Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
Vulnerability Details :

CVE-2022-32608

Summary
Assigner-MediaTek
Assigner Org ID-ee979b05-11f8-4f25-a7e0-a1fa9c190374
Published At-08 Nov, 2022 | 00:00
Updated At-02 May, 2025 | 18:20
Rejected At-
Credits

In jpeg, there is a possible use after free due to a race condition. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07388753; Issue ID: ALPS07388753.

Vendors
-
Not available
Products
-
Metrics (CVSS)
VersionBase scoreBase severityVector
Weaknesses
Attack Patterns
Solution/Workaround
References
HyperlinkResource Type
EPSS History
Score
Latest Score
-
N/A
No data available for selected date range
Percentile
Latest Percentile
-
N/A
No data available for selected date range
Stakeholder-Specific Vulnerability Categorization (SSVC)
▼Common Vulnerabilities and Exposures (CVE)
cve.org
Assigner:MediaTek
Assigner Org ID:ee979b05-11f8-4f25-a7e0-a1fa9c190374
Published At:08 Nov, 2022 | 00:00
Updated At:02 May, 2025 | 18:20
Rejected At:
▼CVE Numbering Authority (CNA)

In jpeg, there is a possible use after free due to a race condition. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07388753; Issue ID: ALPS07388753.

Affected Products
Vendor
MediaTek Inc.MediaTek, Inc.
Product
MT6893, MT6895
Versions
Affected
  • Android 12.0
Problem Types
TypeCWE IDDescription
textN/AElevation of Privilege
Type: text
CWE ID: N/A
Description: Elevation of Privilege
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://corp.mediatek.com/product-security-bulletin/November-2022
N/A
Hyperlink: https://corp.mediatek.com/product-security-bulletin/November-2022
Resource: N/A
▼Authorized Data Publishers (ADP)
1. CVE Program Container
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://corp.mediatek.com/product-security-bulletin/November-2022
x_transferred
Hyperlink: https://corp.mediatek.com/product-security-bulletin/November-2022
Resource:
x_transferred
2. CISA ADP Vulnrichment
Affected Products
Problem Types
TypeCWE IDDescription
CWECWE-367CWE-367 Time-of-check Time-of-use (TOCTOU) Race Condition
Type: CWE
CWE ID: CWE-367
Description: CWE-367 Time-of-check Time-of-use (TOCTOU) Race Condition
Metrics
VersionBase scoreBase severityVector
3.16.4MEDIUM
CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
Version: 3.1
Base score: 6.4
Base severity: MEDIUM
Vector:
CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
Information is not available yet
▼National Vulnerability Database (NVD)
nvd.nist.gov
Source:security@mediatek.com
Published At:08 Nov, 2022 | 21:15
Updated At:02 May, 2025 | 19:15

In jpeg, there is a possible use after free due to a race condition. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07388753; Issue ID: ALPS07388753.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Date Added: N/A
Due Date: N/A
Vulnerability Name: N/A
Required Action: N/A
Metrics
TypeVersionBase scoreBase severityVector
Primary3.16.4MEDIUM
CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
Secondary3.16.4MEDIUM
CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
Type: Primary
Version: 3.1
Base score: 6.4
Base severity: MEDIUM
Vector:
CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
Type: Secondary
Version: 3.1
Base score: 6.4
Base severity: MEDIUM
Vector:
CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
CPE Matches

Google LLC
google
>>android>>12.0
cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*
MediaTek Inc.
mediatek
>>mt6893>>-
cpe:2.3:h:mediatek:mt6893:-:*:*:*:*:*:*:*
MediaTek Inc.
mediatek
>>mt6895>>-
cpe:2.3:h:mediatek:mt6895:-:*:*:*:*:*:*:*
Weaknesses
CWE IDTypeSource
CWE-367Primarynvd@nist.gov
CWE-367Secondary134c704f-9b21-4f2e-91b3-4a467353bcc0
CWE ID: CWE-367
Type: Primary
Source: nvd@nist.gov
CWE ID: CWE-367
Type: Secondary
Source: 134c704f-9b21-4f2e-91b3-4a467353bcc0
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
https://corp.mediatek.com/product-security-bulletin/November-2022security@mediatek.com
Vendor Advisory
https://corp.mediatek.com/product-security-bulletin/November-2022af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
Hyperlink: https://corp.mediatek.com/product-security-bulletin/November-2022
Source: security@mediatek.com
Resource:
Vendor Advisory
Hyperlink: https://corp.mediatek.com/product-security-bulletin/November-2022
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Vendor Advisory

Change History

0
Information is not available yet

Similar CVEs

128Records found

CVE-2020-0204
Matching Score-6
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
ShareView Details
Matching Score-6
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
CVSS Score-7||HIGH
EPSS-0.04% / 12.26%
||
7 Day CHG~0.00%
Published-11 Jun, 2020 | 14:43
Updated-04 Aug, 2024 | 05:55
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In InstallPackage of package.cpp, there is a possible bypass of a signature check due to a Time of Check/Time of Use condition. This could lead to local escalation of privilege by allowing a bypass of the initial zip file signature check for an OS update with no additional execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-10Android ID: A-136498130

Action-Not Available
Vendor-n/aGoogle LLC
Product-androidAndroid
CWE ID-CWE-367
Time-of-check Time-of-use (TOCTOU) Race Condition
CVE-2020-0238
Matching Score-6
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
ShareView Details
Matching Score-6
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
CVSS Score-7||HIGH
EPSS-0.01% / 0.31%
||
7 Day CHG~0.00%
Published-11 Aug, 2020 | 19:26
Updated-04 Aug, 2024 | 05:55
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In updatePreferenceIntents of AccountTypePreferenceLoader, there is a possible confused deputy attack due to a race condition. This could lead to local escalation of privilege and launching privileged activities with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-8.1 Android-9 Android-10 Android-8.0Android ID: A-150946634

Action-Not Available
Vendor-n/aGoogle LLC
Product-androidAndroid
CWE ID-CWE-367
Time-of-check Time-of-use (TOCTOU) Race Condition
CVE-2019-20610
Matching Score-6
Assigner-MITRE Corporation
ShareView Details
Matching Score-6
Assigner-MITRE Corporation
CVSS Score-8.1||HIGH
EPSS-0.15% / 36.24%
||
7 Day CHG~0.00%
Published-24 Mar, 2020 | 19:23
Updated-05 Aug, 2024 | 02:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An issue was discovered on Samsung mobile devices with N(7.X) and O(8.X) (Exynos 7570, 7870, 7880, 7885, 8890, 8895, and 9810 chipsets) software. A double-fetch vulnerability in Trustlet allows arbitrary TEE code execution. The Samsung ID is SVE-2019-13910 (April 2019).

Action-Not Available
Vendor-n/aGoogle LLCSamsung
Product-exynos_7880exynos_9810exynos_7570androidexynos_7870exynos_7885exynos_8890exynos_8895n/a
CWE ID-CWE-367
Time-of-check Time-of-use (TOCTOU) Race Condition
CVE-2022-39908
Matching Score-6
Assigner-Samsung Mobile
ShareView Details
Matching Score-6
Assigner-Samsung Mobile
CVSS Score-6.9||MEDIUM
EPSS-0.02% / 2.95%
||
7 Day CHG~0.00%
Published-08 Dec, 2022 | 00:00
Updated-22 Apr, 2025 | 18:16
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

TOCTOU vulnerability in Samsung decoding library for video thumbnails prior to SMR Dec-2022 Release 1 allows local attacker to perform Out-Of-Bounds Write.

Action-Not Available
Vendor-Samsung ElectronicsGoogle LLC
Product-androidSamsung Mobile Devices
CWE ID-CWE-367
Time-of-check Time-of-use (TOCTOU) Race Condition
CVE-2021-4098
Matching Score-6
Assigner-Chrome
ShareView Details
Matching Score-6
Assigner-Chrome
CVSS Score-7.4||HIGH
EPSS-0.22% / 44.93%
||
7 Day CHG~0.00%
Published-11 Feb, 2022 | 22:55
Updated-03 Aug, 2024 | 17:16
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Insufficient data validation in Mojo in Google Chrome prior to 96.0.4664.110 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page.

Action-Not Available
Vendor-Google LLC
Product-chromeChrome
CWE ID-CWE-787
Out-of-bounds Write
CWE ID-CWE-367
Time-of-check Time-of-use (TOCTOU) Race Condition
CVE-2017-15404
Matching Score-6
Assigner-Chrome
ShareView Details
Matching Score-6
Assigner-Chrome
CVSS Score-7.8||HIGH
EPSS-0.01% / 1.78%
||
7 Day CHG~0.00%
Published-09 Jan, 2019 | 19:00
Updated-05 Aug, 2024 | 19:57
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An ability to process crash dumps under root privileges and inappropriate symlinks handling could lead to a local privilege escalation in Crash Reporting in Google Chrome on Chrome OS prior to 61.0.3163.113 allowed a local attacker to perform privilege escalation via a crafted HTML page.

Action-Not Available
Vendor-Google LLC
Product-chromeChrome
CWE ID-CWE-367
Time-of-check Time-of-use (TOCTOU) Race Condition
CVE-2022-33691
Matching Score-6
Assigner-Samsung Mobile
ShareView Details
Matching Score-6
Assigner-Samsung Mobile
CVSS Score-6.2||MEDIUM
EPSS-0.01% / 1.25%
||
7 Day CHG~0.00%
Published-11 Jul, 2022 | 13:34
Updated-03 Aug, 2024 | 08:09
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A possible race condition vulnerability in score driver prior to SMR Jul-2022 Release 1 can allow local attackers to interleave malicious operations.

Action-Not Available
Vendor-Google LLCSamsungSamsung Electronics
Product-androidexynos_9820Samsung Mobile Devices
CWE ID-CWE-367
Time-of-check Time-of-use (TOCTOU) Race Condition
CVE-2021-0897
Matching Score-6
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
ShareView Details
Matching Score-6
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
CVSS Score-6.7||MEDIUM
EPSS-0.01% / 1.17%
||
7 Day CHG~0.00%
Published-17 Dec, 2021 | 16:10
Updated-03 Aug, 2024 | 15:47
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In apusys, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS05672107; Issue ID: ALPS05670549.

Action-Not Available
Vendor-n/aGoogle LLCMediaTek Inc.
Product-mt6873mt6893androidmt6885mt6875mt8797mt6889mt8791mt6877mt8195mt6891mt6883MT6873, MT6875, MT6877, MT6883, MT6885, MT6889, MT6891, MT6893, MT8195, MT8791, MT8797
CWE ID-CWE-787
Out-of-bounds Write
CWE ID-CWE-367
Time-of-check Time-of-use (TOCTOU) Race Condition
CVE-2017-0412
Matching Score-6
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
ShareView Details
Matching Score-6
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
CVSS Score-7.8||HIGH
EPSS-1.06% / 76.74%
||
7 Day CHG~0.00%
Published-08 Feb, 2017 | 15:00
Updated-20 Apr, 2025 | 01:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An elevation of privilege vulnerability in the Framework APIs could enable a local malicious application to execute arbitrary code within the context of a privileged process. This issue is rated as High because it could be used to gain local access to elevated capabilities, which are not normally accessible to a third-party application. Product: Android. Versions: 7.0, 7.1.1. Android ID: A-33039926.

Action-Not Available
Vendor-Google LLC
Product-androidAndroid
CWE ID-CWE-367
Time-of-check Time-of-use (TOCTOU) Race Condition
CVE-2022-33986
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-6.4||MEDIUM
EPSS-0.04% / 10.15%
||
7 Day CHG~0.00%
Published-14 Nov, 2022 | 00:00
Updated-30 Apr, 2025 | 20:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

DMA attacks on the parameter buffer used by the VariableRuntimeDxe software SMI handler could lead to a TOCTOU attack. DMA attacks on the parameter buffer used by the software SMI handler used by the driver VariableRuntimeDxe could lead to a TOCTOU attack on the SMI handler and lead to corruption of SMRAM. This issue was discovered by Insyde engineering during a security review. This issue is fixed in Kernel 5.4: 05.44.23 and Kernel 5.5: 05.52.23. CWE-367 CWE-367 Report at: https://www.insyde.com/security-pledge/SA-2022056

Action-Not Available
Vendor-n/aInsyde Software Corp. (ISC)
Product-kerneln/a
CWE ID-CWE-367
Time-of-check Time-of-use (TOCTOU) Race Condition
CVE-2022-33982
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-6.4||MEDIUM
EPSS-0.04% / 11.08%
||
7 Day CHG~0.00%
Published-14 Nov, 2022 | 00:00
Updated-30 Apr, 2025 | 21:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

DMA attacks on the parameter buffer used by the Int15ServiceSmm software SMI handler could lead to a TOCTOU attack on the SMI handler and lead to corruption of SMRAM. DMA attacks on the parameter buffer used by the software SMI handler used by the driver Int15ServiceSmm could lead to a TOCTOU attack on the SMI handler and lead to corruption of SMRAM. This issue was discovered by Insyde engineering during a security review. This issue is fixed in Kernel 5.2: 05.27.23, Kernel 5.3: 05.36.23, Kernel 5.4: 05.44.23 and Kernel 5.5: 05.52.23 CWE-367

Action-Not Available
Vendor-n/aInsyde Software Corp. (ISC)
Product-kerneln/a
CWE ID-CWE-367
Time-of-check Time-of-use (TOCTOU) Race Condition
CVE-2022-33906
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-6.4||MEDIUM
EPSS-0.04% / 11.08%
||
7 Day CHG~0.00%
Published-14 Nov, 2022 | 00:00
Updated-30 Apr, 2025 | 19:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

DMA transactions which are targeted at input buffers used for the FwBlockServiceSmm software SMI handler could cause SMRAM corruption through a TOCTOU attack. DMA transactions which are targeted at input buffers used for the software SMI handler used by the FwBlockServiceSmm driver could cause SMRAM corruption through a TOCTOU attack. This issue was discovered by Insyde engineering based on the general description provided by Intel's iSTARE group. Fixed in kernel 5.2: 05.27.23, 5.3: 05.36.23, 5.4: 05.44.23, 5.5: 05.52.23 https://www.insyde.com/security-pledge/SA-2022048

Action-Not Available
Vendor-n/aInsyde Software Corp. (ISC)
Product-kerneln/a
CWE ID-CWE-367
Time-of-check Time-of-use (TOCTOU) Race Condition
CVE-2022-30773
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-6.4||MEDIUM
EPSS-0.04% / 10.15%
||
7 Day CHG~0.00%
Published-14 Nov, 2022 | 00:00
Updated-30 Apr, 2025 | 20:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

DMA attacks on the parameter buffer used by the IhisiSmm driver could change the contents after parameter values have been checked but before they are used (a TOCTOU attack). DMA attacks on the parameter buffer used by the IhisiSmm driver could change the contents after parameter values have been checked but before they are used (a TOCTOU attack). This issue was discovered by Insyde engineering. This issue is fixed in Kernel 5.4: 05.44.23 and Kernel 5.5: 05.52.23. CWE-367

Action-Not Available
Vendor-n/aInsyde Software Corp. (ISC)
Product-kerneln/a
CWE ID-CWE-367
Time-of-check Time-of-use (TOCTOU) Race Condition
CVE-2022-31243
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-6.4||MEDIUM
EPSS-0.04% / 11.08%
||
7 Day CHG~0.00%
Published-14 Nov, 2022 | 00:00
Updated-30 Apr, 2025 | 20:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Update description and links DMA transactions which are targeted at input buffers used for the software SMI handler used by the FvbServicesRuntimeDxe driver could cause SMRAM corruption through a TOCTOU attack.. "DMA transactions which are targeted at input buffers used for the software SMI handler used by the FvbServicesRuntimeDxe driver could cause SMRAM corruption. This issue was discovered by Insyde engineering based on the general description provided by Intel's iSTARE group. Fixed in Kernel 5.2: 05.27.21. Kernel 5.3: 05.36.21. Kernel 5.4: 05.44.21. Kernel 5.5: 05.52.21 https://www.insyde.com/security-pledge/SA-2022044

Action-Not Available
Vendor-n/aInsyde Software Corp. (ISC)
Product-kerneln/a
CWE ID-CWE-367
Time-of-check Time-of-use (TOCTOU) Race Condition
CVE-2022-30774
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-6.4||MEDIUM
EPSS-0.04% / 11.08%
||
7 Day CHG~0.00%
Published-14 Nov, 2022 | 00:00
Updated-30 Apr, 2025 | 20:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

DMA attacks on the parameter buffer used by the PnpSmm driver could change the contents after parameter values have been checked but before they are used (a TOCTOU attack) DMA attacks on the parameter buffer used by the PnpSmm driver could change the contents after parameter values have been checked but before they are used (a TOCTOU attack) . This issue was discovered by Insyde engineering during a security review. This iss was fixed in Kernel 5.2: 05.27.29, Kernel 5.3: 05.36.25, Kernel 5.4: 05.44.25, Kernel 5.5: 05.52.25. CWE-367 https://www.insyde.com/security-pledge/SA-2022043

Action-Not Available
Vendor-n/aInsyde Software Corp. (ISC)
Product-kerneln/a
CWE ID-CWE-367
Time-of-check Time-of-use (TOCTOU) Race Condition
CVE-2020-11220
Matching Score-4
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-4
Assigner-Qualcomm, Inc.
CVSS Score-6.4||MEDIUM
EPSS-0.04% / 8.86%
||
7 Day CHG~0.00%
Published-17 Mar, 2021 | 06:00
Updated-04 Aug, 2024 | 11:28
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

While processing storage SCM commands there is a time of check or time of use window where a pointer used could be invalid at a specific time while executing the storage SCM call in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Wired Infrastructure and Networking

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-wcd9360_firmwarepm6125qat3519qbt2000_firmwarepm855a_firmwarewcn3950_firmwareqtc800hsdr8250_firmwareqcs2290pm8998_firmwaresmr546_firmwarewtr5975_firmwaresdr425_firmwarewcn3998smr526_firmwarewcn3950sm4125qpa5460pm640a_firmwareqsw8573_firmwarewgr7640_firmwareqsw8574_firmwaresd460_firmwareqca6574au_firmwareqpa4360_firmwarewcd9375_firmwarewcn3998_firmwareqbt2000pm855pqca6420wcd9360pm6150apmx50_firmwarewhs9410_firmwaresdr735gqpa5460_firmwarewcn3999sa8155_firmwaresd662_firmwareqcs405qca6430qat3522wcd9340sdm830_firmwaresdr660sa6155pqpa6560sdr865wcd9341smr545qca6696_firmwarepmm855au_firmwarewcn3910_firmwaresd_8cxpm6350qtc800ssd855_firmwarewcn3988wtr3925pm640p_firmwaresdr052sa8195p_firmwaresmb1390qat5516_firmwarepm6150lpm855l_firmwareqtc410swcn3991smb1355sdr735g_firmwarewgr7640qet5100sdx55m_firmwarepm8005_firmwareqpa8673_firmwarepm6150qet4101_firmwaresmb1354_firmwarepm7250bsdr052_firmwaresmb1355_firmwarepm7250b_firmwarepmd9655_firmwaresmb1351_firmwaresmb1381pm855p_firmwaresdx50m_firmwaresdr735sdx24_firmwaresmr526wtr5975qca6430_firmwarepmk8003qtc801s_firmwarewcn3980qat3522_firmwareqdm2301qsw8573wcd9340_firmwarewsa8815wcn6850wcn3910qdm2301_firmwaresd_8c_firmwarepm8350_firmwareqca9984wcn3980_firmwaresdr051_firmwaresdx55mpm8008qtm525_firmwareqsw8574pmi8998pm855lqpa6560_firmwaresmr545_firmwarepm4250_firmwareqcm4290_firmwaresd480pmi8998_firmwarepm8005pm855_firmwarepm4250qdm2302pm855b_firmwareqca6595_firmwareqcs405_firmwarewtr2965pm640l_firmwarewcd9370_firmwaresdx55sa8155psd675qet4101qat3555_firmwarepm855bar8035_firmwareqcm2290wcn3991_firmwaresdr051pm6125_firmwarepm4125qbt1500qcs2290_firmwarepmi632pmx24_firmwareqbt1500_firmwareqet5100_firmwareqcs4290sdr660gpmm855auqca6420_firmwareqca6390_firmwaresmb1396wcd9370sd675_firmwarepm8350qpa4361_firmwaresdr425wcn3990_firmwareqca9984_firmwarepmi632_firmwaresd_8cx_firmwarewcd9385_firmwarewhs9410qat5516sd662sdr660g_firmwarepmk8002_firmwareqsw6310_firmwaresa8155sdx55_firmwarewcn3999_firmwaresmb1354sa6155p_firmwareqat5515_firmwarepm855wcn3988_firmwarepmx55sdr735_firmwareqat3519_firmwaresa8195pwsa8810_firmwareqat5515pm6350_firmwarepm8004_firmwaresdr8150_firmwareqcs4290_firmwarewcd9385qtc800h_firmwareqdm2302_firmwareqat3550_firmwarepm4125_firmwarear8035qca6390wcd9375aqt1000qpa8673pmm8195auwtr3925_firmwaresd888_5g_firmwaresmb1396_firmwarepm8998wcn6850_firmwarewsa8815_firmwaresmr546pmx24qcm2290_firmwarewcn3990pmx55_firmwareqca6595sdx24sd665_firmwaresd888_5gqpa4360pm855apmk8003_firmwaresdr660_firmwareqca6574aqpa4361smb1390_firmwarepm6150l_firmwareqtm525sd855sm4125_firmwaresd665pm6150a_firmwarepm6150_firmwarepm640pqca6574a_firmwaresdr865_firmwareqat3555sd460smb1351aqt1000_firmwarewtr2965_firmwareqcm4290sdx50mpm640asdr8150sd480_firmwareqtc801spmd9655qca6574ausa8155p_firmwareqsw6310pm8008_firmwarewcd9341_firmwarewsa8810qtc410s_firmwareqat3550pmx50sd_8csdr8250qca6696qtc800s_firmwaresmb1381_firmwarepm8004pm640lpmk8002pmm8195au_firmwaresdm830Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Wired Infrastructure and Networking
CWE ID-CWE-367
Time-of-check Time-of-use (TOCTOU) Race Condition
CVE-2020-11230
Matching Score-4
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-4
Assigner-Qualcomm, Inc.
CVSS Score-6.4||MEDIUM
EPSS-0.04% / 11.95%
||
7 Day CHG~0.00%
Published-17 Mar, 2021 | 06:00
Updated-04 Aug, 2024 | 11:28
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Potential arbitrary memory corruption when the qseecom driver updates ion physical addresses in the buffer as it exposes a physical address to user land in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Industrial IOT, Snapdragon Mobile

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-qfs2580fsm10055qpm5679_firmwaresa6150p_firmwareqdm5579qdm2307qca6431_firmwareqfs2608_firmwareqfs2530qpm8870_firmwareqpa8802wcd9360_firmwareqpm6585_firmwareqat3519qbt2000_firmwareqat5522_firmwarepm855a_firmwarepm8150aqtc800hqdm5670sa8150p_firmwaresdr8250_firmwareqpa5581_firmwarepm7150lqpa8821smr546_firmwareqdm5671qpm4650_firmwareqat3518qpa5580_firmwarewcn3998smr526_firmwareqdm2305_firmwareqpm5670_firmwareqdm5652qca6574au_firmwareqpm8870wcn3998_firmwareqpm5679qbt2000pm855pqca6420wcd9360qpm6670_firmwarepmx50_firmwarewhs9410_firmwaresdr735gpm8150bqdm3301_firmwareqsm7250qca6430pmr735asd765gqdm2308_firmwareqca6436wcn6851sa6155pqpa6560qfs2630_firmwaresdr865qdm5620_firmwarewcd9341sm7350_firmwaresmr545qdm4643_firmwareqca6696_firmwareqca6431qln5020sd870_firmwareqdm3302sd_8cxsa8150pqdm5621qpm5875_firmwareqat3514_firmwarewsa8830_firmwaresd855_firmwaresd865_5g_firmwareqdm5650sdr052sa8195p_firmwaresmb1390qat5516_firmwarepm855l_firmwareqpa8686_firmwareqpm6585wcn3991wcd9380_firmwaresmb1355qln4650qpa8801sdr735g_firmwarepm8350bhs_firmwareqat5568qet5100qdm5671_firmwareqpa8801_firmwarepm8150l_firmwareqat5533_firmwaresdx55m_firmwareqtm527_firmwarewcn6856_firmwareqpa8673_firmwareqet4101_firmwarepm7250bqln4642_firmwareqfs2630qpa8842sdr052_firmwarewcd9380smb1355_firmwarepm7250b_firmwarepmk8350_firmwarepm855p_firmwaresdx50m_firmwaresdr735pm7250smb1395qpa8803smr526qca6430_firmwareqtc801s_firmwarepm7350c_firmwareqdm2301wsa8815wcn6850qdm5621_firmwareqdm2301_firmwaresmb1394qca6426_firmwarepm8350_firmwarepm8009sdr051_firmwaresdx55mqca6421_firmwarewcn6740_firmwarepm8008pm8350b_firmwareqtm525_firmwareqat3518_firmwareqpm5621_firmwarepm855lwcn6851_firmwareqdm5670_firmwareqpa6560_firmwareqpa8802_firmwarepm7150a_firmwarepm8150b_firmwareqpm5621qpm6582smr545_firmwarepm8009_firmwareqdm2310_firmwareqfs2580_firmwaresd870pm8150lqdm5677sa6145ppm855_firmwarepmm6155aupm855b_firmwareqpm6582_firmwareqca6391_firmwareqln4650_firmwareqat3516_firmwareqpm5875sdx55qet5100msa8155ppm8350bhsqet4101qat3555_firmwareqat3516qpa8803_firmwareqpm5658pm855bqpm5658_firmwareqpm5870wcn3991_firmwareqdm5652_firmwarewsa8830pmm8155au_firmwaresdr051qet6110_firmwareqdm5579_firmwareqln5030qpa5581qpa2625_firmwarepm8350bh_firmwarepmr735b_firmwarefsm10055_firmwareqet5100_firmwareqpm5870_firmwareqpm4621qet6100_firmwareqet6100sd765g_firmwareqpa8686qca6420_firmwaresmb1394_firmwareqca6390_firmwaresmb1396pm7150apm8350qpa5461_firmwarepm8350c_firmwarepmr525_firmwareqca6426wcn3990_firmwareqpm5641sd_8cx_firmwarewcd9385_firmwareqdm5650_firmwaresdxr2_5g_firmwarewhs9410qat5516pm7250_firmwareqdm5620qpa8821_firmwarepm8350bhpmk8002_firmwarepm3003aqdm4650_firmwaresdx55_firmwarepmm6155au_firmwareqat5533sm7250p_firmwareqca6436_firmwaresm7350qsm7250_firmwareqpm6670pm7150l_firmwareqdm2305sa6155p_firmwareqpm8820qpm4641qat5515_firmwareqln5020_firmwarepm855sdxr2_5gpm8250smb1398qdm4643qfs2530_firmwarepmx55qpm4641_firmwaresa6145p_firmwarepm8150c_firmwareqca6421qdm3301qpa8842_firmwareqat3519_firmwaresa8195psdr735_firmwarewsa8810_firmwareqpm5677qat5515sd765_firmwareqat3514qdm5677_firmwarepm8004_firmwaresdr8150_firmwarewcd9385qtc800h_firmwarepmk7350_firmwarepmm8155auqln5040_firmwareqpm4630qca6390aqt1000qpa8673qdm2310pmm8195auqln5030_firmwareqln4642qpm5677_firmwarewsa8815_firmwaresd888_5g_firmwaresmr525_firmwaresmb1396_firmwarepmk7350wcn6850_firmwareqpm8820_firmwarewsa8835_firmwareqpm6621_firmwaresmr546qet6110qln5040qpm8895qpm5670wcn3990pmx55_firmwareqtm527sd865_5gpmk8350smb1398_firmwareqdm3302_firmwarepm8350bqat5522qdm2307_firmwarewsa8835pm8150cpmr735bsd888_5gpm855aqpm4640_firmwaresmb1390_firmwareqdm5679_firmwarepm8350csmr525qpm4640pmr525pm7350cpm8150a_firmwareqet5100m_firmwareqpm4650qtm525sd855sd765qpm4630_firmwaresd768g_firmwaresdr865_firmwareqat3555pm8250_firmwareqca6391qpa5461aqt1000_firmwareqpm8895_firmwaresdx50msdr8150qfs2608qtc801ssmb1395_firmwareqdm4650qca6574auqpm5641_firmwaresa8155p_firmwarepm8008_firmwarewcd9341_firmwareqpm6621wsa8810pmr735a_firmwareqat5568_firmwareqdm2308pmx50wcn6856qdm5679sdr8250sd768gpm3003a_firmwarewcn6740qca6696pm8004pmk8002qpa2625sa6150ppmm8195au_firmwaresm7250pqpm4621_firmwareqpa5580Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Industrial IOT, Snapdragon Mobile
CWE ID-CWE-367
Time-of-check Time-of-use (TOCTOU) Race Condition
CVE-2020-9939
Matching Score-4
Assigner-Apple Inc.
ShareView Details
Matching Score-4
Assigner-Apple Inc.
CVSS Score-6.4||MEDIUM
EPSS-0.04% / 12.23%
||
7 Day CHG~0.00%
Published-22 Oct, 2020 | 18:06
Updated-04 Aug, 2024 | 10:50
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

This issue was addressed with improved checks. This issue is fixed in macOS Catalina 10.15.6. A local user may be able to load unsigned kernel extensions.

Action-Not Available
Vendor-Apple Inc.
Product-mac_os_xmacOS
CWE ID-CWE-367
Time-of-check Time-of-use (TOCTOU) Race Condition
CVE-2020-8354
Matching Score-4
Assigner-Lenovo Group Ltd.
ShareView Details
Matching Score-4
Assigner-Lenovo Group Ltd.
CVSS Score-6.4||MEDIUM
EPSS-0.03% / 7.58%
||
7 Day CHG~0.00%
Published-11 Nov, 2020 | 17:35
Updated-04 Aug, 2024 | 09:56
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A potential vulnerability in the SMI callback function used in the VariableServiceSmm driver in some Lenovo Notebook models may allow arbitrary code execution.

Action-Not Available
Vendor-Lenovo Group Limited
Product-notebook_firmwarenotebookBIOS
CWE ID-CWE-367
Time-of-check Time-of-use (TOCTOU) Race Condition
CVE-2020-8332
Matching Score-4
Assigner-Lenovo Group Ltd.
ShareView Details
Matching Score-4
Assigner-Lenovo Group Ltd.
CVSS Score-6.4||MEDIUM
EPSS-0.03% / 8.34%
||
7 Day CHG~0.00%
Published-14 Oct, 2020 | 21:25
Updated-04 Aug, 2024 | 09:56
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A potential vulnerability in the SMI callback function used in the legacy BIOS mode USB drivers in some legacy Lenovo and IBM System x servers may allow arbitrary code execution. Servers operating in UEFI mode are not affected.

Action-Not Available
Vendor-IBM CorporationLenovo Group Limited
Product-system_x3530_m4_firmwarebladecenter_hs23e_firmwarebladecenter_hs23esystem_x3630_m4_firmwaresystem_x3630_m4flex_system_x220nextscale_nx360_m4_firmwaresystem_x3650_m4_firmwarenextscale_nx360_m4idataplex_dx360_m4_firmwaresystem_x3650_m4_hd_firmwarebladecenter_hs23system_x3300_m4system_x3650_m4_hdflex_system_x440_firmwaresystem_x3750_m4_firmwaresystem_x3550_m4system_x3650_m4_bd_firmwarecompute_node-x440_firmwareidataplex_dx360_m4flex_system_x220_firmwaresystem_x3650_m4_bdbladecenter_hs23_firmwaresystem_x3750_m4system_x3550_m4_firmwaresystem_x3500_m4_firmwaresystem_x3300_m4_firmwaresystem_x3500_m4system_x3530_m4idataplex_dx360_m4_water_cooledflex_system_x240_firmwareflex_system_x240system_x3650_m4compute_node-x440idataplex_dx360_m4_water_cooled_firmwareflex_system_x440System x
CWE ID-CWE-367
Time-of-check Time-of-use (TOCTOU) Race Condition
CVE-2020-27014
Matching Score-4
Assigner-Trend Micro, Inc.
ShareView Details
Matching Score-4
Assigner-Trend Micro, Inc.
CVSS Score-6.4||MEDIUM
EPSS-0.06% / 18.83%
||
7 Day CHG~0.00%
Published-29 Oct, 2020 | 23:45
Updated-04 Aug, 2024 | 16:03
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Trend Micro Antivirus for Mac 2020 (Consumer) contains a race condition vulnerability in the Web Threat Protection Blocklist component, that if exploited, could allow an attacker to case a kernel panic or crash.\n\n\r\nAn attacker must first obtain the ability to execute high-privileged code on the target system in order to exploit this vulnerability.

Action-Not Available
Vendor-Trend Micro Incorporated
Product-antivirusTrend Micro Antivirus for Mac (Consumer)
CWE ID-CWE-367
Time-of-check Time-of-use (TOCTOU) Race Condition
CVE-2023-28576
Matching Score-4
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-4
Assigner-Qualcomm, Inc.
CVSS Score-6.4||MEDIUM
EPSS-0.02% / 4.69%
||
7 Day CHG~0.00%
Published-08 Aug, 2023 | 09:15
Updated-02 Aug, 2024 | 13:43
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Time-of-check Time-of-use (TOCTOU) Race Condition in Camera Kernel Driver

The buffer obtained from kernel APIs such as cam_mem_get_cpu_buf() may be readable/writable in userspace after kernel accesses it. In other words, user mode may race and modify the packet header (e.g. header.count), causing checks (e.g. size checks) in kernel code to be invalid. This may lead to out-of-bounds read/write issues.

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-fastconnect_7800snapdragon_865_5gwcd9380_firmwarewsa8830qcs610sw5100psd865_5gfastconnect_6900fastconnect_6800fastconnect_6900_firmwaresnapdragon_8_gen_1_firmwarewcn3988_firmwareqcn9074snapdragon_870_5gwsa8835wcn3950_firmwaresnapdragon_8_gen_1wsa8810_firmwarewcd9380wcd9341_firmwarefastconnect_7800_firmwaresw5100wsa8810qca6436qcs410snapdragon_865\+_5gsnapdragon_x55_5gqcs610_firmwaresw5100p_firmwaresxr2130wcd9370snapdragon_865\+_5g_firmwarewcn3680bqca6426sxr2130_firmwarewcd9341wcn3980qca6391_firmwarewcn3950snapdragon_xr2_5g_firmwarewcd9370_firmwarewcn3660bwsa8815snapdragon_870_5g_firmwarewsa8830_firmwaresd865_5g_firmwareqca6426_firmwarewcn3660b_firmwarewcn3988wsa8815_firmwaresnapdragon_x55_5g_firmwarewcn3680b_firmwarewsa8835_firmwaresw5100_firmwareqcn9074_firmwarefastconnect_6800_firmwareqcs410_firmwaresnapdragon_865_5g_firmwareqca6391wcn3980_firmwareqca6436_firmwaresnapdragon_xr2_5gSnapdragon
CWE ID-CWE-367
Time-of-check Time-of-use (TOCTOU) Race Condition
CVE-2023-20578
Matching Score-4
Assigner-Advanced Micro Devices Inc.
ShareView Details
Matching Score-4
Assigner-Advanced Micro Devices Inc.
CVSS Score-7.5||HIGH
EPSS-0.02% / 4.11%
||
7 Day CHG~0.00%
Published-13 Aug, 2024 | 16:52
Updated-18 Mar, 2025 | 20:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A TOCTOU (Time-Of-Check-Time-Of-Use) in SMM may allow an attacker with ring0 privileges and access to the BIOS menu or UEFI shell to modify the communications buffer potentially resulting in arbitrary code execution.

Action-Not Available
Vendor-Advanced Micro Devices, Inc.
Product-epyc_9224epyc_7303epyc_7f32epyc_9754s_firmwareepyc_7272_firmwareepyc_7313pepyc_7402p_firmwareepyc_7663_firmwareepyc_7301epyc_7662_firmwareepyc_9254_firmwareepyc_7203pepyc_7313p_firmwareepyc_9174f_firmwareepyc_9384x_firmwareepyc_7551_firmwareepyc_7232p_firmwareepyc_7443pepyc_9634epyc_7203epyc_7252_firmwareepyc_7551pepyc_7742epyc_7262epyc_8324pepyc_7663epyc_9124_firmwareepyc_7713epyc_7371_firmwareepyc_9684xepyc_7351p_firmwareepyc_7262_firmwareepyc_7501epyc_7552epyc_7451_firmwareepyc_8434pn_firmwareepyc_9454p_firmwareepyc_7773x_firmwareepyc_7302p_firmwareepyc_9754sepyc_72f3_firmwareepyc_7543pepyc_7573x_firmwareepyc_8534pnepyc_7702p_firmwareepyc_7702pepyc_7702_firmwareepyc_9124epyc_9224_firmwareepyc_7502epyc_7513_firmwareepyc_8534pepyc_7763epyc_8224p_firmwareepyc_7h12_firmwareepyc_7281epyc_9754_firmwareepyc_7543_firmwareepyc_7001_firmwareepyc_8024pnepyc_7473xepyc_75f3epyc_8434pepyc_9354epyc_8434pnepyc_74f3epyc_7303pepyc_9474fepyc_9634_firmwareepyc_7502p_firmwareepyc_7302pepyc_9684x_firmwareepyc_9384xepyc_8534p_firmwareepyc_9554pepyc_72f3epyc_7552_firmwareepyc_7272epyc_8224pnepyc_8124p_firmwareepyc_7453_firmwareepyc_7713p_firmwareepyc_9334_firmwareepyc_74f3_firmwareepyc_7282_firmwareepyc_7473x_firmwareepyc_7281_firmwareepyc_7001epyc_7f72_firmwareepyc_7642_firmwareepyc_7401epyc_7f52_firmwareepyc_7f72epyc_9734epyc_7502pepyc_7551p_firmwareepyc_9184xepyc_7371epyc_9654epyc_8324pnepyc_8124pnepyc_7663pepyc_7343epyc_7313epyc_7402_firmwareepyc_7402pepyc_9454_firmwareepyc_7742_firmwareepyc_7542_firmwareepyc_8124pn_firmwareepyc_7413_firmwareepyc_9654p_firmwareepyc_9474f_firmwareepyc_9534epyc_9374fepyc_7643_firmwareepyc_7261epyc_7452_firmwareepyc_7642epyc_7401_firmwareepyc_7f32_firmwareepyc_7203p_firmwareepyc_7543p_firmwareepyc_7601epyc_9654_firmwareepyc_7251epyc_7352_firmwareepyc_9554_firmwareepyc_7763_firmwareepyc_9654pepyc_9454pepyc_7252epyc_7232pepyc_7543epyc_7301_firmwareepyc_7713_firmwareepyc_7643epyc_7663p_firmwareepyc_7662epyc_8224pn_firmwareepyc_7351epyc_7502_firmwareepyc_9274f_firmwareepyc_7532epyc_7501_firmwareepyc_7343_firmwareepyc_7643pepyc_7702epyc_7573xepyc_9534_firmwareepyc_7302epyc_7303_firmwareepyc_7513epyc_9184x_firmwareepyc_7413epyc_7453epyc_9354_firmwareepyc_8224pepyc_9374f_firmwareepyc_7443p_firmwareepyc_75f3_firmwareepyc_7h12epyc_7401p_firmwareepyc_7282epyc_7251_firmwareepyc_7373x_firmwareepyc_9254epyc_9354p_firmwareepyc_7551epyc_8024pepyc_7443_firmwareepyc_7443epyc_8024p_firmwareepyc_7203_firmwareepyc_7402epyc_9554p_firmwareepyc_7313_firmwareepyc_7601_firmwareepyc_9734_firmwareepyc_7643p_firmwareepyc_7542epyc_7452epyc_7352epyc_7261_firmwareepyc_8324p_firmwareepyc_9354pepyc_7451epyc_9174fepyc_7351_firmwareepyc_7773xepyc_7373xepyc_7532_firmwareepyc_73f3epyc_8434p_firmwareepyc_9274fepyc_8534pn_firmwareepyc_7713pepyc_9754epyc_7401pepyc_7f52epyc_8124pepyc_9454epyc_8324pn_firmwareepyc_9334epyc_7302_firmwareepyc_8024pn_firmwareepyc_73f3_firmwareepyc_7303p_firmwareepyc_9554epyc_7351pAMD EPYC™ Embedded 3000AMD Ryzen™ Embedded 7000AMD EPYC™ 7001 ProcessorsAMD Ryzen™ 6000 Series Processors with Radeon™ GraphicsAMD EPYC™ 7003 ProcessorsAMD EPYC™ Embedded 7003AMD EPYC™ 9004 ProcessorsAMD EPYC™ 7002 ProcessorsAMD RyzenTM Embedded V3000AMD Ryzen™ 7035 Series Processors with Radeon™ GraphicsAMD EPYC™ Embedded 9003AMD EPYC™ Embedded 7002AMD Ryzen™ Threadripper™ PRO 5000WX ProcessorsAMD Ryzen™ 7020 Series Processors with Radeon™ GraphicsAMD Ryzen™ 7000 Series Desktop Processorsepyc_embedded_7002epyc_embedded_7003epyc_embedded_3000epyc_7001epyc_embedded_9003epyc_7002epyc_9004ryzen_embedded_7000ryzen_embedded_v3000
CWE ID-CWE-367
Time-of-check Time-of-use (TOCTOU) Race Condition
CVE-2024-5558
Matching Score-4
Assigner-Schneider Electric
ShareView Details
Matching Score-4
Assigner-Schneider Electric
CVSS Score-6.4||MEDIUM
EPSS-0.05% / 15.13%
||
7 Day CHG~0.00%
Published-12 Jun, 2024 | 16:26
Updated-01 Aug, 2024 | 21:18
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

CWE-367: Time-of-check Time-of-use (TOCTOU) Race Condition vulnerability exists that could cause escalation of privileges when an attacker abuses a limited admin account.

Action-Not Available
Vendor-
Product-SpaceLogic AS-BSpaceLogic AS-Pspacelogic_as-pspacelogic_as-b
CWE ID-CWE-367
Time-of-check Time-of-use (TOCTOU) Race Condition
CVE-2022-21198
Matching Score-4
Assigner-Intel Corporation
ShareView Details
Matching Score-4
Assigner-Intel Corporation
CVSS Score-7.9||HIGH
EPSS-0.03% / 7.62%
||
7 Day CHG~0.00%
Published-11 Nov, 2022 | 15:49
Updated-04 Feb, 2025 | 18:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Time-of-check time-of-use race condition in the BIOS firmware for some Intel(R) Processors may allow a privileged user to potentially enable escalation of privilege via local access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-celeron_g5920celeron_5205ucore_i7-11850hceleron_g5925_firmwarecore_i5-11500tpentium_gold_g7400tcore_i7-12650hceleron_n2808_firmwareceleron_g1830core_i5-10310ycore_i3-10100t_firmwarecore_i5-12600_firmwarecore_i5-1145g7ecore_i7-10510ucore_i5-11300hpentium_gold_4415y_firmwareceleron_g1630core_i5-1030g7_firmwarecore_i7-11800hxeon_w-2223core_i5-10600tpentium_gold_4417u_firmwareceleron_g1820tecore_i7-1165g7core_i3-1220pe_firmwarecore_i5-10300hceleron_j3455_firmwareceleron_b800core_i9-12900h_firmwarecore_i3-1120g4_firmwarecore_i7-11370hcore_i7-1255uceleron_j4025core_i3-1215uceleron_b710core_i3-10105tcore_i5-1155g7_firmwarecore_i5-12600hlcore_i7-10710uceleron_n6210_firmwarecore_i9-11900t_firmwarepentium_gold_g6500celeron_g550txeon_w-3235_firmwarepentium_silver_n6005core_i7-11800h_firmwareceleron_847core_i3-11100he_firmwareceleron_g4900t_firmwareceleron_g5205u_firmwareceleron_g3900_firmwareceleron_n2805_firmwarecore_i7-12800h_firmwareceleron_n3350e_firmwarecore_i5-11600kf_firmwarecore_i5-10400hceleron_g4900_firmwarecore_i9-10900tecore_i5-1230u_firmwareceleron_1017upentium_gold_g6405_firmwarecore_i5-1145g7core_i3-10300celeron_n3050_firmwareceleron_807ue_firmwarecore_i5-1130g7core_i5-12600k_firmwareceleron_g3900t_firmwarecore_i5-1030g4_firmwarexeon_w-3365_firmwarexeon_w-1390t_firmwarepentium_gold_g5400t_firmwarecore_i3-1115g4ecore_i9-11900kf_firmwarecore_i5-12500core_i5-1245uecore_i7-1280p_firmwarepentium_gold_g5420_firmwareceleron_g460_firmwareceleron_g4900celeron_n4000core_i7-11370h_firmwarepentium_gold_g5620_firmwarexeon_w-1350_firmwarecore_i7-1068ng7xeon_w-2275_firmwarecore_i7-11390hceleron_j6412core_i9-11900fceleron_g5905t_firmwarecore_i3-1215uecore_i5-10500txeon_w-1290t_firmwarecore_i5-12600kfcore_i9-10900kfceleron_g5925core_i5-11400hceleron_2981uceleron_3965ycore_i5-12500hlceleron_2980u_firmwarecore_i5-11400tcore_i7-10810uceleron_g4930_firmwarepentium_gold_g7400t_firmwareceleron_g3900e_firmwarecore_i3-12100eceleron_b830_firmwarecore_i7-11700kfceleron_g465core_i3-10300_firmwarecore_i3-10320_firmwareceleron_g3900te_firmwarepentium_gold_g5600tcore_i3-1115g4e_firmwarecore_i7-12800hcore_i5-1135g7_firmwarepentium_gold_8505_firmwarecore_i3-10105_firmwareceleron_6600he_firmwareceleron_1017u_firmwareceleron_5205u_firmwareceleron_g3920t_firmwareceleron_n2820core_i3-11100hecore_i5-1035g4core_i9-12900kfceleron_g1840tceleron_n3150core_i7-10700fceleron_j4105core_i7-11390h_firmwarecore_i5-1145g7e_firmwarecore_i5-12500hl_firmwarecore_i7-12650h_firmwarecore_i3-10110y_firmwarexeon_w-2235core_i5-1250pcore_i5-11300h_firmwareceleron_g465_firmwarecore_i3-1215u_firmwarecore_i5-1035g7_firmwareceleron_g3930exeon_w-1250pentium_gold_g6605_firmwareceleron_2970mceleron_n4000c_firmwarecore_i7-10700e_firmwarecore_i7-1265ulceleron_g3900ecore_i7-11375h_firmwarecore_i5-1035g4_firmwareceleron_g4930t_firmwareceleron_g3930tecore_i3-1115g4core_i3-10300tceleron_g3902ecore_i3-10110ycore_i5-12450h_firmwarecore_i5-12600heceleron_g1620tceleron_1019yceleron_1020mcore_i9-11900kfceleron_797core_i3-10100_firmwareceleron_j3455e_firmwarecore_i7-12800hecore_i9-10980hk_firmwarecore_i5-1245ul_firmwareceleron_g6900t_firmwarexeon_w-1270p_firmwareceleron_n2930_firmwarecore_i7-11850he_firmwarexeon_w-3275mpentium_gold_4425y_firmwarepentium_gold_4415u_firmwareceleron_2957ucore_i3-12100celeron_g3900core_i7-1195g7core_i3-12300_firmwarepentium_gold_g5600_firmwareceleron_g3930tceleron_g4920core_i7-1260upentium_gold_g6600_firmwarexeon_w-3375celeron_n3700celeron_3855uceleron_n6211core_i5-1240u_firmwarecore_i7-1185g7e_firmwareceleron_g5305ucore_i5-12500hcore_i7-12850hx_firmwarepentium_gold_g5620core_i3-1210ucore_i7-12800hx_firmwarexeon_w-1290p_firmwareceleron_g1610_firmwareceleron_n3000core_i7-10875hceleron_j3060_firmwareceleron_3765u_firmwarecore_i5-12500ecore_i7-12700hxeon_w-1390celeron_g1830_firmwareceleron_g4930e_firmwarecore_i5-11500he_firmwareceleron_n3520_firmwareceleron_877celeron_n2807core_i7-12700_firmwareceleron_n2830celeron_n4000_firmwarecore_i9-10850kceleron_827ecore_i5-1145g7_firmwarecore_i7-11700k_firmwarecore_i7-1265uceleron_j1800core_i5-1230uceleron_g550_firmwarecore_i7-1270p_firmwarepentium_gold_4410y_firmwareceleron_g3930te_firmwarexeon_w-1370pcore_i9-12900kf_firmwarepentium_gold_g5500tcore_i5-12400core_i7-12700fcore_i7-10700kf_firmwareceleron_n3000_firmwareceleron_g3930t_firmwareceleron_g5305u_firmwareceleron_7300celeron_j6413celeron_n4020c_firmwarecore_i7-1180g7_firmwareceleron_b800_firmwarecore_i9-12900k_firmwarexeon_w-3265celeron_n2940core_i3-12100tcore_i7-1160g7celeron_n2840_firmwarecore_i9-10900ecore_i9-11900_firmwareceleron_n4000cceleron_n3450_firmwarexeon_w-3375_firmwareceleron_b810e_firmwareceleron_g3940celeron_1007u_firmwarecore_i3-1115g4_firmwarecore_i9-10900te_firmwareceleron_n6210celeron_847_firmwareceleron_g555_firmwarecore_i5-1245u_firmwareceleron_g5205ucore_i5-1235ulcore_i3-10100xeon_w-1390_firmwarecore_i5-11320hcore_i7-10750hcore_i9-11900celeron_4205ucore_i3-10100tcore_i5-10500h_firmwareceleron_3865u_firmwarecore_i5-11500pentium_gold_g6500t_firmwarepentium_gold_7505_firmwareceleron_g3950celeron_g440_firmwarecore_i3-12100texeon_w-1290celeron_g530t_firmwareceleron_n2810_firmwarexeon_w-2295_firmwarepentium_gold_g5420t_firmwarecore_i5-10500te_firmwarecore_i9-12900ksceleron_g530tcore_i3-10320xeon_w-3345_firmwarecore_i5-10310u_firmwareceleron_g3920_firmwareceleron_n4504_firmwarecore_i5-12450hceleron_j6412_firmwarecore_i7-10710u_firmwarecore_i5-12600hl_firmwarecore_i5-10600kf_firmwareceleron_g5900_firmwareceleron_n3160_firmwareceleron_807core_i5-12500tceleron_b815celeron_4305uecore_i5-10400t_firmwarexeon_w-3275celeron_n5100celeron_857_firmwarecore_i5-12600hceleron_j4005core_i3-10105t_firmwarecore_i3-12100t_firmwarecore_i5-1250pe_firmwarecore_i7-10870h_firmwarexeon_w-1290pcore_i5-10500tecore_i7-10700kfceleron_j4125_firmwarecore_i7-1185g7ecore_i3-10100tecore_i5-12600celeron_g470core_i7-10700_firmwarecore_i7-12700tcore_i9-12900epentium_gold_g5600t_firmwarecore_i9-12900hkpentium_gold_6500y_firmwarexeon_w-2235_firmwareceleron_n3700_firmwarexeon_w-2245_firmwareceleron_n3450celeron_g540xeon_w-2223_firmwarecore_i3-1220p_firmwarecore_i7-1160g7_firmwareceleron_n2920core_i5-12400f_firmwarecore_i7-11700_firmwarecore_i5-10505_firmwarecore_i7-10700te_firmwarecore_i5-10300h_firmwarexeon_w-2225_firmwareceleron_3755u_firmwareceleron_j4115xeon_w-3335_firmwareceleron_4305uceleron_867_firmwareceleron_g1610t_firmwarecore_i3-1125g4_firmwarecore_i5-12400t_firmwarecore_i7-11600h_firmwarexeon_w-2255core_i3-10105fxeon_w-3225_firmwareceleron_n2910core_i7-1065g7_firmwareceleron_j4115_firmwarecore_i7-10700f_firmwarecore_i7-1265ul_firmwarecore_i3-10300t_firmwarecore_i5-11600kcore_i9-10900kf_firmwarecore_i5-11400t_firmwareceleron_g6900core_i3-10110u_firmwarecore_i5-12600t_firmwarepentium_gold_g6405t_firmwareceleron_6305_firmwarexeon_w-1270_firmwareceleron_3955u_firmwarecore_i7-10700tcore_i7-12700core_i7-12700kf_firmwareceleron_3955uxeon_w-1350celeron_1020e_firmwarepentium_gold_g5400_firmwareceleron_n3150_firmwarecore_i5-1140g7_firmwarecore_i5-1038ng7_firmwarecore_i5-11500h_firmwarecore_i7-11600hxeon_w-3323celeron_n4020_firmwarecore_i9-10900celeron_7305_firmwarecore_i5-1235ucore_i7-11375hcore_i7-12700eceleron_2955uceleron_n5100_firmwareceleron_g3900tceleron_n4504core_i7-1255ul_firmwarecore_i7-12800hl_firmwarepentium_gold_4425ycore_i7-1250u_firmwarecore_i5-10400tcore_i3-10100y_firmwareceleron_g555core_i3-12300t_firmwarepentium_gold_g6405tceleron_3965y_firmwareceleron_g3930celeron_g1610tcore_i5-10400_firmwarecore_i5-12600kf_firmwarecore_i9-12900teceleron_g1840_firmwarexeon_w-2255_firmwarecore_i5-10500hcore_i7-10700kcore_i7-10700ecore_i9-10900tcore_i9-10900f_firmwarecore_i9-12950hxxeon_w-1370_firmwareceleron_b810_firmwarecore_i5-11500hpentium_gold_g6505_firmwareceleron_j4125xeon_w-1350p_firmwarecore_i5-11600_firmwarecore_i5-10400f_firmwareceleron_3865uxeon_w-3223core_i9-11900h_firmwarepentium_gold_8505celeron_1019y_firmwarecore_i3-12300celeron_g5905_firmwareceleron_n2840celeron_725c_firmwarecore_i5-1035g1celeron_797_firmwarecore_i5-12500_firmwarecore_i7-11850h_firmwarepentium_gold_g6505t_firmwareceleron_g540tcore_i7-10510yceleron_n4020cceleron_j6413_firmwarecore_i5-11320h_firmwarexeon_w-2295celeron_6305e_firmwarecore_i3-12100e_firmwarecore_i7-1068ng7_firmwareceleron_b810exeon_w-2225core_i5-11600t_firmwarecore_i3-10100fcore_i7-10750h_firmwareceleron_b720_firmwarecore_i5-1035g7core_i7-10870hcore_i5-11500hecore_i3-12300he_firmwarecore_i7-11700t_firmwarecore_i7-1185g7core_i9-11900f_firmwarecore_i9-12900hpentium_gold_g6605celeron_n4120core_i5-10500_firmwareceleron_n6211_firmwareceleron_807_firmwareceleron_j4105_firmwarecore_i9-11900kceleron_847e_firmwarecore_i5-12450hxceleron_n4100core_i9-10900kceleron_b720core_i7-10700t_firmwarepentium_gold_6405u_firmwarecore_i9-10900fcore_i9-12900core_i5-10500exeon_w-2265core_i7-1270pecore_i9-12900ks_firmwarecore_i7-11700celeron_g550t_firmwareceleron_g440celeron_g4900tcore_i5-10200h_firmwareceleron_g3930_firmwarecore_i5-11600k_firmwareceleron_j1900core_i5-10500pentium_gold_8500_firmwarecore_i9-12900hxceleron_g1820tcore_i9-11950h_firmwarecore_i5-10210y_firmwarepentium_silver_n6005_firmwarepentium_gold_4415ypentium_gold_g6405xeon_w-3275m_firmwareceleron_n2806_firmwareceleron_g1820core_i5-1245ue_firmwarepentium_gold_g6400_firmwarecore_i5-10600t_firmwareceleron_j1850_firmwarecore_i9-12950hx_firmwareceleron_4305ue_firmwarecore_i3-1115gre_firmwareceleron_n5105celeron_g5920_firmwareceleron_5305u_firmwarecore_i5-12400tceleron_g460core_i7-10610uceleron_b815_firmwarecore_i9-12900te_firmwarepentium_gold_g5420tcore_i3-1005g1_firmwareceleron_n3350xeon_w-3245m_firmwarexeon_w-3345core_i9-10900k_firmwarepentium_gold_g7400_firmwarecore_i9-10900_firmwareceleron_g470_firmwareceleron_j3060core_i3-1125g4celeron_g5905core_i7-11700kf_firmwarepentium_gold_g7400core_i9-12900tcore_i5-11500t_firmwarexeon_w-3365core_i7-1280pcore_i3-10105f_firmwarepentium_gold_g6505xeon_w-2265_firmwareceleron_6305xeon_w-1350pceleron_2957u_firmwareceleron_j4005_firmwareceleron_725cceleron_887pentium_gold_g6505txeon_w-1390tceleron_6305ecore_i5-12600tcore_i9-10900t_firmwarexeon_w-3323_firmwareceleron_1005mcore_i7-12700teceleron_j3160core_i5-10600kcore_i5-11260hceleron_5305ucore_i5-1245ulcore_i5-12500teceleron_887_firmwareceleron_n4500core_i5-12600hxceleron_g1630_firmwarecore_i3-1005g1core_i5-1250peceleron_j4025_firmwareceleron_n2820_firmwarecore_i7-1250ucore_i5-11600core_i7-1265u_firmwarecore_i9-10885h_firmwareceleron_867core_i5-1240pxeon_w-1290txeon_w-1370celeron_1000m_firmwarepentium_gold_g5500core_i3-1110g4_firmwareceleron_n2940_firmwareceleron_g3920core_i7-1255u_firmwarepentium_gold_6405uceleron_g1820_firmwarecore_i5-11400h_firmwareceleron_g530_firmwarecore_i5-1235ul_firmwareceleron_g4950_firmwareceleron_g1850_firmwareceleron_g4930xeon_w-2275celeron_b820_firmwareceleron_807uecore_i9-12900t_firmwarecore_i5-10200hceleron_n3060_firmwarexeon_w-3275_firmwarexeon_w-3235xeon_w-3245_firmwareceleron_6600hecore_i5-1240p_firmwarecore_i5-10210ucore_i7-11700tcore_i3-12300tcore_i3-10100e_firmwareceleron_j3355e_firmwarecore_i3-1215ulceleron_g3902e_firmwarecore_i3-1000g1_firmwareceleron_b820core_i3-12300hlcore_i7-12850hxcore_i5-12400fceleron_g4950celeron_7300_firmwarecore_i3-1210u_firmwarecore_i9-12900kcore_i3-1220pecore_i9-12900hk_firmwareceleron_n5095pentium_gold_g6600celeron_j3160_firmwarepentium_gold_g5500t_firmwarecore_i5-11400f_firmwarecore_i5-10210ycore_i9-10885hxeon_w-2245celeron_847ecore_i3-10305t_firmwareceleron_g550core_i5-11500_firmwareceleron_1020ecore_i9-11900hceleron_j1750celeron_g540_firmwarecore_i5-1030g7core_i7-10875h_firmwarecore_i5-11600tcore_i5-1240ucore_i7-10700k_firmwareceleron_g3920tceleron_g6900_firmwarecore_i3-10305tpentium_gold_g6400celeron_1007ucore_i7-1260pcore_i3-10325_firmwarexeon_w-1270pceleron_7305celeron_j1850pentium_gold_5405u_firmwarecore_i5-10600k_firmwarecore_i3-12300hepentium_gold_4417ucore_i3-10100epentium_gold_6500yceleron_4305u_firmwarecore_i7-11700fcore_i5-10600_firmwarecore_i7-12700te_firmwareceleron_g1610pentium_gold_4410ycore_i5-10400h_firmwareceleron_3755uceleron_787_firmwarecore_i7-10610u_firmwareceleron_n3010celeron_827e_firmwarepentium_gold_4415uceleron_j3355_firmwarecore_i7-1260p_firmwarecore_i7-1265ue_firmwarecore_i3-1220pcore_i3-12100te_firmwareceleron_857core_i5-1030g4celeron_1047uecore_i5-12600hx_firmwarecore_i7-12700hlxeon_w-1290_firmwarecore_i7-1180g7celeron_n5095_firmwarecore_i7-1260u_firmwareceleron_n4505_firmwareceleron_n5105_firmwareceleron_3965ucore_i7-10850hpentium_gold_g5600core_i7-12650hx_firmwarecore_i5-11600kfpentium_gold_g6400t_firmwareceleron_g3930e_firmwarepentium_gold_g6400tcore_i3-1000g4core_i7-1270pe_firmwarecore_i5-1245uceleron_2980uceleron_2981u_firmwareceleron_g4930tcore_i5-12450hx_firmwareceleron_n4020core_i7-12650hxcore_i9-11900tceleron_1020m_firmwarecore_i3-1120g4celeron_j3455ecore_i5-12500te_firmwarecore_i5-10505core_i5-1035g1_firmwarexeon_w-1250pcore_i9-12900fcore_i5-12400_firmwareceleron_3965u_firmwareceleron_g1820t_firmwarecore_i7-12800he_firmwarecore_i5-1038ng7core_i7-10810u_firmwarecore_i9-12900f_firmwarexeon_w-3225core_i9-12900hx_firmwarecore_i5-1145greceleron_3867u_firmwarexeon_w-3265_firmwarexeon_w-3245celeron_n3350_firmwarecore_i5-12500h_firmwareceleron_n4505core_i3-12100_firmwarecore_i5-1145gre_firmwarecore_i3-10100f_firmwareceleron_n2810celeron_n4100_firmwareceleron_g1620t_firmwareceleron_1037ucore_i9-10850k_firmwarecore_i7-12700k_firmwareceleron_g5900tceleron_877_firmwarecore_i5-1155g7celeron_g3940_firmwarecore_i5-10500e_firmwarecore_i5-11400fceleron_n4120_firmwarecore_i7-12700f_firmwareceleron_2955u_firmwareceleron_g1840t_firmwareceleron_g6900tcore_i3-12100f_firmwarecore_i7-10700tecore_i5-11400core_i7-10510u_firmwareceleron_n2830_firmwareceleron_927ue_firmwarecore_i7-11700f_firmwareceleron_g5900core_i5-12500t_firmwarecore_i7-11850hecore_i7-1060g7_firmwarecore_i5-10210u_firmwareceleron_1037u_firmwarepentium_gold_7505pentium_gold_g5400core_i3-10105celeron_j3355core_i7-10850h_firmwarecore_i3-10110ucore_i7-11700kceleron_n2808celeron_g3900tecore_i5-1235u_firmwarecore_i5-10600celeron_g1820te_firmwarecore_i5-12500e_firmwarecore_i5-11260h_firmwareceleron_n3160core_i5-10400fcore_i5-1250p_firmwareceleron_1000mceleron_g1620_firmwareceleron_j3455core_i3-10100yceleron_g4920_firmwarecore_i5-12600kxeon_w-1370p_firmwarecore_i3-1110g4core_i5-1135g7pentium_gold_g6500_firmwarecore_i3-1000g1core_i5-1130g7_firmwarecore_i7-10700celeron_b840core_i3-1000g4_firmwareceleron_787core_i9-10980hkxeon_w-3265mcore_i3-10100te_firmwarexeon_w-3223_firmwareceleron_4205u_firmwarecore_i9-11900k_firmwareceleron_b710_firmwarecore_i3-12100fcore_i3-1215ul_firmwareceleron_n3520core_i7-12800hlceleron_3867uceleron_b810celeron_g4932e_firmwarepentium_gold_g5400tceleron_n2815_firmwarecore_i3-1115greceleron_g4930ecore_i7-1265uexeon_w-3265m_firmwareceleron_3765uceleron_n3010_firmwareceleron_n2805core_i7-10510y_firmwarecore_i5-11400_firmwarecore_i9-11950hceleron_g530pentium_gold_g5420celeron_j1800_firmwarexeon_w-3245mceleron_n2806celeron_g5905tceleron_n2920_firmwarecore_i7-12700kfpentium_gold_g5500_firmwarexeon_w-1250_firmwarexeon_w-3335pentium_silver_n6000_firmwarepentium_gold_g6500txeon_w-1270xeon_w-1390p_firmwarecore_i7-1185g7_firmwarecore_i5-10500t_firmwarepentium_gold_8500core_i7-12700h_firmwareceleron_g5900t_firmwarecore_i5-10310uceleron_3855u_firmwareceleron_n2910_firmwarecore_i5-12600h_firmwarecore_i5-12600he_firmwareceleron_n4500_firmwarecore_i5-1140g7core_i9-10900e_firmwarecore_i9-11980hkceleron_j1900_firmwareceleron_j1750_firmwarecore_i7-12700hl_firmwarecore_i3-10325celeron_n2930core_i7-12700kcore_i3-1215ue_firmwareceleron_927uecore_i7-1270pcore_i9-12900_firmwarepentium_silver_n6000xeon_w-1250p_firmwareceleron_n3350eceleron_g540t_firmwareceleron_n3050celeron_n2815celeron_g4932ecore_i7-1060g7xeon_w-1390pcore_i5-10600kfcore_i3-12300hl_firmwareceleron_b830core_i7-1165g7_firmwareceleron_b840_firmwarecore_i3-10305_firmwareceleron_n3060core_i9-11980hk_firmwarepentium_gold_5405uceleron_g3950_firmwarecore_i7-1185gre_firmwarecore_i3-10305core_i5-10310y_firmwarecore_i7-12700t_firmwarecore_i9-12900e_firmwareceleron_1005m_firmwareceleron_g1850core_i7-1195g7_firmwarecore_i5-10400celeron_1047ue_firmwarecore_i7-1255ulcore_i7-12800hxcore_i7-12700e_firmwarecore_i7-1065g7core_i7-1185greceleron_g1840celeron_j3355eceleron_g1620celeron_2970m_firmwareceleron_n2807_firmwareIntel(R) Processors
CWE ID-CWE-367
Time-of-check Time-of-use (TOCTOU) Race Condition
CVE-2021-35937
Matching Score-4
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-4
Assigner-Red Hat, Inc.
CVSS Score-6.4||MEDIUM
EPSS-0.01% / 0.44%
||
7 Day CHG~0.00%
Published-25 Aug, 2022 | 00:00
Updated-04 Aug, 2024 | 00:40
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A race condition vulnerability was found in rpm. A local unprivileged user could use this flaw to bypass the checks that were introduced in response to CVE-2017-7500 and CVE-2017-7501, potentially gaining root privileges. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.

Action-Not Available
Vendor-rpmn/aRed Hat, Inc.Fedora Project
Product-fedorarpmenterprise_linuxRPM
CWE ID-CWE-59
Improper Link Resolution Before File Access ('Link Following')
CWE ID-CWE-367
Time-of-check Time-of-use (TOCTOU) Race Condition
CVE-2022-32267
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-6.4||MEDIUM
EPSS-0.04% / 10.15%
||
7 Day CHG~0.00%
Published-14 Nov, 2022 | 00:00
Updated-30 Apr, 2025 | 19:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

DMA transactions which are targeted at input buffers used for the SmmResourceCheckDxe software SMI handler cause SMRAM corruption (a TOCTOU attack) DMA transactions which are targeted at input buffers used for the software SMI handler used by the SmmResourceCheckDxe driver could cause SMRAM corruption through a TOCTOU attack... This issue was discovered by Insyde engineering. Fixed in kernel Kernel 5.2: 05.27.23. Kernel 5.3: 05.36.23. Kernel 5.4: 05.44.23. Kernel 5.5: 05.52.23 https://www.insyde.com/security-pledge/SA-2022046

Action-Not Available
Vendor-n/aInsyde Software Corp. (ISC)
Product-kerneln/a
CWE ID-CWE-367
Time-of-check Time-of-use (TOCTOU) Race Condition
CVE-2022-33907
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-6.4||MEDIUM
EPSS-0.04% / 11.08%
||
7 Day CHG~0.00%
Published-14 Nov, 2022 | 00:00
Updated-30 Apr, 2025 | 19:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

DMA transactions which are targeted at input buffers used for the software SMI handler used by the IdeBusDxe driver could cause SMRAM corruption through a TOCTOU attack... DMA transactions which are targeted at input buffers used for the software SMI handler used by the IdeBusDxe driver could cause SMRAM corruption through a TOCTOU attack. This issue was discovered by Insyde engineering based on the general description provided by Intel's iSTARE group. Fixed in kernel 5.2: 05.27.25, kernel 5.3: 05.36.25, kernel 5.4: 05.44.25 https://www.insyde.com/security-pledge/SA-2022049

Action-Not Available
Vendor-n/aInsyde Software Corp. (ISC)
Product-kerneln/a
CWE ID-CWE-367
Time-of-check Time-of-use (TOCTOU) Race Condition
  • Previous
  • 1
  • 2
  • 3
  • Next
Details not found