2019 (Server Core installation)Windows Server 2008 Service Pack 2Windows 10 Version 1809Windows Server 2016 (Server Core installation)Windows 11 version 21H2Windows Server 2012 (Server Core installation)Windows 10 Version 20H2Windows Server 2016Windows 10 Version 1507Windows 10 Version 21H2Windows Server 2008 R2 Service Pack 1Windows Server 2008 Service Pack 2 (Server Core installation)Windows Server 2008 R2 Service Pack 1 (Server Core installation)Windows Server 2012 R2Windows Server 2019Windows Server 2012Windows Server 2008 Service Pack 2Windows Server 2012 R2 (Server Core installation)Windows 10 Version 22H2
CWE ID-CWE-367
Time-of-check Time-of-use (TOCTOU) Race Condition
CWE ID-CWE-362
Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')
CVE-2022-23181
Matching Score-4
Assigner-Apache Software Foundation
ShareView Details
Matching Score-4
Assigner-Apache Software Foundation
CVSS Score-7||HIGH
EPSS-0.26% / 48.98%
||
7 Day CHG~0.00%
Published-27 Jan, 2022 | 00:00
Updated-03 Aug, 2024 | 03:36
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Local privilege escalation with FileStore

The fix for bug CVE-2020-9484 introduced a time of check, time of use vulnerability into Apache Tomcat 10.1.0-M1 to 10.1.0-M8, 10.0.0-M5 to 10.0.14, 9.0.35 to 9.0.56 and 8.5.55 to 8.5.73 that allowed a local attacker to perform actions with the privileges of the user that the Tomcat process is using. This issue is only exploitable when Tomcat is configured to persist sessions using the FileStore.

Action-Not Available
Vendor-The Apache Software FoundationDebian GNU/LinuxOracle Corporation
Product-debian_linuxfinancial_services_crime_and_compliance_management_studiomysql_enterprise_monitortomcatagile_engineering_data_managementcommunications_cloud_native_core_policymanaged_file_transferApache Tomcat
CWE ID-CWE-367
Time-of-check Time-of-use (TOCTOU) Race Condition
CVE-2022-22093
Matching Score-4
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-4
Assigner-Qualcomm, Inc.
CVSS Score-7.8||HIGH
EPSS-0.08% / 24.20%
||
7 Day CHG~0.00%
Published-16 Sep, 2022 | 05:25
Updated-03 Aug, 2024 | 03:00
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Memory corruption or temporary denial of service due to improper handling of concurrent hypervisor operations to attach or detach IRQs from virtual interrupt sources in Snapdragon Compute, Snapdragon Connectivity, Snapdragon Industrial IOT, Snapdragon Mobile

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-wcn3991_firmwarewcn3991wsa8830wcd9380_firmwaresd780gsd865_5gqca6431_firmwaresdx55m_firmwarewcn6856_firmwaresd888wsa8835wcd9380sd765g_firmwaresd888_5gqca6420_firmwareqca6390_firmwarewcd9370wcn6855_firmwaresm8475p_firmwaresm7325pqca6426qrb5165n_firmwareqca6430_firmwarewcn6750wcn3998sd_8cx_firmwarewcd9385_firmwaresdxr2_5g_firmwaresd_8cx_gen2_firmwaresd_8_gen1_5g_firmwarewcd9340_firmwarewsa8815sm7325p_firmwareqsm8350_firmwarewcn6850qsm8350sd765qca6426_firmwaresm7315_firmwarewcn7850sd768g_firmwarewcd9375_firmwarewcn3998_firmwareqrb5165msm7315sm7250p_firmwareqca6391sdx55mqca6420qca6436_firmwareqrb5165nqca6421_firmwaresm8475_firmwaresm7450_firmwareaqt1000_firmwaresd778gwcn6740_firmwaresd_8cx_gen2wcn7851qcs6490qrb5165_firmwareqrb5165m_firmwaresdxr2_5gqcm6490_firmwarewsa8832_firmwareqrb5165wcn6851_firmwareqca6430qca6421sd778g_firmwarewcd9340wsa8810_firmwaresd765gwcd9341_firmwarewsa8810sd765_firmwaresd870qca6436wcn6851wsa8832wcn6855wcn7851_firmwarewcn6856wcd9385wcd9341sd768gqca6431qcs6490_firmwaresd870_firmwarewcn6740qca6391_firmwareqca6390wcd9375sd_8cxaqt1000sd780g_firmwarewcd9370_firmwaresd888_firmwarewsa8830_firmwaresd865_5g_firmwareqcm6490sd888_5g_firmwarewcn6850_firmwarewcn7850_firmwarewsa8815_firmwarewsa8835_firmwaresm7250psm7450sm8475wcn6750_firmwaresm8475pSnapdragon Compute, Snapdragon Connectivity, Snapdragon Industrial IOT, Snapdragon Mobile
CWE ID-CWE-367
Time-of-check Time-of-use (TOCTOU) Race Condition
CVE-2022-22094
Matching Score-4
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-4
Assigner-Qualcomm, Inc.
CVSS Score-7.8||HIGH
EPSS-0.07% / 22.47%
||
7 Day CHG~0.00%
Published-16 Sep, 2022 | 05:25
Updated-03 Aug, 2024 | 03:00
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

memory corruption in Kernel due to race condition while getting mapping reference in Snapdragon Compute, Snapdragon Connectivity, Snapdragon Industrial IOT, Snapdragon Mobile

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-wcn3991_firmwarewcn3991wsa8830wcd9380_firmwaresd780gsd865_5gqca6431_firmwaresdx55m_firmwarewcn6856_firmwaresd888wsa8835wcd9380sd765g_firmwaresd888_5gqca6420_firmwareqca6390_firmwarewcd9370wcn6855_firmwaresm8475p_firmwaresm7325pqca6426qrb5165n_firmwareqca6430_firmwarewcn6750wcn3998sd_8cx_firmwarewcd9385_firmwaresdxr2_5g_firmwaresd_8cx_gen2_firmwaresd_8_gen1_5g_firmwarewcd9340_firmwarewsa8815sm7325p_firmwareqsm8350_firmwarewcn6850qsm8350sd765qca6426_firmwaresm7315_firmwarewcn7850sd768g_firmwarewcd9375_firmwarewcn3998_firmwareqrb5165msm7315sm7250p_firmwareqca6391sdx55mqca6420qca6436_firmwareqrb5165nqca6421_firmwaresm8475_firmwaresm7450_firmwareaqt1000_firmwaresd778gwcn6740_firmwaresd_8cx_gen2wcn7851qcs6490qrb5165_firmwareqrb5165m_firmwaresdxr2_5gqcm6490_firmwarewsa8832_firmwareqrb5165wcn6851_firmwareqca6430qca6421sd778g_firmwarewcd9340wsa8810_firmwaresd765gwcd9341_firmwarewsa8810sd765_firmwaresd870qca6436wcn6851wsa8832wcn6855wcn7851_firmwarewcn6856wcd9385wcd9341sd768gqca6431qcs6490_firmwaresd870_firmwarewcn6740qca6391_firmwareqca6390wcd9375sd_8cxaqt1000sd780g_firmwarewcd9370_firmwaresd888_firmwarewsa8830_firmwaresd865_5g_firmwareqcm6490sd888_5g_firmwarewcn6850_firmwarewcn7850_firmwarewsa8815_firmwarewsa8835_firmwaresm7250psm7450sm8475wcn6750_firmwaresm8475pSnapdragon Compute, Snapdragon Connectivity, Snapdragon Industrial IOT, Snapdragon Mobile
CWE ID-CWE-367
Time-of-check Time-of-use (TOCTOU) Race Condition
CVE-2022-20110
Matching Score-4
Assigner-MediaTek, Inc.
ShareView Details
Matching Score-4
Assigner-MediaTek, Inc.
CVSS Score-7||HIGH
EPSS-0.01% / 1.00%
||
7 Day CHG~0.00%
Published-03 May, 2022 | 19:56
Updated-03 Aug, 2024 | 02:02
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In ion, there is a possible use after free due to a race condition. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS06399915; Issue ID: ALPS06399901.

Action-Not Available
Vendor-Google LLCMediaTek Inc.
Product-mt6757cdmt6873mt6893mt8675mt8765mt6580mt8788mt6750mt8666mt8167mt6765mt6757cmt6737mt6883mt8696mt6853tmt6739mt6757mt8768mt6797mt6769mt6761mt6875mt6889mt8789mt8797mt8321mt6768mt8362amt8786mt8766mt8695mt6771mt8385mt6833mt6885mt6735mt6750smt6753mt6762mt6877mt6781mt8365mt6853mt8168androidmt6757chmt8185mt8791mt6779mt6785mt6763mt8173MT6580, MT6735, MT6737, MT6739, MT6750, MT6750S, MT6753, MT6757, MT6757C, MT6757CD, MT6757CH, MT6761, MT6762, MT6763, MT6765, MT6768, MT6769, MT6771, MT6779, MT6781, MT6785, MT6797, MT6833, MT6853, MT6853T, MT6873, MT6875, MT6877, MT6883, MT6885, MT6889, MT6893, MT8167, MT8168, MT8173, MT8185, MT8321, MT8362A, MT8365, MT8385, MT8666, MT8675, MT8695, MT8696, MT8765, MT8766, MT8768, MT8786, MT8788, MT8789, MT8791, MT8797
CWE ID-CWE-367
Time-of-check Time-of-use (TOCTOU) Race Condition
CVE-2023-33046
Matching Score-4
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-4
Assigner-Qualcomm, Inc.
CVSS Score-7.8||HIGH
EPSS-0.02% / 2.86%
||
7 Day CHG~0.00%
Published-06 Feb, 2024 | 05:46
Updated-11 Aug, 2025 | 15:06
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Time-of-check Time-of-use (TOCTOU) Race Condition in Trusted Execution Environment

Memory corruption in Trusted Execution Environment while deinitializing an object used for license validation.

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-qcm8550_firmwarewsa8845_firmwarewsa8832wsa8840qam8295p_firmwareqca6595qcs8550_firmwareqca8081_firmwarear8035_firmwareqca6696qrb5165mqca6698aq_firmwarewcd9385qcn9012wcd9395_firmwareqcn6024snapdragon_8_gen_2_mobile_platformqcs7230_firmwaresxr1230p_firmwarewcd9390_firmwaresg8275pwsa8832_firmwareqca8337_firmwaresnapdragon_x70_modem-rf_system_firmwareqca8337wcd9395ssg2125psg8275p_firmwareqca6574au_firmwaresnapdragon_8cx_gen_3_compute_platform_firmwareqam8295pqcs8250_firmwareqca6574auwcd9390sa8540p_firmwareflight_rb5_5g_platformvideo_collaboration_vc5_platformwsa8845h_firmwaresm8550p_firmwareqcm8550sa9000p_firmwaresnapdragon_x65_5g_modem-rf_systemqcn9024snapdragon_x65_5g_modem-rf_system_firmwareqrb5165n_firmwarewsa8835wsa8840_firmwaresxr2230p_firmwareqca6391_firmwareqcn9011snapdragon_ar2_gen_1_platformsa8295p_firmwareqca6696_firmwareqcn9024_firmwaresnapdragon_8cx_gen_3_compute_platformqcn6024_firmwarewsa8845hwcd9380_firmwareqca8081wsa8830sm8550pssg2115pqcn9011_firmwareflight_rb5_5g_platform_firmwarear8035sa8540pqrb5165m_firmwareqca6595_firmwareqcs7230fastconnect_6900fastconnect_7800_firmwarerobotics_rb5_platformqca6391snapdragon_x70_modem-rf_systemqcn9012_firmwareqca6698aqssg2125p_firmwarewcd9385_firmwareqrb5165nfastconnect_6900_firmwaresa8295psnapdragon_8_gen_2_mobile_platform_firmwarerobotics_rb5_platform_firmwarewcd9380qcs8550sxr2230pfastconnect_7800snapdragon_ar2_gen_1_platform_firmwaresnapdragon_8\+_gen_2_mobile_platform_firmwarewsa8845wsa8835_firmwaresxr1230pssg2115p_firmwarevideo_collaboration_vc5_platform_firmwareqcs8250sa9000psnapdragon_8\+_gen_2_mobile_platformwsa8830_firmwareSnapdragon
CWE ID-CWE-367
Time-of-check Time-of-use (TOCTOU) Race Condition
CWE ID-CWE-787
Out-of-bounds Write
CVE-2022-1537
Matching Score-4
Assigner-Protect AI (formerly huntr.dev)
ShareView Details
Matching Score-4
Assigner-Protect AI (formerly huntr.dev)
CVSS Score-7.8||HIGH
EPSS-0.18% / 40.19%
||
7 Day CHG~0.00%
Published-10 May, 2022 | 00:00
Updated-03 Aug, 2024 | 00:10
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
file.copy operations in GruntJS are vulnerable to a TOCTOU race condition leading to arbitrary file write in gruntjs/grunt

file.copy operations in GruntJS are vulnerable to a TOCTOU race condition leading to arbitrary file write in GitHub repository gruntjs/grunt prior to 1.5.3. This vulnerability is capable of arbitrary file writes which can lead to local privilege escalation to the GruntJS user if a lower-privileged user has write access to both source and destination directories as the lower-privileged user can create a symlink to the GruntJS user's .bashrc file or replace /etc/shadow file if the GruntJS user is root.

Action-Not Available
Vendor-gruntjsgruntjs
Product-gruntgruntjs/grunt
CWE ID-CWE-367
Time-of-check Time-of-use (TOCTOU) Race Condition
CVE-2022-27904
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-7||HIGH
EPSS-0.08% / 25.56%
||
7 Day CHG~0.00%
Published-30 Jun, 2022 | 23:25
Updated-03 Aug, 2024 | 05:41
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Automox Agent for macOS before version 39 was vulnerable to a time-of-check/time-of-use (TOCTOU) race-condition attack during the agent install process.

Action-Not Available
Vendor-automoxn/aApple Inc.
Product-automoxmacosn/a
CWE ID-CWE-367
Time-of-check Time-of-use (TOCTOU) Race Condition
CVE-2021-47280
Matching Score-4
Assigner-kernel.org
ShareView Details
Matching Score-4
Assigner-kernel.org
CVSS Score-7||HIGH
EPSS-0.01% / 1.12%
||
7 Day CHG~0.00%
Published-21 May, 2024 | 14:20
Updated-04 May, 2025 | 07:07
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
drm: Fix use-after-free read in drm_getunique()

In the Linux kernel, the following vulnerability has been resolved: drm: Fix use-after-free read in drm_getunique() There is a time-of-check-to-time-of-use error in drm_getunique() due to retrieving file_priv->master prior to locking the device's master mutex. An example can be seen in the crash report of the use-after-free error found by Syzbot: https://syzkaller.appspot.com/bug?id=148d2f1dfac64af52ffd27b661981a540724f803 In the report, the master pointer was used after being freed. This is because another process had acquired the device's master mutex in drm_setmaster_ioctl(), then overwrote fpriv->master in drm_new_set_master(). The old value of fpriv->master was subsequently freed before the mutex was unlocked. To fix this, we lock the device's master mutex before retrieving the pointer from from fpriv->master. This patch passes the Syzbot reproducer test.

Action-Not Available
Vendor-Linux Kernel Organization, Inc
Product-linux_kernelLinux
CWE ID-CWE-416
Use After Free
CWE ID-CWE-367
Time-of-check Time-of-use (TOCTOU) Race Condition
CVE-2021-1921
Matching Score-4
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-4
Assigner-Qualcomm, Inc.
CVSS Score-7.8||HIGH
EPSS-0.03% / 6.81%
||
7 Day CHG~0.00%
Published-12 Nov, 2021 | 06:15
Updated-03 Aug, 2024 | 16:25
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Possible memory corruption due to Improper handling of hypervisor unmap operations for concurrent memory operations in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-wsa8830wcd9380_firmwarewcn3990sd780gsd865_5gqca6595qca6431_firmwaresdx24sdx55m_firmwarewcn6856_firmwarewcd9360_firmwarewsa8835wcn3950_firmwarewcd9380sd888_5gqca6420_firmwareqca6390_firmwarewcd9370sd675_firmwarewcn6855_firmwareqca6426sdx24_firmwarewcn3990_firmwareqrb5165n_firmwaresm7325qca6430_firmwarewcn3980wcn6750wcn3998sd_8cx_firmwarewcd9385_firmwaresdxr2_5g_firmwarewcn3950whs9410wcd9340_firmwaresd855wsa8815wcn6850qsm8350_firmwareqsm8350sd_8c_firmwareqca6426_firmwarewcn7850qca6574au_firmwaresdx55_firmwarewcd9375_firmwarewcn3998_firmwarewcn3980_firmwareqca6391sdx55mwcd9360qca6420qca6436_firmwareqrb5165nqca6421_firmwareaqt1000_firmwarewcn6740_firmwaresd778gsa6155p_firmwarewhs9410_firmwarewcn7851qcs6490qrb5165_firmwaresdxr2_5gqcm6490_firmwareqrb5165wcn6851_firmwareqca6430qca6574auqca6421sd778g_firmwarewcd9340sa8195psdm830_firmwarewsa8810_firmwarewcd9341_firmwarewsa8810sd870qca6436wcn6851wcn6855sa6155pwcn7851_firmwarewcn6856sd_8cwcd9385wcd9341qca6431qcs6490_firmwareqca6595_firmwaresd870_firmwarewcn6740qca6391_firmwareqca6390wcd9375sd_8cxaqt1000sd780g_firmwarewcd9370_firmwaresdx55sd675wsa8830_firmwaresd855_firmwaresd865_5g_firmwareqcm6490sd888_5g_firmwarewcn6850_firmwarewcn7850_firmwarewsa8815_firmwarewsa8835_firmwaresa8195p_firmwaresdm830wcn6750_firmwaresm7325_firmwareSnapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile
CWE ID-CWE-367
Time-of-check Time-of-use (TOCTOU) Race Condition
CVE-2023-25394
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-7||HIGH
EPSS-0.03% / 7.14%
||
7 Day CHG~0.00%
Published-16 May, 2023 | 00:00
Updated-23 Jan, 2025 | 18:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Videostream macOS app 0.5.0 and 0.4.3 has a Race Condition. The Updater privileged script attempts to update Videostream every 5 hours.

Action-Not Available
Vendor-getvideostreamn/a
Product-videostreamn/a
CWE ID-CWE-367
Time-of-check Time-of-use (TOCTOU) Race Condition
CVE-2023-26299
Matching Score-4
Assigner-HP Inc.
ShareView Details
Matching Score-4
Assigner-HP Inc.
CVSS Score-7||HIGH
EPSS-0.15% / 36.69%
||
7 Day CHG~0.00%
Published-30 Jun, 2023 | 15:40
Updated-04 Dec, 2024 | 16:06
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A potential Time-of-Check to Time-of-Use (TOCTOU) vulnerability has been identified in certain HP PC products using AMI UEFI Firmware (system BIOS), which might allow arbitrary code execution. AMI has released updates to mitigate the potential vulnerability.

Action-Not Available
Vendor-HP Inc.
Product-pro_tower_290_g9_desktop_firmware280_pro_g5_small_form_factor_firmware205_g4_22_all-in-one290_g1t430_firmware200_pro_g4_22_all-in-one_firmwarezhan_86_pro_g2_microtower_firmwareproone_240_g10_firmwaredesktop_pro_g1_microtower_firmware260_g4_desktop_mini_firmware280_g3_firmware280_g6_firmware470_g10desktop_pro_g1_microtowerpro_small_form_factor_280_g9_desktop_firmware240_g10_firmware282_pro_g4_microtower_firmware290_g3349_g7247_g8_firmwarepro_tower_290_g9_desktop280_g5_firmware282_g5_firmwareproone_490_g3280_g5_small_form_factor_firmware470_g9280_g4_microtower_firmwareproone_240_g10280_g4_microtowerproone_440_g3pro_small_form_factor_zhan_66_g9_desktop280_g8_microtower280_pro_g3t430250_g10_firmware255_g10_firmware290_g2280_pro_g4_microtower_firmware290_g2_firmware245_g6_firmware290_g2_microtowerproone_496_g3288_g5_firmwareproone_440_g3_firmware280_g4_firmwarepro_tower_280_g9_desktop290_g2_microtower_firmwarepro_tower_zhan_99_g9_desktop245_g6200_g3205_pro_g4_22_all-in-onepro_tower_200_g9_desktop245_g8_firmwarezhan_99_g4z_vr_backpack_g1_workstation_firmwarezhan_99_pro_g1_microtower_firmware280_pro_g5_small_form_factor288_g6zhan_99_g4_firmware247_g8288_pro_g4_microtower_firmwarez_vr_backpack_g1_workstationt628280_g4288_g6_firmware255_g10proone_496_g3_firmwarezhan_99_g2_firmwareproone_240_g9_firmwarepro_small_form_factor_290_g9_desktop_firmware280_g3200_g4_22_all-in-onepro_tower_200_g9_desktop_firmwarezhan_86_pro_g2_microtower250_g10282_pro_g4_microtowerpro_tower_zhan_99_g9_desktop_firmware282_g6240_g10zhan_99_g2290_g4proone_490_g3_firmware280_g5260_g4_desktop_mini290_g4_firmware280_g5_small_form_factor280_pro_g4_microtower282_g6_firmware290_g1_firmware290_g3_small_form_factorpro_small_form_factor_zhan_66_g9_desktop_firmwarezhan_99_pro_g1_microtower200_g3_firmwarepro_small_form_factor_280_g9_desktoppro_small_form_factor_290_g9_desktop349_g7_firmware280_g8_microtower_firmwareproone_240_g9t628_firmware245_g7470_g10_firmware282_g5288_pro_g4_microtower280_pro_g3_firmwarevr_backpack_g2_firmware280_g6200_g4_22_all-in-one_firmware205_g4_22_all-in-one_firmwarepro_tower_280_g9_desktop_firmwarevr_backpack_g2470_g9_firmware245_g7_firmware200_pro_g4_22_all-in-one290_g3_small_form_factor_firmware288_g5290_g3_firmware205_pro_g4_22_all-in-one_firmware245_g8HP PC products using AMI UEFI Firmware
CWE ID-CWE-367
Time-of-check Time-of-use (TOCTOU) Race Condition
CVE-2025-27076
Matching Score-4
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-4
Assigner-Qualcomm, Inc.
CVSS Score-7.8||HIGH
EPSS-0.01% / 1.06%
||
7 Day CHG~0.00%
Published-06 Aug, 2025 | 07:26
Updated-19 Aug, 2025 | 13:08
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Time-of-check Time-of-use (TOCTOU) Race Condition in Display

Memory corruption while processing simultaneous requests via escape path.

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-qcm6490_firmwaresnapdragon_8cx_gen_3_compute_platform_\(sc8280xp-bb\)aqt1000snapdragon_8cx_gen_3_compute_platform_\(sc8280xp-ab\)_firmwaresnapdragon_7c\+_gen_3_compute_firmwaresm6250snapdragon_7c_compute_platform_\(sc7180-ac\)wsa8835qca6391snapdragon_8cx_gen_2_5g_compute_platform_\(sc8180xp-aa\)snapdragon_8cx_gen_3_compute_platform_\(sc8280xp-ab\)fastconnect_7800_firmwarewsa8845_firmwaresc8180x\+sdx55_firmwarewsa8830snapdragon_8cx_gen_2_5g_compute_platform_\(sc8180x-ac\)_firmwarewsa8845h_firmwaresnapdragon_8c_compute_platform_\(sc8180xp-ad\)snapdragon_8cx_gen_2_5g_compute_platform_\(sc8180xp-ab\)_firmwareqca6430qcs6490_firmwaresnapdragon_8cx_compute_platform_\(sc8180x-aa\)wsa8815_firmwarevideo_collaboration_vc3_platform_firmwarewsa8810qca6420snapdragon_8cx_gen_2_5g_compute_platform_\(sc8180x-ac\)wcd9370_firmwaresnapdragon_8c_compute_platform_\(sc8180x-ad\)fastconnect_6800snapdragon_8cx_compute_platform_\(sc8180x-ab\)_firmwarefastconnect_6200_firmwarewsa8840_firmwarewsa8810_firmwarewcd9380_firmwarewsa8835_firmwaresnapdragon_7c_gen_2_compute_platform_\(sc7180-ad\)_\"rennell_pro\"_firmwarewcd9341snapdragon_8cx_compute_platform_\(sc8180xp-ac\)_firmwarewcd9370sm6250_firmwareaqt1000_firmwareqcm5430_firmwaresnapdragon_8cx_compute_platform_\(sc8180xp-af\)wcd9385snapdragon_8cx_gen_3_compute_platform_\(sc8280xp-bb\)_firmwarefastconnect_6800_firmwaresnapdragon_7c\+_gen_3_computewsa8840wcd9375_firmwaresc8180x\+sdx55wcd9385_firmwarewsa8815wcd9341_firmwaresnapdragon_8cx_compute_platform_\(sc8180xp-ac\)fastconnect_6700_firmwarefastconnect_7800snapdragon_8cx_gen_2_5g_compute_platform_\(sc8180xp-ab\)qcs5430snapdragon_8c_compute_platform_\(sc8180xp-ad\)_firmwarewsa8845hsc8380xpwcd9340qcm6490qcs5430_firmwarefastconnect_6900_firmwaresnapdragon_7c_gen_2_compute_platform_\(sc7180-ad\)_\"rennell_pro\"snapdragon_8cx_gen_2_5g_compute_platform_\(sc8180x-af\)_firmwarefastconnect_6700qca6430_firmwaresnapdragon_8c_compute_platform_\(sc8180x-ad\)_firmwarewsa8845fastconnect_6900qcs6490wcd9375video_collaboration_vc3_platformsnapdragon_8cx_compute_platform_\(sc8180xp-af\)_firmwaresc8380xp_firmwaresnapdragon_8cx_gen_2_5g_compute_platform_\(sc8180x-af\)wcd9340_firmwareqcm5430snapdragon_8cx_compute_platform_\(sc8180x-aa\)_firmwaresnapdragon_8cx_compute_platform_\(sc8180x-ab\)qca6391_firmwarewsa8830_firmwarewcd9380snapdragon_7c_compute_platform_\(sc7180-ac\)_firmwarefastconnect_6200qca6420_firmwaresnapdragon_8cx_gen_2_5g_compute_platform_\(sc8180xp-aa\)_firmwareSnapdragon
CWE ID-CWE-367
Time-of-check Time-of-use (TOCTOU) Race Condition
CVE-2024-27134
Matching Score-4
Assigner-JFrog
ShareView Details
Matching Score-4
Assigner-JFrog
CVSS Score-7||HIGH
EPSS-0.02% / 2.50%
||
7 Day CHG~0.00%
Published-25 Nov, 2024 | 13:48
Updated-03 Feb, 2025 | 15:05
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Excessive directory permissions in MLflow leads to local privilege escalation when using spark_udf

Excessive directory permissions in MLflow leads to local privilege escalation when using spark_udf. This behavior can be exploited by a local attacker to gain elevated permissions by using a ToCToU attack. The issue is only relevant when the spark_udf() MLflow API is called.

Action-Not Available
Vendor-lfprojectslfprojects
Product-mlflowmlflow
CWE ID-CWE-276
Incorrect Default Permissions
CWE ID-CWE-367
Time-of-check Time-of-use (TOCTOU) Race Condition
CVE-2020-3680
Matching Score-4
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-4
Assigner-Qualcomm, Inc.
CVSS Score-7||HIGH
EPSS-0.02% / 4.13%
||
7 Day CHG~0.00%
Published-02 Jun, 2020 | 15:05
Updated-04 Aug, 2024 | 07:44
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A race condition can occur when using the fastrpc memory mapping API. in Snapdragon Auto, Snapdragon Compute, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Wearables in APQ8009, APQ8053, MSM8909W, MSM8917, MSM8953, QCS605, QM215, SA415M, SDM429, SDM429W, SDM439, SDM450, SDM632, SDM670, SDM710, SDM845, SDX24, SXR1130

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-msm8953sdm450sdm429wsdm632_firmwaresdm845sdm450_firmwaresdm632sdx24sdm439sdm429sa415m_firmwaresdm710msm8909w_firmwareqm215sdm429w_firmwaresdm710_firmwareapq8009apq8009_firmwaremsm8917sdm670qcs605_firmwaresdm670_firmwaresdx24_firmwaresdm439_firmwaresa415mqm215_firmwareqcs605msm8953_firmwareapq8053msm8917_firmwaresdm429_firmwaresxr1130_firmwaresxr1130msm8909wapq8053_firmwaresdm845_firmwareSnapdragon Auto, Snapdragon Compute, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Wearables
CWE ID-CWE-367
Time-of-check Time-of-use (TOCTOU) Race Condition
CVE-2020-3619
Matching Score-4
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-4
Assigner-Qualcomm, Inc.
CVSS Score-7||HIGH
EPSS-0.03% / 6.30%
||
7 Day CHG~0.00%
Published-08 Sep, 2020 | 09:31
Updated-04 Aug, 2024 | 07:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

u'Non-secure memory is touched multiple times during TrustZone\u2019s execution and can lead to privilege escalation or memory corruption' in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wired Infrastructure and Networking in APQ8009, APQ8017, APQ8053, APQ8098, IPQ8074, Kamorta, MDM9150, MDM9206, MDM9607, MDM9650, MSM8905, MSM8909, MSM8917, MSM8920, MSM8937, MSM8940, MSM8953, MSM8998, QCA8081, QCS404, QCS605, QCS610, QM215, Rennell, SA415M, SC7180, SDA660, SDA845, SDM429, SDM439, SDM450, SDM630, SDM632, SDM636, SDM660, SDM670, SDM710, SDM845, SDM850, SDX24, SM6150, SM7150, SM8150, SXR1130

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-mdm9150_firmwarekamorta_firmwareqcs610sdm632_firmwaresdm845sdm450_firmwaresdm632sdx24sdm439qcs404_firmwaremdm9650sdm429msm8940_firmwaresm7150_firmwaresm6150sm7150apq8009_firmwaremsm8917sdm670qcs605_firmwaremdm9206sdm670_firmwareqcs404sdx24_firmwareipq8074sdm636sda845_firmwaresa415mapq8098mdm9206_firmwareqcs605msm8937_firmwaremdm9650_firmwaresdm429_firmwaremsm8905_firmwaresda660sxr1130_firmwareqca8081_firmwaresxr1130apq8009msm8909_firmwareapq8053_firmwaresda845sdm850_firmwaremsm8920msm8953sdm450sdm636_firmwareapq8098_firmwaremsm8998_firmwaresdm660msm8920_firmwaresdm630mdm9607_firmwaresa415m_firmwareipq8074_firmwaresdm710qm215sc7180_firmwaremdm9607apq8017_firmwaresdm710_firmwareqca8081qcs610_firmwaremsm8937mdm9150msm8905sm8150_firmwaremsm8909sdm439_firmwarerennellsc7180sdm630_firmwaresda660_firmwarerennell_firmwareqm215_firmwaremsm8953_firmwaremsm8940sm6150_firmwareapq8053msm8917_firmwaremsm8998sm8150sdm850kamortaapq8017sdm660_firmwaresdm845_firmwareSnapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wired Infrastructure and Networking
CWE ID-CWE-787
Out-of-bounds Write
CWE ID-CWE-367
Time-of-check Time-of-use (TOCTOU) Race Condition
CVE-2025-24036
Matching Score-4
Assigner-Microsoft Corporation
ShareView Details
Matching Score-4
Assigner-Microsoft Corporation
CVSS Score-7||HIGH
EPSS-0.05% / 15.39%
||
7 Day CHG~0.00%
Published-11 Feb, 2025 | 17:58
Updated-12 Mar, 2025 | 01:42
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Microsoft AutoUpdate (MAU) Elevation of Privilege Vulnerability

Microsoft AutoUpdate (MAU) Elevation of Privilege Vulnerability

Action-Not Available
Vendor-Microsoft Corporation
Product-autoupdateMicrosoft AutoUpdate for Mac
CWE ID-CWE-367
Time-of-check Time-of-use (TOCTOU) Race Condition
CVE-2025-22394
Matching Score-4
Assigner-Dell
ShareView Details
Matching Score-4
Assigner-Dell
CVSS Score-6.7||MEDIUM
EPSS-0.01% / 1.73%
||
7 Day CHG~0.00%
Published-15 Jan, 2025 | 04:41
Updated-04 Feb, 2025 | 15:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Dell Display Manager, versions prior to 2.3.2.18, contain a Time-of-check Time-of-use (TOCTOU) Race Condition vulnerability. A low privileged attacker with local access could potentially exploit this vulnerability, leading to code execution and possibly privilege escalation.

Action-Not Available
Vendor-Dell Inc.
Product-display_managerDell Display Manager
CWE ID-CWE-367
Time-of-check Time-of-use (TOCTOU) Race Condition
CVE-2025-21191
Matching Score-4
Assigner-Microsoft Corporation
ShareView Details
Matching Score-4
Assigner-Microsoft Corporation
CVSS Score-7||HIGH
EPSS-0.06% / 17.76%
||
7 Day CHG~0.00%
Published-08 Apr, 2025 | 17:23
Updated-07 Jul, 2025 | 18:57
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Windows Local Security Authority (LSA) Elevation of Privilege Vulnerability

Time-of-check time-of-use (toctou) race condition in Windows Local Security Authority (LSA) allows an authorized attacker to elevate privileges locally.

Action-Not Available
Vendor-Microsoft Corporation
Product-windows_11_24h2windows_server_2012windows_server_2025windows_11_23h2windows_10_21h2windows_server_2022windows_10_1607windows_server_2019windows_10_1507windows_server_2008windows_11_22h2windows_server_2016windows_server_2022_23h2windows_10_22h2windows_10_1809Windows 10 Version 1809Windows 11 Version 23H2Windows 11 Version 24H2Windows Server 2016 (Server Core installation)Windows Server 2019 (Server Core installation)Windows Server 2008 Service Pack 2Windows Server 2008 R2 Service Pack 1 (Server Core installation)Windows 10 Version 21H2Windows 11 version 22H2Windows 10 Version 22H2Windows 11 version 22H3Windows 10 Version 1507Windows Server 2012 (Server Core installation)Windows 10 Version 1607Windows Server 2016Windows Server 2025Windows Server 2012 R2Windows Server 2022Windows Server 2008 R2 Service Pack 1Windows Server 2012Windows Server 2025 (Server Core installation)Windows Server 2008 Service Pack 2Windows Server 2008 Service Pack 2 (Server Core installation)Windows Server 2022, 23H2 Edition (Server Core installation)Windows Server 2012 R2 (Server Core installation)Windows Server 2019
CWE ID-CWE-367
Time-of-check Time-of-use (TOCTOU) Race Condition
CVE-2020-25212
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-7||HIGH
EPSS-0.03% / 7.50%
||
7 Day CHG~0.00%
Published-09 Sep, 2020 | 15:52
Updated-04 Aug, 2024 | 15:33
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A TOCTOU mismatch in the NFS client code in the Linux kernel before 5.8.3 could be used by local attackers to corrupt memory or possibly have unspecified other impact because a size check is in fs/nfs/nfs4proc.c instead of fs/nfs/nfs4xdr.c, aka CID-b4487b935452.

Action-Not Available
Vendor-n/aLinux Kernel Organization, IncopenSUSEDebian GNU/LinuxCanonical Ltd.
Product-ubuntu_linuxdebian_linuxlinux_kernelleapn/a
CWE ID-CWE-787
Out-of-bounds Write
CWE ID-CWE-367
Time-of-check Time-of-use (TOCTOU) Race Condition
CVE-2025-23279
Matching Score-4
Assigner-NVIDIA Corporation
ShareView Details
Matching Score-4
Assigner-NVIDIA Corporation
CVSS Score-7||HIGH
EPSS-0.01% / 1.38%
||
7 Day CHG~0.00%
Published-02 Aug, 2025 | 22:06
Updated-05 Aug, 2025 | 03:56
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

NVIDIA .run Installer for Linux and Solaris contains a vulnerability where an attacker could use a race condition to escalate privileges. A successful exploit of this vulnerability might lead to code execution, escalation of privileges, information disclosure, denial of service, or data tampering.

Action-Not Available
Vendor-NVIDIA Corporation
Product-GPU Display Drivers
CWE ID-CWE-367
Time-of-check Time-of-use (TOCTOU) Race Condition
CVE-2020-2032
Matching Score-4
Assigner-Palo Alto Networks, Inc.
ShareView Details
Matching Score-4
Assigner-Palo Alto Networks, Inc.
CVSS Score-7||HIGH
EPSS-0.10% / 28.02%
||
7 Day CHG~0.00%
Published-10 Jun, 2020 | 17:29
Updated-17 Sep, 2024 | 02:27
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
GlobalProtect App: File race condition vulnerability leads to local privilege escalation during upgrade

A race condition vulnerability Palo Alto Networks GlobalProtect app on Windows allows a local limited Windows user to execute programs with SYSTEM privileges. This issue can be exploited only while performing a GlobalProtect app upgrade. This issue affects: GlobalProtect app 5.0 versions earlier than GlobalProtect app 5.0.10 on Windows; GlobalProtect app 5.1 versions earlier than GlobalProtect app 5.1.4 on Windows.

Action-Not Available
Vendor-Palo Alto Networks, Inc.
Product-globalprotectGlobalProtect App
CWE ID-CWE-367
Time-of-check Time-of-use (TOCTOU) Race Condition
CVE-2024-53032
Matching Score-4
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-4
Assigner-Qualcomm, Inc.
CVSS Score-7.8||HIGH
EPSS-0.01% / 1.73%
||
7 Day CHG~0.00%
Published-03 Mar, 2025 | 10:07
Updated-07 Mar, 2025 | 11:47
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Time-of-check Time-of-use (TOCTOU) Race Condition in Automotive OS Platform

Memory corruption may occur in keyboard virtual device due to guest VM interaction.

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-sa9000pqca6595au_firmwaresa8650p_firmwareqam8775psa8255pqamsrv1m_firmwareqca6595qca6688aq_firmwaresa8770psa8775psrv1h_firmwaresa8620p_firmwareqam8650p_firmwareqca6595_firmwaresrv1mqam8620psa8775p_firmwareqamsrv1msa9000p_firmwaresrv1hqca6574ausa7255psrv1m_firmwaresa8620psa7775psa8650pqam8620p_firmwaresa8540p_firmwaresa7255p_firmwareqam8775p_firmwareqam8295p_firmwareqam8255pqca6688aqqca6698aqsa7775p_firmwaresa8255p_firmwaresa8770p_firmwaresa8295p_firmwareqca6696_firmwareqam8295pqamsrv1hsrv1l_firmwareqca6574au_firmwareqamsrv1h_firmwareqca6595auqam8255p_firmwaresa8295psrv1lqca6698aq_firmwareqam8650pqca6696sa8540pSnapdragon
CWE ID-CWE-367
Time-of-check Time-of-use (TOCTOU) Race Condition
CVE-2024-50592
Matching Score-4
Assigner-SEC Consult Vulnerability Lab
ShareView Details
Matching Score-4
Assigner-SEC Consult Vulnerability Lab
CVSS Score-7||HIGH
EPSS-0.02% / 4.56%
||
7 Day CHG~0.00%
Published-08 Nov, 2024 | 12:15
Updated-08 Nov, 2024 | 19:01
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Local Privilege Escalation via Race Condition

An attacker with local access the to medical office computer can escalate his Windows user privileges to "NT AUTHORITY\SYSTEM" by exploiting a race condition in the Elefant Update Service during the repair or update process. When using the repair function, the service queries the server for a list of files and their hashes. In addition, instructions to execute binaries to finalize the repair process are included. The executables are executed as "NT AUTHORITY\SYSTEM" after they are copied over to the user writable installation folder (C:\Elefant1). This means that a user can overwrite either "PostESUUpdate.exe" or "Update_OpenJava.exe" in the time frame after the copy and before the execution of the final repair step. The overwritten executable is then executed as "NT AUTHORITY\SYSTEM".

Action-Not Available
Vendor-HASOMEDhasomed
Product-Elefant Software Updaterelefant_software_updater
CWE ID-CWE-367
Time-of-check Time-of-use (TOCTOU) Race Condition
CVE-2024-50234
Matching Score-4
Assigner-kernel.org
ShareView Details
Matching Score-4
Assigner-kernel.org
CVSS Score-7||HIGH
EPSS-0.04% / 12.01%
||
7 Day CHG~0.00%
Published-09 Nov, 2024 | 10:14
Updated-04 May, 2025 | 09:49
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
wifi: iwlegacy: Clear stale interrupts before resuming device

In the Linux kernel, the following vulnerability has been resolved: wifi: iwlegacy: Clear stale interrupts before resuming device iwl4965 fails upon resume from hibernation on my laptop. The reason seems to be a stale interrupt which isn't being cleared out before interrupts are enabled. We end up with a race beween the resume trying to bring things back up, and the restart work (queued form the interrupt handler) trying to bring things down. Eventually the whole thing blows up. Fix the problem by clearing out any stale interrupts before interrupts get enabled during resume. Here's a debug log of the indicent: [ 12.042589] ieee80211 phy0: il_isr ISR inta 0x00000080, enabled 0xaa00008b, fh 0x00000000 [ 12.042625] ieee80211 phy0: il4965_irq_tasklet inta 0x00000080, enabled 0x00000000, fh 0x00000000 [ 12.042651] iwl4965 0000:10:00.0: RF_KILL bit toggled to enable radio. [ 12.042653] iwl4965 0000:10:00.0: On demand firmware reload [ 12.042690] ieee80211 phy0: il4965_irq_tasklet End inta 0x00000000, enabled 0xaa00008b, fh 0x00000000, flags 0x00000282 [ 12.052207] ieee80211 phy0: il4965_mac_start enter [ 12.052212] ieee80211 phy0: il_prep_station Add STA to driver ID 31: ff:ff:ff:ff:ff:ff [ 12.052244] ieee80211 phy0: il4965_set_hw_ready hardware ready [ 12.052324] ieee80211 phy0: il_apm_init Init card's basic functions [ 12.052348] ieee80211 phy0: il_apm_init L1 Enabled; Disabling L0S [ 12.055727] ieee80211 phy0: il4965_load_bsm Begin load bsm [ 12.056140] ieee80211 phy0: il4965_verify_bsm Begin verify bsm [ 12.058642] ieee80211 phy0: il4965_verify_bsm BSM bootstrap uCode image OK [ 12.058721] ieee80211 phy0: il4965_load_bsm BSM write complete, poll 1 iterations [ 12.058734] ieee80211 phy0: __il4965_up iwl4965 is coming up [ 12.058737] ieee80211 phy0: il4965_mac_start Start UP work done. [ 12.058757] ieee80211 phy0: __il4965_down iwl4965 is going down [ 12.058761] ieee80211 phy0: il_scan_cancel_timeout Scan cancel timeout [ 12.058762] ieee80211 phy0: il_do_scan_abort Not performing scan to abort [ 12.058765] ieee80211 phy0: il_clear_ucode_stations Clearing ucode stations in driver [ 12.058767] ieee80211 phy0: il_clear_ucode_stations No active stations found to be cleared [ 12.058819] ieee80211 phy0: _il_apm_stop Stop card, put in low power state [ 12.058827] ieee80211 phy0: _il_apm_stop_master stop master [ 12.058864] ieee80211 phy0: il4965_clear_free_frames 0 frames on pre-allocated heap on clear. [ 12.058869] ieee80211 phy0: Hardware restart was requested [ 16.132299] iwl4965 0000:10:00.0: START_ALIVE timeout after 4000ms. [ 16.132303] ------------[ cut here ]------------ [ 16.132304] Hardware became unavailable upon resume. This could be a software issue prior to suspend or a hardware issue. [ 16.132338] WARNING: CPU: 0 PID: 181 at net/mac80211/util.c:1826 ieee80211_reconfig+0x8f/0x14b0 [mac80211] [ 16.132390] Modules linked in: ctr ccm sch_fq_codel xt_tcpudp xt_multiport xt_state iptable_filter iptable_nat nf_nat nf_conntrack nf_defrag_ipv4 ip_tables x_tables binfmt_misc joydev mousedev btusb btrtl btintel btbcm bluetooth ecdh_generic ecc iTCO_wdt i2c_dev iwl4965 iwlegacy coretemp snd_hda_codec_analog pcspkr psmouse mac80211 snd_hda_codec_generic libarc4 sdhci_pci cqhci sha256_generic sdhci libsha256 firewire_ohci snd_hda_intel snd_intel_dspcfg mmc_core snd_hda_codec snd_hwdep firewire_core led_class iosf_mbi snd_hda_core uhci_hcd lpc_ich crc_itu_t cfg80211 ehci_pci ehci_hcd snd_pcm usbcore mfd_core rfkill snd_timer snd usb_common soundcore video parport_pc parport intel_agp wmi intel_gtt backlight e1000e agpgart evdev [ 16.132456] CPU: 0 UID: 0 PID: 181 Comm: kworker/u8:6 Not tainted 6.11.0-cl+ #143 [ 16.132460] Hardware name: Hewlett-Packard HP Compaq 6910p/30BE, BIOS 68MCU Ver. F.19 07/06/2010 [ 16.132463] Workqueue: async async_run_entry_fn [ 16.132469] RIP: 0010:ieee80211_reconfig+0x8f/0x14b0 [mac80211] [ 16.132501] Code: da 02 00 0 ---truncated---

Action-Not Available
Vendor-Linux Kernel Organization, Inc
Product-linux_kernelLinux
CWE ID-CWE-367
Time-of-check Time-of-use (TOCTOU) Race Condition
CVE-2021-42835
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-7||HIGH
EPSS-16.91% / 94.70%
||
7 Day CHG~0.00%
Published-08 Dec, 2021 | 14:34
Updated-04 Aug, 2024 | 03:38
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An issue was discovered in Plex Media Server through 1.24.4.5081-e362dc1ee. An attacker (with a foothold in a endpoint via a low-privileged user account) can access the exposed RPC service of the update service component. This RPC functionality allows the attacker to interact with the RPC functionality and execute code from a path of his choice (local, or remote via SMB) because of a TOCTOU race condition. This code execution is in the context of the Plex update service (which runs as SYSTEM).

Action-Not Available
Vendor-plexn/aMicrosoft Corporation
Product-windowsmedia_servern/a
CWE ID-CWE-367
Time-of-check Time-of-use (TOCTOU) Race Condition
CVE-2020-15702
Matching Score-4
Assigner-Canonical Ltd.
ShareView Details
Matching Score-4
Assigner-Canonical Ltd.
CVSS Score-7||HIGH
EPSS-0.10% / 28.96%
||
7 Day CHG~0.00%
Published-06 Aug, 2020 | 22:50
Updated-16 Sep, 2024 | 17:28
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
TOCTOU in apport

TOCTOU Race Condition vulnerability in apport allows a local attacker to escalate privileges and execute arbitrary code. An attacker may exit the crashed process and exploit PID recycling to spawn a root process with the same PID as the crashed process, which can then be used to escalate privileges. Fixed in 2.20.1-0ubuntu2.24, 2.20.9 versions prior to 2.20.9-0ubuntu7.16 and 2.20.11 versions prior to 2.20.11-0ubuntu27.6. Was ZDI-CAN-11234.

Action-Not Available
Vendor-Canonical Ltd.
Product-apportubuntu_linuxapport
CWE ID-CWE-367
Time-of-check Time-of-use (TOCTOU) Race Condition
CVE-2024-45565
Matching Score-4
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-4
Assigner-Qualcomm, Inc.
CVSS Score-7.8||HIGH
EPSS-0.01% / 1.46%
||
7 Day CHG~0.00%
Published-06 May, 2025 | 08:31
Updated-09 May, 2025 | 19:17
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Time-of-check Time-of-use (TOCTOU) Race Condition in Camera Driver

Memory corruption when blob structure is modified by user-space after kernel verification.

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-snapdragon_429_mobile_firmwarewcn3620_firmwaresdm429wwcn3620sdm429w_firmwarewcn3660b_firmwaresnapdragon_429_mobilewcn3660bSnapdragon
CWE ID-CWE-367
Time-of-check Time-of-use (TOCTOU) Race Condition
CVE-2024-45560
Matching Score-4
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-4
Assigner-Qualcomm, Inc.
CVSS Score-7.8||HIGH
EPSS-0.01% / 1.73%
||
7 Day CHG~0.00%
Published-03 Feb, 2025 | 16:51
Updated-12 Feb, 2025 | 20:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Time-of-check Time-of-use (TOCTOU) Race Condition in Camera

Memory corruption while taking a snapshot with hardware encoder due to unvalidated userspace buffer.

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-fastconnect_7800_firmwarewsa8840qcm6490_firmwaresdm429wsc8380xp_firmwareqcs5430wsa8845h_firmwareqca6420wcn3620_firmwarewsa8845qcm6490wcd9380_firmwareqca6391_firmwaresc8180x-ad_firmwareqca6391qcs5430_firmwarewcn3660bsdm429w_firmwareqca6430wsa8845_firmwarevideo_collaboration_vc3_platform_firmwareqcm5430wcd9370wcd9340_firmwaresc8180x-acafsnapdragon_429_mobile_firmwarewsa8835wsa8845haqt1000_firmwarefastconnect_7800wcd9341_firmwarewcd9340wcd9341sc8280xp-abbbsc8180x-aaab_firmwarefastconnect_6900qcm5430_firmwarefastconnect_6800snapdragon_7c\+_gen_3_computesnapdragon_429_mobilefastconnect_6700wcd9375_firmwaresnapdragon_7c\+_gen_3_compute_firmwarewsa8810_firmwarewcd9385_firmwarewsa8810fastconnect_6700_firmwaresc8180x-adwcd9375sc8280xp-abbb_firmwaresc8180x-aaabqca6420_firmwarewsa8815fastconnect_6200_firmwareqca6430_firmwarewcd9380video_collaboration_vc3_platformwsa8830wsa8815_firmwarefastconnect_6200wsa8830_firmwarewcn3620fastconnect_6900_firmwareqcs6490qcs6490_firmwaresc8180x-acaf_firmwaresc8380xpaqt1000fastconnect_6800_firmwarewcd9385wsa8840_firmwarewcn3660b_firmwarewsa8835_firmwarewcd9370_firmwareSnapdragon
CWE ID-CWE-367
Time-of-check Time-of-use (TOCTOU) Race Condition
CVE-2024-43511
Matching Score-4
Assigner-Microsoft Corporation
ShareView Details
Matching Score-4
Assigner-Microsoft Corporation
CVSS Score-7||HIGH
EPSS-0.15% / 36.30%
||
7 Day CHG~0.00%
Published-08 Oct, 2024 | 17:35
Updated-08 Jul, 2025 | 15:39
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Windows Kernel Elevation of Privilege Vulnerability

Windows Kernel Elevation of Privilege Vulnerability

Action-Not Available
Vendor-Microsoft Corporation
Product-windows_10_21h2windows_10_1809windows_server_2016windows_server_2022_23h2windows_10_1507windows_11_21h2windows_11_24h2windows_10_22h2windows_server_2022windows_11_22h2windows_server_2019windows_10_1607windows_11_23h2Windows Server 2022Windows Server 2019 (Server Core installation)Windows 11 Version 24H2Windows 10 Version 1809Windows 10 Version 1507Windows 10 Version 1607Windows 10 Version 22H2Windows 11 version 22H3Windows 10 Version 21H2Windows Server 2019Windows 11 version 22H2Windows Server 2016Windows Server 2016 (Server Core installation)Windows 11 Version 23H2Windows 11 version 21H2Windows Server 2022, 23H2 Edition (Server Core installation)
CWE ID-CWE-367
Time-of-check Time-of-use (TOCTOU) Race Condition
CVE-2024-43882
Matching Score-4
Assigner-kernel.org
ShareView Details
Matching Score-4
Assigner-kernel.org
CVSS Score-8.4||HIGH
EPSS-0.06% / 20.06%
||
7 Day CHG~0.00%
Published-21 Aug, 2024 | 00:10
Updated-04 May, 2025 | 09:28
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
exec: Fix ToCToU between perm check and set-uid/gid usage

In the Linux kernel, the following vulnerability has been resolved: exec: Fix ToCToU between perm check and set-uid/gid usage When opening a file for exec via do_filp_open(), permission checking is done against the file's metadata at that moment, and on success, a file pointer is passed back. Much later in the execve() code path, the file metadata (specifically mode, uid, and gid) is used to determine if/how to set the uid and gid. However, those values may have changed since the permissions check, meaning the execution may gain unintended privileges. For example, if a file could change permissions from executable and not set-id: ---------x 1 root root 16048 Aug 7 13:16 target to set-id and non-executable: ---S------ 1 root root 16048 Aug 7 13:16 target it is possible to gain root privileges when execution should have been disallowed. While this race condition is rare in real-world scenarios, it has been observed (and proven exploitable) when package managers are updating the setuid bits of installed programs. Such files start with being world-executable but then are adjusted to be group-exec with a set-uid bit. For example, "chmod o-x,u+s target" makes "target" executable only by uid "root" and gid "cdrom", while also becoming setuid-root: -rwxr-xr-x 1 root cdrom 16048 Aug 7 13:16 target becomes: -rwsr-xr-- 1 root cdrom 16048 Aug 7 13:16 target But racing the chmod means users without group "cdrom" membership can get the permission to execute "target" just before the chmod, and when the chmod finishes, the exec reaches brpm_fill_uid(), and performs the setuid to root, violating the expressed authorization of "only cdrom group members can setuid to root". Re-check that we still have execute permissions in case the metadata has changed. It would be better to keep a copy from the perm-check time, but until we can do that refactoring, the least-bad option is to do a full inode_permission() call (under inode lock). It is understood that this is safe against dead-locks, but hardly optimal.

Action-Not Available
Vendor-Linux Kernel Organization, Inc
Product-linux_kernelLinux
CWE ID-CWE-367
Time-of-check Time-of-use (TOCTOU) Race Condition
CVE-2020-14418
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-7||HIGH
EPSS-0.06% / 19.90%
||
7 Day CHG~0.00%
Published-30 Jan, 2021 | 05:26
Updated-04 Aug, 2024 | 12:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A TOCTOU vulnerability exists in madCodeHook before 2020-07-16 that allows local attackers to elevate their privileges to SYSTEM. This occurs because path redirection can occur via vectors involving directory junctions.

Action-Not Available
Vendor-madshimorphisecn/aCisco Systems, Inc.
Product-advanced_malware_protectionunified_threat_prevention_platformmadcodehookn/a
CWE ID-CWE-367
Time-of-check Time-of-use (TOCTOU) Race Condition
CVE-2023-20135
Matching Score-4
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-4
Assigner-Cisco Systems, Inc.
CVSS Score-5.7||MEDIUM
EPSS-0.01% / 1.21%
||
7 Day CHG~0.00%
Published-13 Sep, 2023 | 16:38
Updated-23 Oct, 2024 | 19:41
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A vulnerability in Cisco IOS XR Software image verification checks could allow an authenticated, local attacker to execute arbitrary code on the underlying operating system. This vulnerability is due to a time-of-check, time-of-use (TOCTOU) race condition when an install query regarding an ISO image is performed during an install operation that uses an ISO image. An attacker could exploit this vulnerability by modifying an ISO image and then carrying out install requests in parallel. A successful exploit could allow the attacker to execute arbitrary code on an affected device.

Action-Not Available
Vendor-Cisco Systems, Inc.
Product-ios_xrCisco IOS XR Software
CWE ID-CWE-347
Improper Verification of Cryptographic Signature
CWE ID-CWE-367
Time-of-check Time-of-use (TOCTOU) Race Condition
CVE-2020-13162
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-7||HIGH
EPSS-0.35% / 56.55%
||
7 Day CHG~0.00%
Published-16 Jun, 2020 | 19:41
Updated-05 May, 2025 | 17:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A time-of-check time-of-use vulnerability in PulseSecureService.exe in Pulse Secure Client versions prior to 9.1.6 down to 5.3 R70 for Windows (which runs as NT AUTHORITY/SYSTEM) allows unprivileged users to run a Microsoft Installer executable with elevated privileges.

Action-Not Available
Vendor-n/aPulse Secure
Product-pulse_secure_desktop_clientpulse_secure_installer_servicen/a
CWE ID-CWE-367
Time-of-check Time-of-use (TOCTOU) Race Condition
CVE-2020-11298
Matching Score-4
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-4
Assigner-Qualcomm, Inc.
CVSS Score-7.8||HIGH
EPSS-0.02% / 3.36%
||
7 Day CHG~0.00%
Published-09 Jun, 2021 | 06:20
Updated-04 Aug, 2024 | 11:28
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

While waiting for a response to a callback or listener request, non-secure clients can change permissions to shared memory buffers used by HLOS Invoke Call to secure kernel in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wired Infrastructure and Networking

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-qca9377_firmwarewcn3991_firmwarewsa8830sd678sm6250p_firmwareqcs610qcs2290_firmwareqca8337qca6431_firmwaresd7c_firmwaremdm9628_firmwarewcd9360_firmwarecsra6620qcs4290wcn3950_firmwaresc8180x\+sdx55sd765g_firmwareqca6420_firmwareqca6595au_firmwareqcs2290qca6390_firmwaresd690_5gsd730_firmwarewcd9370csra6620_firmwareqcs605_firmwaresd_675_firmwaresd675_firmwarecsra6640_firmwareqcs6125_firmwareqca6426qca6584au_firmwarewcn3990_firmwareqca9984_firmwareqca9377sa415mwcn3998sd_8cx_firmwarewcd9371_firmwaresdxr2_5g_firmwarewcd9385_firmwaresm4125mdm9628sd720gmdm9206_firmwarewcd9326_firmwarewcn3950whs9410sd662sd710_firmwaresd460_firmwaresa8155qca6574au_firmwaresdx55_firmwareqca6595auwcd9375_firmwarewcn3998_firmwarewcn3999_firmwaresm7250p_firmwareqca6420qca6436_firmwarewcd9360qca6564au_firmwareqca6584ausa6155p_firmwareqca9367_firmwarewcd9306whs9410_firmwarewcn3999sa515m_firmwaresdxr2_5gqca9367qcs6125sa8155_firmwareqca4004_firmwaresd662_firmwaresa415m_firmwareqcs405qca6430wcn3988_firmwareqca6421sd712_firmwaresm6250wcd9306_firmwaresa8195psdm830_firmwarewcd9340wsa8810_firmwaresd765gsd765_firmwareqca6436wcd9326wcd9335sa6155pwcn6851qcs603_firmwareqcs4290_firmwarewcd9385wcd9341qca6431qca6696_firmwarewcd9371sd750gsd870_firmwarear8035qca6390sd_8cxaqt1000sd750g_firmwarewcd9375sc8180x\+sdx55_firmwaresm6250_firmwarewcn3910_firmwareqca4004wsa8830_firmwaresd855_firmwaresd865_5g_firmwaresd712sd888_5g_firmwarewcn3988wcn6850_firmwarewsa8815_firmwarewsa8835_firmwaresa8195p_firmwareqca6564awcn6750_firmwareqcm6125_firmwareqcm2290_firmwarewcn3991qca8337_firmwarewcd9380_firmwarewcn3990sd_675wcd9330sd865_5gqca6595qca6564ausdx24sdx55m_firmwaresd670_firmwarewsa8835sd665_firmwarewcd9380sd888_5gsm6250pqcs410qca6574asd690_5g_firmwaresdx50m_firmwaremdm9206sdx24_firmwareqca6430_firmwarewcd9335_firmwarewcn3980wcn6750mdm9205sa515mqcs605wcd9340_firmwaresd855sm4125_firmwarewcn6850sd665sd7cwcn3910wsa8815sd_8c_firmwaresd765qca6426_firmwareqca6574a_firmwareqca9984sd768g_firmwarewcn3980_firmwaresd460qca6391sd730sdx55msdxr1_firmwarewcd9330_firmwareqca6421_firmwareaqt1000_firmwaresd678_firmwarear8031_firmwareqcm4290sdx50msd480_firmwareqcs603wcn6851_firmwareqca6574ausa8155p_firmwaresd710sd670qca6564a_firmwarewcd9341_firmwareqcm6125qcm4290_firmwaresd480sd870wsa8810qcs610_firmwareqsm8250sd_8csdxr1sd768gar8031qca6595_firmwareqcs405_firmwareqca6696mdm9205_firmwareqca6391_firmwarewcd9370_firmwaresdx55sa8155pcsra6640sd675sm7250psdm830sd720g_firmwareqcs410_firmwarear8035_firmwareqcm2290qsm8250_firmwareSnapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wired Infrastructure and Networking
CWE ID-CWE-367
Time-of-check Time-of-use (TOCTOU) Race Condition
CVE-2023-1295
Matching Score-4
Assigner-Google LLC
ShareView Details
Matching Score-4
Assigner-Google LLC
CVSS Score-7.8||HIGH
EPSS-0.02% / 3.65%
||
7 Day CHG~0.00%
Published-28 Jun, 2023 | 11:08
Updated-13 Feb, 2025 | 16:39
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Privilege escalation with IO_RING_OP_CLOSE in the Linux Kernel

A time-of-check to time-of-use issue exists in io_uring subsystem's IORING_OP_CLOSE operation in the Linux kernel's versions 5.6 - 5.11 (inclusive), which allows a local user to elevate their privileges to root. Introduced in b5dba59e0cf7e2cc4d3b3b1ac5fe81ddf21959eb, patched in 9eac1904d3364254d622bf2c771c4f85cd435fc2, backported to stable in 788d0824269bef539fe31a785b1517882eafed93.

Action-Not Available
Vendor-Linux Kernel Organization, IncNetApp, Inc.
Product-linux_kernelh500sh410sh410ch300sh700sLinux Kernel
CWE ID-CWE-367
Time-of-check Time-of-use (TOCTOU) Race Condition
CVE-2020-11233
Matching Score-4
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-4
Assigner-Qualcomm, Inc.
CVSS Score-7||HIGH
EPSS-0.03% / 5.30%
||
7 Day CHG~0.00%
Published-09 Jun, 2021 | 05:00
Updated-04 Aug, 2024 | 11:28
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Time-of-check time-of-use race condition While processing partition entries due to newly created buffer was read again from mmc without validation in Snapdragon Auto, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-qfe3100qca9377_firmwarepm8909qfe1040qfe2550mdm9640_firmwarepm660pmd9607_firmwarepmi8996pmi632qfe1040_firmwareqfe1045mdm9628_firmwareqfe2340_firmwaremdm9650qln1030smb1360_firmwarepmk8001qfe2340mdm9250smb1358_firmwarepmd9635_firmwareapq8009_firmwareqca6174_firmwareqcc1110_firmwareapq8076wtr3905wtr5975_firmwareapq8076_firmwareqca9377pmi632_firmwaresdw2500_firmwarewcd9326_firmwaremdm9628wcn3615_firmwaremdm9206_firmwareqsw8573_firmwarergr7640au_firmwarewtr2955wcn3660bwgr7640_firmwareqln1021aqqcc112qca4020mdm9230_firmwarepm8953_firmwareqca6574au_firmwareqca6584mdm9630qln1031_firmwarewcn3615wcn3680b_firmwaremsm8909wapq8009w_firmwarewcn3610_firmwareapq8053_firmwaresdx20mqca6564au_firmwarewcd9306qca9367_firmwarepm8937pm660_firmwarepm8996qca9367mdm9607_firmwaremdm9655_firmwareqcc1110smb1360sd205wcd9306_firmwareapq8017_firmwarewsa8810_firmwarepm8953qualcomm215_firmwaresmb231pm439_firmwareqca4020_firmwarewcd9326wcd9335qet4200aqqfe1045_firmwaremsm8937qfe3345pm8004_firmwareqca6174a_firmwaremdm9250_firmwaresmb1358pm439pmi8952mdm9655pm8937_firmwareqet4100_firmwaresmb1350qfe2550_firmwarepm8952_firmwaremdm9330_firmwaresd210wcn3620_firmwaresd820sdx20_firmwarewsa8815_firmwarepmi8937wcn3620sdw3100wtr3925_firmwarewtr3925sdw3100_firmwareapq8017qcc112_firmwarecsr6030_firmwareqca6564amdm9630_firmwareqet4100wcn3610mdm9640pmi8952_firmwareqfe3335_firmwaresmb1355wcd9330msm8996au_firmwarewtr2955_firmwarewgr7640csr6030qca6564aupmi8994_firmwarepmm8996au_firmwareqet4101_firmwaremsm8909w_firmwaremsm8996aupmk8001_firmwareqfe1035pmm8996ausmb1355_firmwaresmb1351_firmwarepmd9655_firmwarergr7640aumdm9230qualcomm215pm8996_firmwareqet4200aq_firmwarepm8909_firmwareqca6574amdm9206pm8916_firmwareqca9379_firmwareqca6174aqfe3100_firmwaresmb358s_firmwaresmb358swtr4905wtr5975qca6174wcd9335_firmwareqtc801s_firmwaresd439_firmwarepmd9645pm8956_firmwareqsw8573qfe3335qln1036aq_firmwarewsa8815qca6584_firmwaremsm8937_firmwaremdm9650_firmwarewcn3660b_firmwarewcn3680pmx20pmd9607qca6574a_firmwareapq8009qfe3320_firmwaresmb1351smb1357_firmwarewcd9330_firmwarewtr3905_firmwarepm215_firmwaremdm9626wtr2965_firmwareqfe1035_firmwarewcn3680_firmwaresdx20qln1021aq_firmwarepm8916qln1036aqqtc801spmd9635mdm9626_firmwarepmd9655qca6574auqfe3320mdm9607sd205_firmwareqca6564a_firmwareapq8009wpmd9645_firmwaresdx20m_firmwarewsa8810smb231_firmwarewtr4905_firmwaresd210_firmwareqfe3345_firmwarewcn3680bpm215apq8096auqln1030_firmwaresmb1350_firmwarewtr2965sd820_firmwarepmi8996_firmwarepmx20_firmwarepmi8937_firmwarepm8004sdw2500apq8053apq8096au_firmwaresd439qet4101pm8952pmi8994smb1357mdm9330qca9379pm8956qln1031Snapdragon Auto, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables
CWE ID-CWE-367
Time-of-check Time-of-use (TOCTOU) Race Condition
CVE-2020-0238
Matching Score-4
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
ShareView Details
Matching Score-4
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
CVSS Score-7||HIGH
EPSS-0.01% / 0.30%
||
7 Day CHG~0.00%
Published-11 Aug, 2020 | 19:26
Updated-04 Aug, 2024 | 05:55
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In updatePreferenceIntents of AccountTypePreferenceLoader, there is a possible confused deputy attack due to a race condition. This could lead to local escalation of privilege and launching privileged activities with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-8.1 Android-9 Android-10 Android-8.0Android ID: A-150946634

Action-Not Available
Vendor-n/aGoogle LLC
Product-androidAndroid
CWE ID-CWE-367
Time-of-check Time-of-use (TOCTOU) Race Condition
CVE-2019-7307
Matching Score-4
Assigner-Canonical Ltd.
ShareView Details
Matching Score-4
Assigner-Canonical Ltd.
CVSS Score-6.5||MEDIUM
EPSS-0.04% / 9.75%
||
7 Day CHG~0.00%
Published-29 Aug, 2019 | 14:40
Updated-16 Sep, 2024 | 23:56
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Apport contains a TOCTTOU vulnerability when reading the users ~/.apport-ignore.xml

Apport before versions 2.14.1-0ubuntu3.29+esm1, 2.20.1-0ubuntu2.19, 2.20.9-0ubuntu7.7, 2.20.10-0ubuntu27.1, 2.20.11-0ubuntu5 contained a TOCTTOU vulnerability when reading the users ~/.apport-ignore.xml file, which allows a local attacker to replace this file with a symlink to any other file on the system and so cause Apport to include the contents of this other file in the resulting crash report. The crash report could then be read by that user either by causing it to be uploaded and reported to Launchpad, or by leveraging some other vulnerability to read the resulting crash report, and so allow the user to read arbitrary files on the system.

Action-Not Available
Vendor-apport_projectCanonical Ltd.Ubuntu
Product-apportubuntu_linuxapport
CWE ID-CWE-367
Time-of-check Time-of-use (TOCTOU) Race Condition
CVE-2022-48618
Matching Score-4
Assigner-Apple Inc.
ShareView Details
Matching Score-4
Assigner-Apple Inc.
CVSS Score-7||HIGH
EPSS-0.18% / 39.85%
||
7 Day CHG~0.00%
Published-09 Jan, 2024 | 17:58
Updated-30 Jul, 2025 | 01:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Known KEV||Action Due Date - 2024-02-21||Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.

The issue was addressed with improved checks. This issue is fixed in macOS Ventura 13.1, watchOS 9.2, iOS 16.2 and iPadOS 16.2, tvOS 16.2. An attacker with arbitrary read and write capability may be able to bypass Pointer Authentication. Apple is aware of a report that this issue may have been exploited against versions of iOS released before iOS 15.7.1.

Action-Not Available
Vendor-Apple Inc.
Product-ipadoswatchostvosiphone_osmacostvOSwatchOSiOS and iPadOSmacOSwatchosiphone_osmacosipadostvosMultiple Products
CWE ID-CWE-367
Time-of-check Time-of-use (TOCTOU) Race Condition
CVE-2025-46328
Matching Score-4
Assigner-GitHub, Inc.
ShareView Details
Matching Score-4
Assigner-GitHub, Inc.
CVSS Score-3.3||LOW
EPSS-0.01% / 0.21%
||
7 Day CHG~0.00%
Published-28 Apr, 2025 | 22:33
Updated-09 May, 2025 | 19:38
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
NodeJS Driver for Snowflake has race condition when checking access to Easy Logging configuration file

snowflake-connector-nodejs is a NodeJS driver for Snowflake. Versions starting from 1.10.0 to before 2.0.4, are vulnerable to a Time-of-Check to Time-of-Use (TOCTOU) race condition. When using the Easy Logging feature on Linux and macOS the Driver reads logging configuration from a user-provided file. On Linux and macOS the Driver verifies that the configuration file can be written to only by its owner. That check was vulnerable to a TOCTOU race condition and failed to verify that the file owner matches the user running the Driver. This could allow a local attacker with write access to the configuration file or the directory containing it to overwrite the configuration and gain control over logging level and output location. This issue has been patched in version 2.0.4.

Action-Not Available
Vendor-snowflakesnowflakedb
Product-snowflake_connectorsnowflake-connector-nodejs
CWE ID-CWE-367
Time-of-check Time-of-use (TOCTOU) Race Condition
CVE-2022-48191
Matching Score-4
Assigner-Trend Micro, Inc.
ShareView Details
Matching Score-4
Assigner-Trend Micro, Inc.
CVSS Score-7||HIGH
EPSS-0.05% / 16.42%
||
7 Day CHG~0.00%
Published-18 Jan, 2023 | 23:07
Updated-03 Apr, 2025 | 20:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A vulnerability exists in Trend Micro Maximum Security 2022 (17.7) wherein a low-privileged user can write a known malicious executable to a specific location and in the process of removal and restoral an attacker could replace an original folder with a mount point to an arbitrary location, allowing a escalation of privileges on an affected system.

Action-Not Available
Vendor-Microsoft CorporationTrend Micro Incorporated
Product-maximum_security_2022windowsTrend Micro Maxium Security (Consumer)
CWE ID-CWE-367
Time-of-check Time-of-use (TOCTOU) Race Condition
CVE-2022-33214
Matching Score-4
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-4
Assigner-Qualcomm, Inc.
CVSS Score-8.4||HIGH
EPSS-0.06% / 17.14%
||
7 Day CHG~0.00%
Published-17 Oct, 2022 | 00:00
Updated-14 May, 2025 | 15:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Memory corruption in display due to time-of-check time-of-use of metadata reserved size in Snapdragon Auto, Snapdragon Compute, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Wearables

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-sm4375wcn6855_firmwareqca6391_firmwareqcs4290sd888_5g_firmwareqca6574_firmwaresdx50m_firmwaresw5100_firmwareqca6430sa8155wcn7850_firmwarewcd9375_firmwaresd855_firmwaresm4125qcm4290_firmwaresd680_firmwareqca6574au_firmwarewcn3990wsa8835_firmwareqca6696_firmwareqcs2290qcs410sa6145pwcn6855qam8295pwsa8830qca6696sm8475sd778g_firmwaresm7325pwcn3910sa6155pqca6420sm4375_firmwarewcn3998_firmwarewcn6750_firmwaresdx55qca6390_firmwaresm7250pqcn7606wcn6740_firmwaresd765sdx55_firmwaresd750g_firmwareqca6574a_firmwarewcd9385_firmwaresa8195p_firmwarewcn3950_firmwarewsa8815_firmwaresd439qcm6490sd678qcs410_firmwaresd660_firmwaresd660qcs6125sa4155psa6145p_firmwarewcd9335qca6430_firmwaresd675_firmwareqcs2290_firmwareaqt1000qca6391wcd9370_firmwaresa8295pwcn3991_firmwaresa8295p_firmwaresd662wsa8835sa8195psm7250p_firmwarewcn6851_firmwaresd768g_firmwarewcn3980_firmwaresd480_firmwaresm7315_firmwareqca6574aqcs610wcn6750qca6595auwcn3615_firmwarewcn6851sd690_5gqcs6490_firmwaresa4150psd865_5gwcn6850_firmwaresd865_5g_firmwarewcn3660b_firmwarewsa8830_firmwarewcd9341wcn3660bwcn3991sd460wcn3998qca6574ausd888_firmwaresm7315wcn3990_firmwarewcn6856_firmwaresdx55mqcm2290_firmwareqcm6125_firmwarewcd9341_firmwarewcn3615qca6420_firmwaresd_675sa4150p_firmwarewcd9335_firmwarewsa8815sd750gwcd9326sw5100p_firmwaresda429wwcn6856wcn6740wcn7850sd690_5g_firmwaresda429w_firmwaresd_8_gen1_5g_firmwaresd460_firmwarewcd9380wcn3988qcm6125sa8155p_firmwaresd780g_firmwaresd870_firmwarewcd9326_firmwarewcn3988_firmwareqca6574sd870sd765_firmwarewcn7851_firmwaresa6150p_firmwareqcs6490sd778gqam8295p_firmwaresw5100sd680sd_675_firmwareqcs6125_firmwaresd768gwcn3610_firmwarewcn3680bwcn6850wsa8810sd855qcs4290_firmwaresa8145psd439_firmwareqcc5100_firmwarewcd9380_firmwaresd678_firmwaresa8145p_firmwaresd888_5gsa8155_firmwaresd662_firmwaresd720g_firmwaresd780gsd480sm6250qca6390wcn3910_firmwaresd695qcm4290sa6155sa6150pqca6595au_firmwaresm4125_firmwarewcn3610qcm2290sd695_firmwareqcm6490_firmwarewsa8810_firmwaresd730_firmwaresdx55m_firmwaresm6250_firmwarewcd9375wcd9370sa8150p_firmwarewcn7851qcn7606_firmwarewcd9385sa6155p_firmwaresa8150psd765gwcn3950sw5100psd730sa6155_firmwareaqt1000_firmwaresd888sd720gsdx50msd675wcn3680b_firmwarewcn3980sm7325p_firmwareqcc5100sa8155pqcs610_firmwaresd765g_firmwaresa4155p_firmwareSnapdragon Auto, Snapdragon Compute, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Wearables
CWE ID-CWE-367
Time-of-check Time-of-use (TOCTOU) Race Condition
CVE-2022-33257
Matching Score-4
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-4
Assigner-Qualcomm, Inc.
CVSS Score-9.3||CRITICAL
EPSS-0.04% / 11.86%
||
7 Day CHG~0.00%
Published-07 Mar, 2023 | 04:43
Updated-03 Aug, 2024 | 08:01
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Time-of-check time-of-use race condition in Core

Memory corruption in Core due to time-of-check time-of-use race condition during dump collection in trust zone.

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-qca9377_firmwaresd_8cx_gen3_firmwareqca8337qca6431_firmwaresdx65wcn3950_firmwaresa8150p_firmwareqcs2290qca6595au_firmwaresa6155qca6335csra6620_firmwareqcs605_firmwaresd_675_firmwarecsra6640_firmwarewcn3998qam8295psd_8cx_gen2_firmwareqcn6024_firmwaresm4125wcn3950sd_8_gen1_5g_firmwareqsm8350_firmwareqsm8350sd460_firmwaresm7315_firmwarewcn7850qca6574au_firmwarewcd9375_firmwareqca8081_firmwaresa6155_firmwarewcn3998_firmwareqca6420sd680_firmwarewcn3999sd_8cx_gen2qrb5165_firmwareqrb5165m_firmwareqca6698aqsa8155_firmwareqca4004_firmwaresd662_firmwareqcs405qca6430wcd9306_firmwarewcd9340sd765gsw5100qca6436sd680wcn6851sa6155pqcs603_firmwarewcn7851_firmwareqca6698aq_firmwarewcd9341qca6431qca6696_firmwaresd750gsd870_firmwarewcn3910_firmwaresxr2150p_firmwaresd_8cxsa8150pqca4004wsa8830_firmwaresd855_firmwaresd865_5g_firmwaresnapdragon_4_gen_1wcn3988wcn7850_firmwaresm8475qcn7606_firmwaresa8295p_firmwarewcn6750_firmwarewcn3991qca8337_firmwarewcd9380_firmwaressg2125psw5100pqca6564ausdx55m_firmwarewcn6856_firmwaresd670_firmwareqca6574wcd9380sd690_5g_firmwaresdx50m_firmwaresxr1230psdx24_firmwareqca6430_firmwareqcn9012_firmwarewcd9335_firmwarewcn3980qca6335_firmwareqcm4325_firmwareqcs605wcd9340_firmwarewsa8815wcn6850wcn3910qca6426_firmwareqca9984sd695qcn9024wcn3980_firmwaresdx55mqcc5100_firmwareqca6421_firmwaresa8295pwcn6740_firmwaresd678_firmwarear8031_firmwareqrb5165wcn6851_firmwareqcs603sd670qca6564a_firmwareqcn9024_firmwaresdx57mqcm4290_firmwaresd480sd870wcn6855wsa8832sa8540psw5100p_firmwareqsm8250sa6145psd695_firmwarear8031qca6595_firmwareqcs405_firmwaremdm9205_firmwareqca6391_firmwaresd780g_firmwarewcd9370_firmwaresdx55sd888_firmwaresa8155pcsra6640sd675sdx70mssg2115p_firmwaresxr2150par8035_firmwareqsm8250_firmwareqcm2290qcn7606wcn3991_firmwarewsa8830sd678qcs2290_firmwaresnapdragon_4_gen_1_firmwarecsra6620qcs4290sd765g_firmwareqca6420_firmwareqca6390_firmwaresd690_5gwcd9370sd675_firmwaressg2115pqca6426wcn3990_firmwareqrb5165n_firmwareqca9984_firmwareqca9377sd_8cx_firmwarewcd9385_firmwaresdxr2_5g_firmwarewcd9326_firmwaresd662qam8295p_firmwareqcn9011_firmwaresa8155sa9000p_firmwaresdx55_firmwareqca6595auwcn3999_firmwaresm7250p_firmwareqca6436_firmwareqrb5165nqca6564au_firmwaresd778gsa6155p_firmwareqca6310wcd9306wcn7851qcs6490sdxr2_5gwcn3988_firmwaresa6145p_firmwareqca6421sd778g_firmwarewsa8810_firmwaresd765_firmwarewcd9326wcd9335sg4150pqca8081qca6174a_firmwareqcs4290_firmwarewcd9385qcs6490_firmwaresd_8cx_gen3sdx70m_firmwarear8035qca6390sd750g_firmwareaqt1000wcd9375qcm6490sd888_5g_firmwarewcn6850_firmwarewsa8815_firmwarewsa8835_firmwareqca6564asg4150p_firmwareqcm4325qcm2290_firmwarewcn3990sd_675sd780gsd865_5gqca6595qcc5100sdx24qcn9012sd888wsa8835sxr1230p_firmwaresd665_firmwaresa8540p_firmwaresd888_5gssg2125p_firmwareqca6574awcn6855_firmwareqca6174asm7325pqca6310_firmwarewcn6750mdm9205sa9000pqca6574_firmwaresd855sm4125_firmwaresm7325p_firmwaresd665sdx57m_firmwaresd765qca6574a_firmwaresd768g_firmwareqrb5165msd850_firmwaresm7315sd460qca6391aqt1000_firmwaresdx65_firmwareqcm4290qcm6490_firmwaresdx50mwsa8832_firmwaresd480_firmwareqcn9011qca6574ausa8155p_firmwarewcd9341_firmwarewsa8810wcn6856sd768gwcn6740qca6696sd845_firmwareqcn6024sd845sm7250psw5100_firmwaresd850Snapdragonqca9377_firmwaresd_8cx_gen3_firmwarewcn3991_firmwareqcs2290_firmwareqca6431_firmwaresnapdragon_4_gen_1_firmwarewcn3950_firmwaresa8150p_firmwaresd765g_firmwareqca6420_firmwareqca6595au_firmwareqca6390_firmwarecsra6620_firmwareqcs605_firmwaresd_675_firmwaresd675_firmwarecsra6640_firmwarewcn3990_firmwareqrb5165n_firmwareqca9984_firmwaresd_8cx_firmwarewcd9385_firmwaresdxr2_5g_firmwaresd_8cx_gen2_firmwareqcn6024_firmwarewcd9326_firmwaresd_8_gen1_5g_firmwareqsm8350_firmwaresd460_firmwareqam8295p_firmwareqcn9011_firmwaresa9000p_firmwaresm7315_firmwareqca6574au_firmwaresdx55_firmwarewcd9375_firmwareqca8081_firmwaresa6155_firmwarewcn3998_firmwaresm7250p_firmwarewcn3999_firmwareqca6436_firmwareqca6564au_firmwaresd680_firmwaresa6155p_firmwareqrb5165_firmwareqrb5165m_firmwaresa8155_firmwareqca4004_firmwaresd662_firmwarewcn3988_firmwaresa6145p_firmwarewcd9306_firmwaresd778g_firmwarewsa8810_firmwaresd765_firmwareqcs603_firmwarewcn7851_firmwareqca6698aq_firmwareqca6174a_firmwareqcs4290_firmwareqca6696_firmwareqcs6490_firmwaresd870_firmwaresdx70m_firmwarewcn3910_firmwaresxr2150p_firmwaresd750g_firmwarewsa8830_firmwaresd855_firmwaresd865_5g_firmwarewsa8815_firmwaresd888_5g_firmwarewcn6850_firmwarewcn7850_firmwarewsa8835_firmwaresa8295p_firmwareqcn7606_firmwarewcn6750_firmwaresg4150p_firmwareqcm2290_firmwareqca8337_firmwarewcd9380_firmwaresdx55m_firmwarewcn6856_firmwaresd670_firmwaresxr1230p_firmwaresd665_firmwaresa8540p_firmwaressg2125p_firmwaresd690_5g_firmwaresdx50m_firmwarewcn6855_firmwaresdx24_firmwareqca6310_firmwareqca6430_firmwareqcn9012_firmwarewcd9335_firmwareqca6335_firmwareqcm4325_firmwareqca6574_firmwarewcd9340_firmwaresm4125_firmwaresm7325p_firmwaresdx57m_firmwareqca6426_firmwareqca6574a_firmwaresd768g_firmwaresd850_firmwarewcn3980_firmwareqcc5100_firmwareqca6421_firmwareaqt1000_firmwarewcn6740_firmwaresdx65_firmwaresd678_firmwarear8031_firmwareqcm6490_firmwarewsa8832_firmwaresd480_firmwarewcn6851_firmwaresa8155p_firmwareqca6564a_firmwareqcn9024_firmwarewcd9341_firmwareqcm4290_firmwaresw5100p_firmwaresd695_firmwareqca6595_firmwareqcs405_firmwaremdm9205_firmwareqca6391_firmwaresd845_firmwaresd780g_firmwarewcd9370_firmwaresd888_firmwaressg2115p_firmwaresw5100_firmwarear8035_firmwareqsm8250_firmware
CWE ID-CWE-367
Time-of-check Time-of-use (TOCTOU) Race Condition
CVE-2022-34398
Matching Score-4
Assigner-Dell
ShareView Details
Matching Score-4
Assigner-Dell
CVSS Score-7.5||HIGH
EPSS-0.04% / 10.02%
||
7 Day CHG~0.00%
Published-01 Feb, 2023 | 05:28
Updated-26 Mar, 2025 | 18:53
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Dell BIOS contains a Time-of-check Time-of-use vulnerability. A local authenticated malicious user could\u00a0potentially exploit this vulnerability by using a specifically timed DMA transaction during an SMI to gain arbitrary code execution on the system.

Action-Not Available
Vendor-Dell Inc.
Product-optiplex_7760_all-in-one_firmwarelatitude_5401optiplex_7770_all-in-oneinspiron_3470latitude_e7270precision_3541_firmwarealienware_m15_r1alienware_x15_r2vostro_3669inspiron_5680vostro_3881_firmwarelatitude_7200_2-in-1inspiron_5477_firmwarelatitude_5511_firmwarelatitude_7380_firmwareprecision_3550vostro_3888inspiron_5490_all-in-one_firmwaredell_g3_15_3590inspiron_5570latitude_7370vostro_3888_firmwarelatitude_7370_firmwareoptiplex_5070_firmwarealienware_aurora_r13precision_7540latitude_3390_2-in-1latitude_3310_2-in-1wyse_5070latitude_5490alienware_area_51m_r1_firmwarelatitude_5590optiplex_5080latitude_5511latitude_7390_2-in-1latitude_7214_rugged_extreme_firmwareprecision_5530_2-in-1alienware_m17_r2vostro_3070_firmwarelatitude_3190_2-in-1optiplex_7071alienware_x14_firmwarealienware_m15_r1_firmwaredell_g5_5000_firmwareinspiron_3583alienware_m17_r3_firmwarelatitude_5300precision_7720edge_gateway_5000vostro_3481alienware_x14latitude_9410_firmwarevostro_7590precision_5530_firmwarelatitude_e7270_firmwarelatitude_5280_firmwarelatitude_3180latitude_5300_2-in-1latitude_7424_rugged_extreme_firmwareoptiplex_5050optiplex_3070_firmwarealienware_aurora_r11latitude_7410_firmwarevostro_3667latitude_7300alienware_x15_r2_firmwarelatitude_e7470_firmwareprecision_3620_toweroptiplex_5260_all-in-oneprecision_7720_firmwarelatitude_5310_2-in-1precision_3431_toweroptiplex_3060_firmwareinspiron_3780inspiron_3782latitude_3590_firmwarelatitude_7490_firmwarealienware_m15_r2latitude_7390_firmwarelatitude_5500_firmwareprecision_7710latitude_5410_firmwareprecision_5520vostro_5090_firmwarelatitude_5310_2-in-1_firmwarexps_8950latitude_7400latitude_5591optiplex_5270_all-in-one_firmwareinspiron_3502_firmwareprecision_3520dell_g3_3579inspiron_3471inspiron_3880_firmwareoptiplex_5050_firmwareprecision_7520_firmwareoptiplex_7071_firmwareoptiplex_3050precision_7820_tower_firmwareoptiplex_5080_firmwareoptiplex_7460_all-in-onevostro_3471optiplex_5070dell_latitude_3480_firmwareinspiron_3480_firmwarealienware_m15_r3optiplex_5060_firmwareoptiplex_3050_all-in-one_firmwarexps_15_9575_2-in-1optiplex_3090_firmwarevostro_3581_firmwareprecision_7530_firmwarealienware_m17_r4_firmwarealienware_x17_r1vostro_3581latitude_9410inspiron_7777optiplex_7070optiplex_7080_firmwarevostro_3583_firmwarelatitude_5420_rugged_firmwareinspiron_3521latitude_3190_firmwarelatitude_5310aurora_r14_firmwareinspiron_5490_all-in-oneoptiplex_7460_all-in-one_firmwareinspiron_5401_all-in-one_firmwaredell_g3_3779_firmwarelatitude_5420_ruggedvostro_3268_firmwarealienware_aurora_r8latitude_7220_rugged_extreme_tabletlatitude_5500alienware_x15_r1precision_7550_firmwarelatitude_7390_2-in-1_firmwareinspiron_5400latitude_7480_firmwareinspiron_5477chengming_3991latitude_5288_firmwarevostro_5090inspiron_5480latitude_3190inspiron_3510_firmwarelatitude_7220ex_rugged_extreme_tablet_firmwarealienware_aurora_r8_firmwarexps_8950_firmwareinspiron_3881_firmwarelatitude_5488latitude_5290_2-in-1_firmwareinspiron_3471_firmwarevostro_3669_firmwarelatitude_7380optiplex_5480_all-in-one_firmwareprecision_3540alienware_aurora_r11_firmwarealienware_x17_r2_firmwarelatitude_5501latitude_7400_firmwareprecision_7710_firmwareinspiron_3580_firmwarelatitude_3590inspiron_3781_firmwarewyse_5070_firmwareprecision_5720_all-in-onechengming_3990vostro_3670_firmwarelatitude_7214_rugged_extremeinspiron_3510inspiron_3280_firmwarelatitude_3310latitude_7414_rugged_extreme_firmwarelatitude_5290_2-in-1precision_7520vostro_3583alienware_x17_r2wyse_5470_all-in-one_firmwarelatitude_5491_firmwarevostro_5880_firmwareprecision_7820_toweroptiplex_3090latitude_7290latitude_7212_rugged_extreme_tablet_firmwarealienware_area_51m_r1precision_7540_firmwarelatitude_13_3380_firmwareinspiron_3582latitude_7480latitude_7285_2-in-1_firmwareoptiplex_3060vostro_3881wyse_5470_firmwareoptiplex_5060latitude_5285_2-in-1edge_gateway_5000_firmwarechengming_3988_firmwareinspiron_3584inspiron_5770alienware_m17_r2_firmwarewyse_5470_all-in-onelatitude_3580precision_5820_tower_firmwareprecision_3530_firmwarelatitude_3190_2-in-1_firmwarelatitude_5580_firmwareinspiron_5480_firmwareinspiron_5481_2-in-1latitude_7210_2-in-1latitude_3189optiplex_xe3_firmwareinspiron_7590xps_15_9575_2-in-1_firmwarevostro_5880vostro_3580latitude_13_3380vostro_3268precision_7750optiplex_7070_firmwarevostro_3584optiplex_5270_all-in-oneoptiplex_xe3embedded_box_pc_5000dell_g5_15_5590embedded_box_pc_3000_firmwarevostro_3481_firmwareinspiron_3502latitude_5491inspiron_3580vostro_3267_firmwarevostro_3470_firmwareoptiplex_7080alienware_aurora_r12optiplex_5480_all-in-onealienware_aurora_r9dell_g7_15_7590_firmwarelatitude_7280alienware_area_51m_r2_firmwarelatitude_5400alienware_m15_r4_firmwarealienware_aurora_r13_firmwarelatitude_5410latitude_5480precision_3541xps_8940optiplex_7050_firmwareprecision_7730_firmwareprecision_3551latitude_5401_firmwarealienware_m17_r3precision_5820_towerprecision_7730latitude_5414_rugged_firmwareprecision_3640_tower_firmwarelatitude_5424_rugged_firmwarelatitude_7275_2-in-1_firmwarelatitude_7300_firmwarealienware_x15_r1_firmwareembedded_box_pc_3000latitude_5510dell_g3_3779optiplex_7770_all-in-one_firmwarelatitude_5400_firmwarewyse_5470alienware_m17_r4optiplex_7780_all-in-one_firmwareinspiron_7700_all-in-onevostro_3671_firmwareprecision_3440precision_7510_firmwareprecision_3440_firmwareprecision_5530_2-in-1_firmwarealienware_x17_r1_firmwarexps_8930optiplex_7470_all-in-onelatitude_3310_2-in-1_firmwareoptiplex_5250_firmwareinspiron_5680_firmwarealienware_m15_r3_firmwareinspiron_3671_firmwareprecision_3550_firmwarevostro_3668_firmwarelatitude_7410latitude_3310_firmwarelatitude_5501_firmwaredell_g3_15_3590_firmwareinspiron_3781optiplex_3280_all-in-one_firmwarelatitude_5411optiplex_3050_firmwarealienware_aurora_r10_firmwareoptiplex_7450_firmwareoptiplex_7450inspiron_7590_firmwareinspiron_3521_firmwareprecision_7740_firmwaredell_g5_5090_firmwarelatitude_7285_2-in-1latitude_3189_firmwarealienware_m15_r2_firmwarelatitude_7389vostro_3681inspiron_7591_firmwaredell_g5_15_5590_firmwareinspiron_5570_firmwareprecision_7920_towerlatitude_5290latitude_7400_2-in-1_firmwarelatitude_5289_firmwarechengming_3980_firmwareinspiron_3481inspiron_3780_firmwareprecision_3530inspiron_3582_firmwarelatitude_5411_firmwarelatitude_3120_firmwareinspiron_3470_firmwareaurora_r14latitude_5590_firmwareoptiplex_7070_ultraprecision_7740vostro_3267inspiron_3671inspiron_3481_firmwareprecision_5530latitude_7275_2-in-1latitude_7310_firmwareprecision_5540optiplex_3050_all-in-onedell_latitude_3580_firmwareinspiron_3584_firmwarelatitude_9510optiplex_3280_all-in-onewyse_7040_thininspiron_3480inspiron_3583_firmwareinspiron_5770_firmwarelatitude_3490precision_3930_rack_firmwareinspiron_3670latitude_3180_firmwarevostro_3681_firmwarealienware_m17_r1_firmwarevostro_3580_firmwareinspiron_3581_firmwarelatitude_9510_firmwareprecision_3430_tower_firmwarelatitude_3300_firmwarelatitude_7400_2-in-1precision_3640_towerdell_g5_5090latitude_3490_firmwarelatitude_5300_2-in-1_firmwarevostro_3668latitude_7210_2-in-1_firmwareoptiplex_7760_all-in-onelatitude_7280_firmwarelatitude_5510_firmwarevostro_3670edge_gateway_3000latitude_5280inspiron_3670_firmwarelatitude_7212_rugged_extreme_tabletoptiplex_7780_all-in-onelatitude_7220_rugged_extreme_tablet_firmwareprecision_3540_firmwarelatitude_5300_firmwareinspiron_7777_firmwareinspiron_3482_firmwareinspiron_3880latitude_5289inspiron_5481_2-in-1_firmwarelatitude_5480_firmwareprecision_3431_tower_firmwarevostro_3471_firmwareoptiplex_3080_firmwareprecision_3930_rackprecision_7550precision_3420_towerinspiron_7700_all-in-one_firmwareinspiron_3881inspiron_3482dell_g3_3579_firmwarexps_13_9380latitude_7220ex_rugged_extreme_tabletlatitude_7414_rugged_extremeprecision_3420_tower_firmwareoptiplex_3080alienware_m17_r1alienware_area_51m_r2dell_g5_5000dell_g7_17_7790_firmwarelatitude_3480latitude_5490_firmwarelatitude_5591_firmwarelatitude_5310_firmwareinspiron_3782_firmwarevostro_3070alienware_m15_r4precision_3430_towervostro_3671precision_5520_firmwareinspiron_7591latitude_7310inspiron_5401_all-in-oneinspiron_7790wyse_7040_thin_firmwarechengming_3988inspiron_7790_firmwarexps_15_7590latitude_3300latitude_5580precision_3620_tower_firmwareedge_gateway_3000_firmwareprecision_5540_firmwarevostro_3584_firmwarelatitude_3390_2-in-1_firmwareoptiplex_7480_all-in-onechengming_3990_firmwarexps_8940_firmwaredell_g7_15_7590latitude_3120vostro_3480precision_3520_firmwarechengming_3980precision_3551_firmwareoptiplex_7070_ultra_firmwareoptiplex_5260_all-in-one_firmwareoptiplex_7060latitude_7200_2-in-1_firmwarelatitude_5290_firmwarelatitude_7424_rugged_extremevostro_3582_firmwareprecision_3630_towervostro_3470latitude_5414_ruggedoptiplex_7480_all-in-one_firmwarealienware_aurora_r9_firmwareoptiplex_3070inspiron_3280latitude_7390latitude_7290_firmwareprecision_7530xps_8930_firmwaredell_g7_17_7790precision_3240_compactprecision_7750_firmwareprecision_5720_all-in-one_firmwarealienware_aurora_r12_firmwarelatitude_5285_2-in-1_firmwareprecision_7510vostro_3480_firmwarechengming_3991_firmwarevostro_7590_firmwarexps_15_7590_firmwareembedded_box_pc_5000_firmwarealienware_aurora_r10optiplex_7050precision_3510_firmwareprecision_3510xps_13_9380_firmwarelatitude_7490latitude_5288latitude_7389_firmwareoptiplex_7060_firmwareprecision_3240_compact_firmwareoptiplex_7470_all-in-one_firmwarelatitude_e7470precision_3630_tower_firmwareoptiplex_5250inspiron_3581vostro_3582vostro_3667_firmwareprecision_7920_tower_firmwareinspiron_5400_firmwarelatitude_5424_ruggedlatitude_5488_firmwareCPG BIOS
CWE ID-CWE-367
Time-of-check Time-of-use (TOCTOU) Race Condition
CVE-2022-31642
Matching Score-4
Assigner-HP Inc.
ShareView Details
Matching Score-4
Assigner-HP Inc.
CVSS Score-7||HIGH
EPSS-0.11% / 29.65%
||
7 Day CHG~0.00%
Published-14 Jun, 2023 | 16:32
Updated-30 Dec, 2024 | 16:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Potential vulnerabilities have been identified in the system BIOS of certain HP PC products, which might allow arbitrary code execution, escalation of privilege, denial of service, and information disclosure.

Action-Not Available
Vendor-HP Inc.
Product-probook_640_g3zbook_studio_g5_firmwareelitedesk_800_g3elitebook_725_g4elitebook_845_g8eliteone_800_g3_healthcare_edition_firmwarezbook_17_g4_firmwareprobook_640_g7z2_tower_g4engage_flex_pro-c_retail_systemzhan_66_pro_14_g2probook_630_g8_firmwareelitebook_x360_830_g5_firmwareelitebook_x360_830_g5elitedesk_805_g6prodesk_400_g5_firmwarez240_towerelite_x2_1013_g3pro_x360_fortis_g10engage_flex_pro-c_retail_system_firmwareprodesk_480_g6elitedesk_800_g4_firmwareproone_440_g9eliteone_800_g3_healthcare_editionprodesk_400_g4probook_445_g6z2_tower_g9pro_tower_400_g9_firmwareelitebook_840_g7_firmwareprobook_445_g7zbook_17_g6eliteone_840_g9_firmwareprobook_650_g8_firmwareeliteone_800_g4zbook_studio_g9elitebook_630_g9_firmwarezbook_fury_17_g7_firmwareprobook_645_g4_firmwarezhan_66_pro_14_g3elitebook_836_g6probook_440_g4zbook_17_g6_firmwareproone_400_g4_firmwarez2_mini_g3elitebook_850_g5_firmwareprodesk_600_g3elitebook_x360_1020_g2elite_tower_600_g9_firmwareelite_slice_g2_firmwareelitebook_x360_1030_g7_firmwarezbook_17_g4elite_tower_880_g9_firmwarezbook_fury_15_g7mt32elitebook_840_g4elitedesk_880_g8zhan_66_pro_15_g3zbook_power_g9mt22_firmwarez2_mini_g5_firmwareelite_x360_830_g9_firmwareelitebook_x360_1040_g8_firmwareproone_480_g3elitedesk_880_g4_firmwareelitedesk_880_g6elitebook_865_g9elitebook_846_g5_healthcare_edition_firmwareelitebook_848_g4probook_455_g4probook_x360_11_g6_eeelitebook_820_g4_firmwareelitebook_840_g5_firmwarepro_tower_480_g9z2_small_form_factor_g8_firmwareproone_440_g4eliteone_800_g6elitebook_835_g8z2_small_form_factor_g9_firmwareprodesk_480_g4prodesk_400_g6elitebook_x360_1030_g8probook_640_g5eliteone_840_g9elitedesk_800_g8elitebook_755_g4elitedesk_805_g8prodesk_600_g5probook_x360_11_g4_ee_firmwareprodesk_400_g4_firmwarez2_small_form_factor_g5zbook_firefly_g9elitebook_830_g6elite_dragonfly_g2z2_mini_g9_firmwareprobook_430_g6_firmwareprobook_650_g5_firmwarepro_mt440_g3_firmwareprobook_x360_435_g7_firmwareprobook_x360_11_g6_ee_firmwareelite_x2_1012_g2_firmwarez2_tower_g9_firmwareproone_400_g6_firmwareelitebook_x360_830_g7probook_445_g7_firmwareelitebook_x360_1040_g8probook_450_g5probook_450_g6_firmwareprodesk_680_g3_firmwareprobook_455_g5probook_430_g5_firmwareelitebook_836_g5_firmwarezbook_17_g5probook_650_g7_firmwarezhan_66_pro_15_g3_firmwareprobook_440_g7elite_tower_880_g9prodesk_480_g4_firmwareengage_one_all-in-one_systemelitebook_846r_g4probook_430_g4probook_470_g4eliteone_800_g4_healthcare_edition_firmwareelitebook_x360_1030_g2elitedesk_800_g4elitebook_865_g9_firmwarepro_x2_612_g2elite_tower_600_g9elitebook_830_g8_firmwarez240_small_form_factor_firmwareprodesk_480_g5_firmwareeliteone_1000_g2_firmwarepro_tower_400_g9elitebook_845_g9zbook_firefly_14_g7mp9_g4_retail_systemeliteone_800_g5probook_445_g8elitebook_855_g7_firmwareprobook_470_g5_firmwareelitebook_x360_830_g8elitebook_860_g9_firmwareelitedesk_800_g8_firmwareprobook_455_g7elite_tower_800_g9_firmwareelitebook_x360_830_g6probook_635_aero_g8_firmwareelitebook_835_g9_firmwarepro_sff_400_g9probook_445_g6_firmwareprobook_445_g9elitebook_645_g9_firmwareproone_440_g5_firmwarezbook_studio_g7elitebook_835_g8_firmwareelitedesk_800_g6proone_480_g3_firmwareelitebook_846_g5_healthcare_editionzbook_fury_15_g7_firmwarezbook_power_g8_firmwareproone_600_g3_firmwarezbook_14u_g5_firmwareprobook_640_g8_firmwaremt45_firmwareproone_440_g6z1_g9_towerz2_mini_g3_firmwareelitedesk_880_g3elite_mini_600_g9elitebook_845_g7_firmwarezhan_66_pro_a_14_g5elitebook_1040_g4probook_x360_11_g3_eeelitebook_735_g5elitebook_1040_g9_firmwareelitebook_735_g5_firmwareelitebook_846_g5_firmwarez1_entry_tower_g5_firmwareeliteone_1000_g2z2_mini_g5zbook_fury_17_g7elite_mini_800_g9elitedesk_880_g5_firmwareprodesk_480_g7_pci_firmwareprobook_fortis_g10elitebook_835_g7elite_x2_g8_zbook_fury_g8_firmwarezbook_14u_g6proone_600_g3elitebook_755_g5zbook_15u_g6_firmwarezbook_15_g4eliteone_800_g8_firmwaremt44_firmwareprobook_440_g8prodesk_480_g5mini_conferencing_firmwareelitebook_735_g6z2_mini_g4_firmwareprobook_455_g9probook_640_g5_firmwareprobook_440_g6probook_450_g6z1_g8_towerprodesk_680_g3probook_630_g8probook_650_g8probook_650_g4_firmwareprobook_450_g9zhan_x_13_g2zbook_studio_g5z2_mini_g4elitebook_860_g9eliteone_870_g9prodesk_405_g6_firmwareprobook_430_g8prodesk_405_g8_firmwareelitebook_x360_1040_g7elitebook_830_g9elite_x2_g4zbook_15_g5probook_455_g8elitebook_830_g8elitebook_840_g9_firmwarezhan_66_pro_a_14_g4elite_x2_g8__firmwareelitebook_x360_830_g8_firmwarezhan_66_pro_a_14_g3_firmwareprobook_445_g8_firmwarezhan_66_pro_14_g4elite_dragonfly_g3z2_small_form_factor_g4eliteone_800_g5_firmwareprobook_455_g5_firmwareengage_one_pro_aio_systemz240_small_form_factorproone_600_g4_firmwareelitebook_830_g7elitebook_640_g9mt31probook_455_g6_firmwareprobook_450_g4mt32_firmwareprobook_440_g6_firmwareelitebook_850_g4elitebook_x360_830_g6_firmwareelitebook_830_g6_firmwareelite_tower_680_g9zhan_66_pro_g1_firmwareelite_x2_g4_firmwarezhan_66_pro_13_g2_firmwareelitebook_x360_830_g7_firmwareengage_go_10_mobile_system_firmwareelite_dragonfly_g3_firmwareelite_dragonfly_g2_firmwareprobook_x360_11_g7_eemt43_firmwareelitebook_x360_1030_g3_firmwareelite_x360_1040_g9_firmwareelite_mini_800_g9_firmwareelitebook_645_g9proone_400_g4elitebook_840_g6_healthcare_editionelite_sff_600_g9prodesk_600_g4zhan_66_pro_15_g2_firmwarezhan_66_pro_14_g4_firmwarezbook_firefly_15_g7mt31_firmwarez2_tower_g4_firmwarezbook_studio_g4eliteone_800_g8z1_entry_tower_g5z238_microtower_firmwareeliteone_800_g5_healthcare_editionzbook_power_g9_firmwaremt43probook_440_g4_firmwareelitebook_845_g8_firmwareprobook_640_g8elitebook_830_g9_firmwarezhan_66_pro_g1rp9_g1_retail_system_firmwareelitebook_840_g7elitebook_1050_g1elitebook_850_g5prodesk_400_g7zbook_power_g7proone_600_g4elite_x360_830_g9eliteone_800_g4_healthcare_editionelite_mini_600_g9_firmwarez238_microtowerelitedesk_880_g6_firmwareelitebook_630_g9elitedesk_705_g4elitebook_x360_1040_g6_firmwarezbook_firefly_g9_firmwareelitebook_x360_1030_g4_firmwareprobook_x360_11_g3_ee_firmwarezhan_66_pro_14_g3_firmwareproone_400_g3probook_430_g4_firmwarezhan_66_pro_a_14_g3zbook_power_g8probook_440_g8_firmwareelitebook_x360_1020_g2_firmwarezbook_15_g6_firmwareelite_sff_800_g9zbook_fury_16_g9zbook_create_g7_firmwareproone_440_g6_firmwareprobook_fortis_g10_firmwareelitebook_840_g5elitebook_850_g4_firmwareprobook_440_g5mt21_firmwareproone_440_g9_firmwarezhan_66_pro_a_14_g4_firmwarezhan_66_pro_g3elitebook_1050_g1_firmwareelitebook_755_g5_firmwareprobook_640_g4probook_455_g9_firmwareprobook_445r_g6_firmwarezhan_66_pro_g3_firmwareproone_400_g5_firmwareprobook_455_g4_firmwarez2_tower_g5z2_tower_g8_firmwaremt46elitedesk_800_g3_firmwareprodesk_600_g6_firmwareproone_600_g6zhan_66_pro_13_g2elite_dragonflyzbook_firefly_g8probook_440_g5_firmwarez2_small_form_factor_g5_firmwareelite_dragonfly_maxzbook_14u_g6_firmwareprobook_445r_g6zbook_15_g6z1_entry_tower_g6elitebook_835_g7_firmwareelitebook_745_g5_firmwareelitebook_850_g6_firmwareelitebook_820_g4z2_tower_g8eliteone_1000_g1eliteone_800_g3_firmwareprobook_430_g8_firmwareelitedesk_880_g4elitedesk_880_g5probook_fortis_g9_firmwareprobook_635_aero_g7eliteone_800_g6_firmwareprobook_470_g5prodesk_400_g3z1_g9_tower_firmwareelitebook_840_g8probook_640_g4_firmwareelitebook_846_g5zbook_fury_g8zbook_studio_g4_firmwareelitebook_828_g4probook_455r_g6_firmwareprodesk_405_g4proone_400_g3_firmwareengage_go_mobile_systemelitebook_755_g4_firmwarezbook_17_g5_firmwareelitebook_830_g5elitedesk_880_g8_firmwareeliteone_800_g4_firmwareelitebook_640_g9_firmwareelitebook_x360_1040_g6proone_600_g6_firmwareelitebook_840_g6_firmwarezhan_66_pro_15_g2prodesk_680_g4_firmwareprodesk_600_g5_firmwareelitebook_735_g6_firmwarez240_tower_firmwareprodesk_480_g7_pcizbook_firefly_14_g7_firmwareelitebook_745_g5mini_conferencingprobook_440_g9probook_x360_11_g2_ee_firmwarepro_x360_fortis_g9_firmwareelitebook_855_g8elitebook_745_g6_firmwareprobook_470_g4_firmwareelite_sff_800_g9_firmwareeliteone_800_g3elitebook_836_g6_firmwareelitebook_x360_1030_g7probook_x360_11_g5_eeeliteone_870_g9_firmwareprobook_440_g9_firmwareelitebook_x360_1040_g7_firmwareprobook_x360_440_g1z1_entry_tower_g6_firmwarez2_small_form_factor_g8elite_tower_800_g9elitebook_x360_1040_g5elitebook_850_g8elitebook_835_g9elite_sff_600_g9_firmwarerp9_g1_retail_systemelitebook_x360_1030_g4zbook_15_g4_firmwareprobook_x360_440_g1_firmwareprodesk_405_g6elitebook_846r_g4_firmwarezbook_15_g5_firmwareproone_440_g5elitebook_840_g5_healthcare_edition_firmwareprobook_455_g8_firmwareprobook_x360_435_g8elitebook_840_g4_firmwareelitedesk_705_g4_firmwareproone_400_g5elitebook_840_g6_healthcare_edition_firmwareprodesk_680_g6_pci_firmwareprobook_655_g3probook_640_g7_firmwareprodesk_600_g4_firmwareelitebook_840_g6engage_flex_mini_retail_system_firmwareprobook_455_g6elitebook_850_g8_firmwareprobook_x360_11_g4_eeprodesk_400_g6_firmwarezbook_studio_g9_firmwareelitedesk_800_g5prodesk_405_g4_firmwaremt44probook_640_g3_firmwareprobook_450_g8pro_x2_612_g2_firmwareelitebook_745_g4_firmwarezbook_studio_g8_firmwareelitebook_840_aero_g8_firmwareelite_x2_1012_g2probook_450_g9_firmwareprobook_445_g9_firmwareelitebook_840_g9zbook_studio_x360_g5zbook_15u_g6zbook_studio_x360_g5_firmwareengage_go_10_mobile_systemzbook_x2_g4_firmwaremt21probook_650_g3pro_x360_fortis_g10_firmwareelite_dragonfly_max_firmwareprobook_x360_435_g8_firmwarezbook_studio_g7_firmwarezbook_firefly_15_g7_firmwareelitedesk_705_g5eliteone_800_g5_healthcare_edition_firmwareelite_x360_1040_g9engage_one_pro_aio_system_firmwarezbook_15u_g5elitedesk_805_g6_firmwareelitebook_840_g5_healthcare_editionelitebook_855_g8_firmwareelite_x2_1013_g3_firmwareprobook_x360_435_g7z2_small_form_factor_g4_firmwareelitebook_828_g4_firmwareelitebook_830_g7_firmwarepro_x360_fortis_g9z2_mini_g9elitebook_850_g6probook_450_g7engage_go_mobile_system_firmwareengage_one_all-in-one_system_firmwareelitebook_848_g4_firmwarezhan_66_pro_a_14_g5_firmwareelitedesk_800_g6_firmwareprobook_450_g7_firmwareelitebook_745_g4pro_mini_400_g9elitebook_725_g4_firmwareelite_tower_680_g9_firmwareprobook_650_g4zbook_fury_16_g9_firmwareprobook_650_g5zbook_create_g7prodesk_400_g3_firmwarezhan_66_pro_14_g2_firmwareeliteone_1000_g1_firmwareproone_440_g4_firmwareelitebook_745_g6elitebook_650_g9_firmwareprobook_430_g6engage_flex_pro_retail_system_firmwareelitebook_1040_g9elitebook_x360_1030_g3proone_600_g5_firmwarezhan_66_pro_g5_firmwarez1_all-in-one_g3_firmwareelitedesk_800_g5_firmwareprodesk_600_g6zhan_x_13_g2_firmwarepro_mini_400_g9_firmwareprobook_455r_g6elitedesk_705_g5_firmwareprobook_430_g7elitebook_650_g9prodesk_600_g3_firmwareprobook_450_g8_firmwarepro_sff_400_g9_firmwareelitebook_836_g5probook_650_g3_firmwareelitebook_855_g7probook_x360_11_g7_ee_firmwareprodesk_400_g7_firmwaremt46_firmwareprobook_650_g7probook_455_g7_firmwareelitebook_x360_1030_g2_firmwareproone_400_g6probook_x360_11_g2_eeelite_dragonfly_firmwareprobook_450_g4_firmwareelitebook_840_g8_firmwarepro_tower_480_g9_firmwareelitebook_850_g7mt22z2_tower_g5_firmwareelitebook_x360_1040_g5_firmwareproone_600_g5probook_430_g5probook_430_g7_firmwarezbook_power_g7_firmwareprobook_x360_11_g5_ee_firmwareelite_slice_g2elitebook_845_g7elitebook_850_g7_firmwareprodesk_400_g5elitebook_655_g9elitebook_1040_g4_firmwareelitedesk_880_g3_firmwareprobook_450_g5_firmwareelitebook_840_aero_g8zbook_firefly_g8_firmwareprobook_645_g3zbook_14u_g5elitebook_x360_1030_g8_firmwaremp9_g4_retail_system_firmwareelitebook_840r_g4probook_645_g4z1_g8_tower_firmwarez2_small_form_factor_g9engage_flex_mini_retail_systemzbook_studio_g8elitebook_845_g9_firmwareprobook_655_g3_firmwareprodesk_680_g4probook_635_aero_g8probook_440_g7_firmwareprodesk_680_g6_pcimt45zbook_15u_g5_firmwareelitebook_655_g9_firmwareengage_flex_pro_retail_systemelitedesk_805_g8_firmwarezbook_x2_g4z1_all-in-one_g3probook_645_g3_firmwareelitebook_830_g5_firmwareprobook_635_aero_g7_firmwareelitebook_840r_g4_firmwarezhan_66_pro_g5prodesk_480_g6_firmwareprodesk_405_g8pro_mt440_g3probook_fortis_g9HP PC BIOS
CWE ID-CWE-367
Time-of-check Time-of-use (TOCTOU) Race Condition
  • Previous
  • 1
  • 2
  • 3
  • Next
Details not found