Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
Vulnerability Details :

CVE-2022-33909

Summary
Assigner-mitre
Assigner Org ID-8254265b-2729-46b6-b9e3-3dfca2d5bfca
Published At-14 Nov, 2022 | 00:00
Updated At-30 Apr, 2025 | 18:32
Rejected At-
Credits

DMA transactions which are targeted at input buffers used for the HddPassword software SMI handler could cause SMRAM corruption through a TOCTOU attack. DMA transactions which are targeted at input buffers used for the software SMI handler used by the HddPassword driver could cause SMRAM corruption through a TOCTOU attack..This issue was discovered by Insyde engineering based on the general description provided by Intel's iSTARE group. Fixed in kernel Kernel 5.2: 05.27.23, Kernel 5.3: 05.36.23, Kernel 5.4: 05.44.23, Kernel 5.5: 05.52.23 https://www.insyde.com/security-pledge/SA-2022051

Vendors
-
Not available
Products
-
Metrics (CVSS)
VersionBase scoreBase severityVector
Weaknesses
Attack Patterns
Solution/Workaround
References
HyperlinkResource Type
EPSS History
Score
Latest Score
-
N/A
No data available for selected date range
Percentile
Latest Percentile
-
N/A
No data available for selected date range
Stakeholder-Specific Vulnerability Categorization (SSVC)
▼Common Vulnerabilities and Exposures (CVE)
cve.org
Assigner:mitre
Assigner Org ID:8254265b-2729-46b6-b9e3-3dfca2d5bfca
Published At:14 Nov, 2022 | 00:00
Updated At:30 Apr, 2025 | 18:32
Rejected At:
▼CVE Numbering Authority (CNA)

DMA transactions which are targeted at input buffers used for the HddPassword software SMI handler could cause SMRAM corruption through a TOCTOU attack. DMA transactions which are targeted at input buffers used for the software SMI handler used by the HddPassword driver could cause SMRAM corruption through a TOCTOU attack..This issue was discovered by Insyde engineering based on the general description provided by Intel's iSTARE group. Fixed in kernel Kernel 5.2: 05.27.23, Kernel 5.3: 05.36.23, Kernel 5.4: 05.44.23, Kernel 5.5: 05.52.23 https://www.insyde.com/security-pledge/SA-2022051

Affected Products
Vendor
n/a
Product
n/a
Versions
Affected
  • n/a
Problem Types
TypeCWE IDDescription
textN/An/a
Type: text
CWE ID: N/A
Description: n/a
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://www.insyde.com/security-pledge
N/A
https://www.insyde.com/security-pledge/SA-2022051
N/A
Hyperlink: https://www.insyde.com/security-pledge
Resource: N/A
Hyperlink: https://www.insyde.com/security-pledge/SA-2022051
Resource: N/A
▼Authorized Data Publishers (ADP)
1. CVE Program Container
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://www.insyde.com/security-pledge
x_transferred
https://www.insyde.com/security-pledge/SA-2022051
x_transferred
Hyperlink: https://www.insyde.com/security-pledge
Resource:
x_transferred
Hyperlink: https://www.insyde.com/security-pledge/SA-2022051
Resource:
x_transferred
2. CISA ADP Vulnrichment
Affected Products
Problem Types
TypeCWE IDDescription
CWECWE-367CWE-367 Time-of-check Time-of-use (TOCTOU) Race Condition
Type: CWE
CWE ID: CWE-367
Description: CWE-367 Time-of-check Time-of-use (TOCTOU) Race Condition
Metrics
VersionBase scoreBase severityVector
3.17.0HIGH
CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
Version: 3.1
Base score: 7.0
Base severity: HIGH
Vector:
CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
Information is not available yet
▼National Vulnerability Database (NVD)
nvd.nist.gov
Source:cve@mitre.org
Published At:15 Nov, 2022 | 00:15
Updated At:30 Apr, 2025 | 19:15

DMA transactions which are targeted at input buffers used for the HddPassword software SMI handler could cause SMRAM corruption through a TOCTOU attack. DMA transactions which are targeted at input buffers used for the software SMI handler used by the HddPassword driver could cause SMRAM corruption through a TOCTOU attack..This issue was discovered by Insyde engineering based on the general description provided by Intel's iSTARE group. Fixed in kernel Kernel 5.2: 05.27.23, Kernel 5.3: 05.36.23, Kernel 5.4: 05.44.23, Kernel 5.5: 05.52.23 https://www.insyde.com/security-pledge/SA-2022051

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Date Added: N/A
Due Date: N/A
Vulnerability Name: N/A
Required Action: N/A
Metrics
TypeVersionBase scoreBase severityVector
Primary3.17.0HIGH
CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
Secondary3.17.0HIGH
CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
Type: Primary
Version: 3.1
Base score: 7.0
Base severity: HIGH
Vector:
CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
Type: Secondary
Version: 3.1
Base score: 7.0
Base severity: HIGH
Vector:
CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
CPE Matches

Insyde Software Corp. (ISC)
insyde
>>kernel>>Versions from 5.2(inclusive) to 5.2.05.27.23(exclusive)
cpe:2.3:a:insyde:kernel:*:*:*:*:*:*:*:*
Insyde Software Corp. (ISC)
insyde
>>kernel>>Versions from 5.3(inclusive) to 5.3.05.36.23(exclusive)
cpe:2.3:a:insyde:kernel:*:*:*:*:*:*:*:*
Insyde Software Corp. (ISC)
insyde
>>kernel>>Versions from 5.4(inclusive) to 5.4.05.44.23(exclusive)
cpe:2.3:a:insyde:kernel:*:*:*:*:*:*:*:*
Insyde Software Corp. (ISC)
insyde
>>kernel>>Versions from 5.5(inclusive) to 5.5.05.52.23(exclusive)
cpe:2.3:a:insyde:kernel:*:*:*:*:*:*:*:*
Weaknesses
CWE IDTypeSource
CWE-367Primarynvd@nist.gov
CWE-367Secondary134c704f-9b21-4f2e-91b3-4a467353bcc0
CWE ID: CWE-367
Type: Primary
Source: nvd@nist.gov
CWE ID: CWE-367
Type: Secondary
Source: 134c704f-9b21-4f2e-91b3-4a467353bcc0
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
https://www.insyde.com/security-pledgecve@mitre.org
Vendor Advisory
https://www.insyde.com/security-pledge/SA-2022051cve@mitre.org
Vendor Advisory
https://www.insyde.com/security-pledgeaf854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
https://www.insyde.com/security-pledge/SA-2022051af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
Hyperlink: https://www.insyde.com/security-pledge
Source: cve@mitre.org
Resource:
Vendor Advisory
Hyperlink: https://www.insyde.com/security-pledge/SA-2022051
Source: cve@mitre.org
Resource:
Vendor Advisory
Hyperlink: https://www.insyde.com/security-pledge
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Vendor Advisory
Hyperlink: https://www.insyde.com/security-pledge/SA-2022051
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Vendor Advisory

Change History

0
Information is not available yet

Similar CVEs

134Records found

CVE-2023-28576
Matching Score-4
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-4
Assigner-Qualcomm, Inc.
CVSS Score-6.4||MEDIUM
EPSS-0.02% / 4.67%
||
7 Day CHG~0.00%
Published-08 Aug, 2023 | 09:15
Updated-02 Aug, 2024 | 13:43
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Time-of-check Time-of-use (TOCTOU) Race Condition in Camera Kernel Driver

The buffer obtained from kernel APIs such as cam_mem_get_cpu_buf() may be readable/writable in userspace after kernel accesses it. In other words, user mode may race and modify the packet header (e.g. header.count), causing checks (e.g. size checks) in kernel code to be invalid. This may lead to out-of-bounds read/write issues.

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-fastconnect_7800snapdragon_865_5gwcd9380_firmwarewsa8830qcs610sw5100psd865_5gfastconnect_6900fastconnect_6800fastconnect_6900_firmwaresnapdragon_8_gen_1_firmwarewcn3988_firmwareqcn9074snapdragon_870_5gwsa8835wcn3950_firmwaresnapdragon_8_gen_1wsa8810_firmwarewcd9380wcd9341_firmwarefastconnect_7800_firmwaresw5100wsa8810qca6436qcs410snapdragon_865\+_5gsnapdragon_x55_5gqcs610_firmwaresw5100p_firmwaresxr2130wcd9370snapdragon_865\+_5g_firmwarewcn3680bqca6426sxr2130_firmwarewcd9341wcn3980qca6391_firmwarewcn3950snapdragon_xr2_5g_firmwarewcd9370_firmwarewcn3660bwsa8815snapdragon_870_5g_firmwarewsa8830_firmwaresd865_5g_firmwareqca6426_firmwarewcn3660b_firmwarewcn3988wsa8815_firmwaresnapdragon_x55_5g_firmwarewcn3680b_firmwarewsa8835_firmwaresw5100_firmwareqcn9074_firmwarefastconnect_6800_firmwareqcs410_firmwaresnapdragon_865_5g_firmwareqca6391wcn3980_firmwareqca6436_firmwaresnapdragon_xr2_5gSnapdragon
CWE ID-CWE-367
Time-of-check Time-of-use (TOCTOU) Race Condition
CVE-2021-23892
Matching Score-4
Assigner-Trellix
ShareView Details
Matching Score-4
Assigner-Trellix
CVSS Score-8.2||HIGH
EPSS-0.08% / 25.41%
||
7 Day CHG~0.00%
Published-12 May, 2021 | 09:05
Updated-03 Aug, 2024 | 19:14
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

By exploiting a time of check to time of use (TOCTOU) race condition during the Endpoint Security for Linux Threat Prevention and Firewall (ENSL TP/FW) installation process, a local user can perform a privilege escalation attack to obtain administrator privileges for the purpose of executing arbitrary code through insecure use of predictable temporary file locations.

Action-Not Available
Vendor-McAfee, LLC
Product-endpoint_security_for_linux_threat_preventionMcAfee Endpoint Security (ENS) for Linux
CWE ID-CWE-59
Improper Link Resolution Before File Access ('Link Following')
CWE ID-CWE-367
Time-of-check Time-of-use (TOCTOU) Race Condition
CVE-2023-27470
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-7||HIGH
EPSS-1.00% / 76.08%
||
7 Day CHG+0.03%
Published-11 Sep, 2023 | 00:00
Updated-26 Sep, 2024 | 15:41
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

BASupSrvcUpdater.exe in N-able Take Control Agent through 7.0.41.1141 before 7.0.43 has a TOCTOU Race Condition via a pseudo-symlink at %PROGRAMDATA%\GetSupportService_N-Central\PushUpdates, leading to arbitrary file deletion.

Action-Not Available
Vendor-n-ablen/an-ableMicrosoft Corporation
Product-windowstake_controln/atake_control
CWE ID-CWE-367
Time-of-check Time-of-use (TOCTOU) Race Condition
CVE-2023-24861
Matching Score-4
Assigner-Microsoft Corporation
ShareView Details
Matching Score-4
Assigner-Microsoft Corporation
CVSS Score-7||HIGH
EPSS-0.11% / 30.46%
||
7 Day CHG~0.00%
Published-14 Mar, 2023 | 16:55
Updated-01 Jan, 2025 | 00:48
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Windows Graphics Component Elevation of Privilege Vulnerability

Windows Graphics Component Elevation of Privilege Vulnerability

Action-Not Available
Vendor-Microsoft Corporation
Product-windows_10_21h2windows_10_1809windows_server_2016windows_server_2012windows_server_2008windows_10_1507windows_11_21h2windows_10_22h2windows_server_2022windows_10_20h2windows_11_22h2windows_server_2019windows_10_1607Windows Server 2022Windows 10 Version 1607Windows 11 version 22H2Windows Server 2019 (Server Core installation)Windows Server 2008 Service Pack 2Windows 10 Version 1809Windows Server 2016 (Server Core installation)Windows 11 version 21H2Windows Server 2012 (Server Core installation)Windows 10 Version 20H2Windows Server 2016Windows 10 Version 1507Windows 10 Version 21H2Windows Server 2008 R2 Service Pack 1Windows Server 2008 Service Pack 2 (Server Core installation)Windows Server 2008 R2 Service Pack 1 (Server Core installation)Windows Server 2012 R2Windows Server 2019Windows Server 2012Windows Server 2008 Service Pack 2Windows Server 2012 R2 (Server Core installation)Windows 10 Version 22H2
CWE ID-CWE-367
Time-of-check Time-of-use (TOCTOU) Race Condition
CWE ID-CWE-362
Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')
CVE-2022-23181
Matching Score-4
Assigner-Apache Software Foundation
ShareView Details
Matching Score-4
Assigner-Apache Software Foundation
CVSS Score-7||HIGH
EPSS-0.26% / 48.98%
||
7 Day CHG~0.00%
Published-27 Jan, 2022 | 00:00
Updated-03 Aug, 2024 | 03:36
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Local privilege escalation with FileStore

The fix for bug CVE-2020-9484 introduced a time of check, time of use vulnerability into Apache Tomcat 10.1.0-M1 to 10.1.0-M8, 10.0.0-M5 to 10.0.14, 9.0.35 to 9.0.56 and 8.5.55 to 8.5.73 that allowed a local attacker to perform actions with the privileges of the user that the Tomcat process is using. This issue is only exploitable when Tomcat is configured to persist sessions using the FileStore.

Action-Not Available
Vendor-The Apache Software FoundationDebian GNU/LinuxOracle Corporation
Product-debian_linuxfinancial_services_crime_and_compliance_management_studiomysql_enterprise_monitortomcatagile_engineering_data_managementcommunications_cloud_native_core_policymanaged_file_transferApache Tomcat
CWE ID-CWE-367
Time-of-check Time-of-use (TOCTOU) Race Condition
CVE-2022-22093
Matching Score-4
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-4
Assigner-Qualcomm, Inc.
CVSS Score-7.8||HIGH
EPSS-0.08% / 24.20%
||
7 Day CHG~0.00%
Published-16 Sep, 2022 | 05:25
Updated-03 Aug, 2024 | 03:00
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Memory corruption or temporary denial of service due to improper handling of concurrent hypervisor operations to attach or detach IRQs from virtual interrupt sources in Snapdragon Compute, Snapdragon Connectivity, Snapdragon Industrial IOT, Snapdragon Mobile

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-wcn3991_firmwarewcn3991wsa8830wcd9380_firmwaresd780gsd865_5gqca6431_firmwaresdx55m_firmwarewcn6856_firmwaresd888wsa8835wcd9380sd765g_firmwaresd888_5gqca6420_firmwareqca6390_firmwarewcd9370wcn6855_firmwaresm8475p_firmwaresm7325pqca6426qrb5165n_firmwareqca6430_firmwarewcn6750wcn3998sd_8cx_firmwarewcd9385_firmwaresdxr2_5g_firmwaresd_8cx_gen2_firmwaresd_8_gen1_5g_firmwarewcd9340_firmwarewsa8815sm7325p_firmwareqsm8350_firmwarewcn6850qsm8350sd765qca6426_firmwaresm7315_firmwarewcn7850sd768g_firmwarewcd9375_firmwarewcn3998_firmwareqrb5165msm7315sm7250p_firmwareqca6391sdx55mqca6420qca6436_firmwareqrb5165nqca6421_firmwaresm8475_firmwaresm7450_firmwareaqt1000_firmwaresd778gwcn6740_firmwaresd_8cx_gen2wcn7851qcs6490qrb5165_firmwareqrb5165m_firmwaresdxr2_5gqcm6490_firmwarewsa8832_firmwareqrb5165wcn6851_firmwareqca6430qca6421sd778g_firmwarewcd9340wsa8810_firmwaresd765gwcd9341_firmwarewsa8810sd765_firmwaresd870qca6436wcn6851wsa8832wcn6855wcn7851_firmwarewcn6856wcd9385wcd9341sd768gqca6431qcs6490_firmwaresd870_firmwarewcn6740qca6391_firmwareqca6390wcd9375sd_8cxaqt1000sd780g_firmwarewcd9370_firmwaresd888_firmwarewsa8830_firmwaresd865_5g_firmwareqcm6490sd888_5g_firmwarewcn6850_firmwarewcn7850_firmwarewsa8815_firmwarewsa8835_firmwaresm7250psm7450sm8475wcn6750_firmwaresm8475pSnapdragon Compute, Snapdragon Connectivity, Snapdragon Industrial IOT, Snapdragon Mobile
CWE ID-CWE-367
Time-of-check Time-of-use (TOCTOU) Race Condition
CVE-2022-22094
Matching Score-4
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-4
Assigner-Qualcomm, Inc.
CVSS Score-7.8||HIGH
EPSS-0.07% / 22.47%
||
7 Day CHG~0.00%
Published-16 Sep, 2022 | 05:25
Updated-03 Aug, 2024 | 03:00
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

memory corruption in Kernel due to race condition while getting mapping reference in Snapdragon Compute, Snapdragon Connectivity, Snapdragon Industrial IOT, Snapdragon Mobile

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-wcn3991_firmwarewcn3991wsa8830wcd9380_firmwaresd780gsd865_5gqca6431_firmwaresdx55m_firmwarewcn6856_firmwaresd888wsa8835wcd9380sd765g_firmwaresd888_5gqca6420_firmwareqca6390_firmwarewcd9370wcn6855_firmwaresm8475p_firmwaresm7325pqca6426qrb5165n_firmwareqca6430_firmwarewcn6750wcn3998sd_8cx_firmwarewcd9385_firmwaresdxr2_5g_firmwaresd_8cx_gen2_firmwaresd_8_gen1_5g_firmwarewcd9340_firmwarewsa8815sm7325p_firmwareqsm8350_firmwarewcn6850qsm8350sd765qca6426_firmwaresm7315_firmwarewcn7850sd768g_firmwarewcd9375_firmwarewcn3998_firmwareqrb5165msm7315sm7250p_firmwareqca6391sdx55mqca6420qca6436_firmwareqrb5165nqca6421_firmwaresm8475_firmwaresm7450_firmwareaqt1000_firmwaresd778gwcn6740_firmwaresd_8cx_gen2wcn7851qcs6490qrb5165_firmwareqrb5165m_firmwaresdxr2_5gqcm6490_firmwarewsa8832_firmwareqrb5165wcn6851_firmwareqca6430qca6421sd778g_firmwarewcd9340wsa8810_firmwaresd765gwcd9341_firmwarewsa8810sd765_firmwaresd870qca6436wcn6851wsa8832wcn6855wcn7851_firmwarewcn6856wcd9385wcd9341sd768gqca6431qcs6490_firmwaresd870_firmwarewcn6740qca6391_firmwareqca6390wcd9375sd_8cxaqt1000sd780g_firmwarewcd9370_firmwaresd888_firmwarewsa8830_firmwaresd865_5g_firmwareqcm6490sd888_5g_firmwarewcn6850_firmwarewcn7850_firmwarewsa8815_firmwarewsa8835_firmwaresm7250psm7450sm8475wcn6750_firmwaresm8475pSnapdragon Compute, Snapdragon Connectivity, Snapdragon Industrial IOT, Snapdragon Mobile
CWE ID-CWE-367
Time-of-check Time-of-use (TOCTOU) Race Condition
CVE-2022-20110
Matching Score-4
Assigner-MediaTek, Inc.
ShareView Details
Matching Score-4
Assigner-MediaTek, Inc.
CVSS Score-7||HIGH
EPSS-0.01% / 1.00%
||
7 Day CHG~0.00%
Published-03 May, 2022 | 19:56
Updated-03 Aug, 2024 | 02:02
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In ion, there is a possible use after free due to a race condition. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS06399915; Issue ID: ALPS06399901.

Action-Not Available
Vendor-Google LLCMediaTek Inc.
Product-mt6757cdmt6873mt6893mt8675mt8765mt6580mt8788mt6750mt8666mt8167mt6765mt6757cmt6737mt6883mt8696mt6853tmt6739mt6757mt8768mt6797mt6769mt6761mt6875mt6889mt8789mt8797mt8321mt6768mt8362amt8786mt8766mt8695mt6771mt8385mt6833mt6885mt6735mt6750smt6753mt6762mt6877mt6781mt8365mt6853mt8168androidmt6757chmt8185mt8791mt6779mt6785mt6763mt8173MT6580, MT6735, MT6737, MT6739, MT6750, MT6750S, MT6753, MT6757, MT6757C, MT6757CD, MT6757CH, MT6761, MT6762, MT6763, MT6765, MT6768, MT6769, MT6771, MT6779, MT6781, MT6785, MT6797, MT6833, MT6853, MT6853T, MT6873, MT6875, MT6877, MT6883, MT6885, MT6889, MT6893, MT8167, MT8168, MT8173, MT8185, MT8321, MT8362A, MT8365, MT8385, MT8666, MT8675, MT8695, MT8696, MT8765, MT8766, MT8768, MT8786, MT8788, MT8789, MT8791, MT8797
CWE ID-CWE-367
Time-of-check Time-of-use (TOCTOU) Race Condition
CVE-2023-33046
Matching Score-4
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-4
Assigner-Qualcomm, Inc.
CVSS Score-7.8||HIGH
EPSS-0.02% / 2.86%
||
7 Day CHG~0.00%
Published-06 Feb, 2024 | 05:46
Updated-11 Aug, 2025 | 15:06
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Time-of-check Time-of-use (TOCTOU) Race Condition in Trusted Execution Environment

Memory corruption in Trusted Execution Environment while deinitializing an object used for license validation.

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-qcm8550_firmwarewsa8845_firmwarewsa8832wsa8840qam8295p_firmwareqca6595qcs8550_firmwareqca8081_firmwarear8035_firmwareqca6696qrb5165mqca6698aq_firmwarewcd9385qcn9012wcd9395_firmwareqcn6024snapdragon_8_gen_2_mobile_platformqcs7230_firmwaresxr1230p_firmwarewcd9390_firmwaresg8275pwsa8832_firmwareqca8337_firmwaresnapdragon_x70_modem-rf_system_firmwareqca8337wcd9395ssg2125psg8275p_firmwareqca6574au_firmwaresnapdragon_8cx_gen_3_compute_platform_firmwareqam8295pqcs8250_firmwareqca6574auwcd9390sa8540p_firmwareflight_rb5_5g_platformvideo_collaboration_vc5_platformwsa8845h_firmwaresm8550p_firmwareqcm8550sa9000p_firmwaresnapdragon_x65_5g_modem-rf_systemqcn9024snapdragon_x65_5g_modem-rf_system_firmwareqrb5165n_firmwarewsa8835wsa8840_firmwaresxr2230p_firmwareqca6391_firmwareqcn9011snapdragon_ar2_gen_1_platformsa8295p_firmwareqca6696_firmwareqcn9024_firmwaresnapdragon_8cx_gen_3_compute_platformqcn6024_firmwarewsa8845hwcd9380_firmwareqca8081wsa8830sm8550pssg2115pqcn9011_firmwareflight_rb5_5g_platform_firmwarear8035sa8540pqrb5165m_firmwareqca6595_firmwareqcs7230fastconnect_6900fastconnect_7800_firmwarerobotics_rb5_platformqca6391snapdragon_x70_modem-rf_systemqcn9012_firmwareqca6698aqssg2125p_firmwarewcd9385_firmwareqrb5165nfastconnect_6900_firmwaresa8295psnapdragon_8_gen_2_mobile_platform_firmwarerobotics_rb5_platform_firmwarewcd9380qcs8550sxr2230pfastconnect_7800snapdragon_ar2_gen_1_platform_firmwaresnapdragon_8\+_gen_2_mobile_platform_firmwarewsa8845wsa8835_firmwaresxr1230pssg2115p_firmwarevideo_collaboration_vc5_platform_firmwareqcs8250sa9000psnapdragon_8\+_gen_2_mobile_platformwsa8830_firmwareSnapdragon
CWE ID-CWE-367
Time-of-check Time-of-use (TOCTOU) Race Condition
CWE ID-CWE-787
Out-of-bounds Write
CVE-2022-1537
Matching Score-4
Assigner-Protect AI (formerly huntr.dev)
ShareView Details
Matching Score-4
Assigner-Protect AI (formerly huntr.dev)
CVSS Score-7.8||HIGH
EPSS-0.18% / 40.19%
||
7 Day CHG~0.00%
Published-10 May, 2022 | 00:00
Updated-03 Aug, 2024 | 00:10
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
file.copy operations in GruntJS are vulnerable to a TOCTOU race condition leading to arbitrary file write in gruntjs/grunt

file.copy operations in GruntJS are vulnerable to a TOCTOU race condition leading to arbitrary file write in GitHub repository gruntjs/grunt prior to 1.5.3. This vulnerability is capable of arbitrary file writes which can lead to local privilege escalation to the GruntJS user if a lower-privileged user has write access to both source and destination directories as the lower-privileged user can create a symlink to the GruntJS user's .bashrc file or replace /etc/shadow file if the GruntJS user is root.

Action-Not Available
Vendor-gruntjsgruntjs
Product-gruntgruntjs/grunt
CWE ID-CWE-367
Time-of-check Time-of-use (TOCTOU) Race Condition
CVE-2022-27904
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-7||HIGH
EPSS-0.08% / 25.56%
||
7 Day CHG~0.00%
Published-30 Jun, 2022 | 23:25
Updated-03 Aug, 2024 | 05:41
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Automox Agent for macOS before version 39 was vulnerable to a time-of-check/time-of-use (TOCTOU) race-condition attack during the agent install process.

Action-Not Available
Vendor-automoxn/aApple Inc.
Product-automoxmacosn/a
CWE ID-CWE-367
Time-of-check Time-of-use (TOCTOU) Race Condition
CVE-2021-47280
Matching Score-4
Assigner-kernel.org
ShareView Details
Matching Score-4
Assigner-kernel.org
CVSS Score-7||HIGH
EPSS-0.01% / 1.12%
||
7 Day CHG~0.00%
Published-21 May, 2024 | 14:20
Updated-04 May, 2025 | 07:07
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
drm: Fix use-after-free read in drm_getunique()

In the Linux kernel, the following vulnerability has been resolved: drm: Fix use-after-free read in drm_getunique() There is a time-of-check-to-time-of-use error in drm_getunique() due to retrieving file_priv->master prior to locking the device's master mutex. An example can be seen in the crash report of the use-after-free error found by Syzbot: https://syzkaller.appspot.com/bug?id=148d2f1dfac64af52ffd27b661981a540724f803 In the report, the master pointer was used after being freed. This is because another process had acquired the device's master mutex in drm_setmaster_ioctl(), then overwrote fpriv->master in drm_new_set_master(). The old value of fpriv->master was subsequently freed before the mutex was unlocked. To fix this, we lock the device's master mutex before retrieving the pointer from from fpriv->master. This patch passes the Syzbot reproducer test.

Action-Not Available
Vendor-Linux Kernel Organization, Inc
Product-linux_kernelLinux
CWE ID-CWE-416
Use After Free
CWE ID-CWE-367
Time-of-check Time-of-use (TOCTOU) Race Condition
CVE-2021-1921
Matching Score-4
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-4
Assigner-Qualcomm, Inc.
CVSS Score-7.8||HIGH
EPSS-0.03% / 6.81%
||
7 Day CHG~0.00%
Published-12 Nov, 2021 | 06:15
Updated-03 Aug, 2024 | 16:25
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Possible memory corruption due to Improper handling of hypervisor unmap operations for concurrent memory operations in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-wsa8830wcd9380_firmwarewcn3990sd780gsd865_5gqca6595qca6431_firmwaresdx24sdx55m_firmwarewcn6856_firmwarewcd9360_firmwarewsa8835wcn3950_firmwarewcd9380sd888_5gqca6420_firmwareqca6390_firmwarewcd9370sd675_firmwarewcn6855_firmwareqca6426sdx24_firmwarewcn3990_firmwareqrb5165n_firmwaresm7325qca6430_firmwarewcn3980wcn6750wcn3998sd_8cx_firmwarewcd9385_firmwaresdxr2_5g_firmwarewcn3950whs9410wcd9340_firmwaresd855wsa8815wcn6850qsm8350_firmwareqsm8350sd_8c_firmwareqca6426_firmwarewcn7850qca6574au_firmwaresdx55_firmwarewcd9375_firmwarewcn3998_firmwarewcn3980_firmwareqca6391sdx55mwcd9360qca6420qca6436_firmwareqrb5165nqca6421_firmwareaqt1000_firmwarewcn6740_firmwaresd778gsa6155p_firmwarewhs9410_firmwarewcn7851qcs6490qrb5165_firmwaresdxr2_5gqcm6490_firmwareqrb5165wcn6851_firmwareqca6430qca6574auqca6421sd778g_firmwarewcd9340sa8195psdm830_firmwarewsa8810_firmwarewcd9341_firmwarewsa8810sd870qca6436wcn6851wcn6855sa6155pwcn7851_firmwarewcn6856sd_8cwcd9385wcd9341qca6431qcs6490_firmwareqca6595_firmwaresd870_firmwarewcn6740qca6391_firmwareqca6390wcd9375sd_8cxaqt1000sd780g_firmwarewcd9370_firmwaresdx55sd675wsa8830_firmwaresd855_firmwaresd865_5g_firmwareqcm6490sd888_5g_firmwarewcn6850_firmwarewcn7850_firmwarewsa8815_firmwarewsa8835_firmwaresa8195p_firmwaresdm830wcn6750_firmwaresm7325_firmwareSnapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile
CWE ID-CWE-367
Time-of-check Time-of-use (TOCTOU) Race Condition
CVE-2023-25394
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-7||HIGH
EPSS-0.03% / 7.14%
||
7 Day CHG~0.00%
Published-16 May, 2023 | 00:00
Updated-23 Jan, 2025 | 18:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Videostream macOS app 0.5.0 and 0.4.3 has a Race Condition. The Updater privileged script attempts to update Videostream every 5 hours.

Action-Not Available
Vendor-getvideostreamn/a
Product-videostreamn/a
CWE ID-CWE-367
Time-of-check Time-of-use (TOCTOU) Race Condition
CVE-2023-26299
Matching Score-4
Assigner-HP Inc.
ShareView Details
Matching Score-4
Assigner-HP Inc.
CVSS Score-7||HIGH
EPSS-0.15% / 36.69%
||
7 Day CHG~0.00%
Published-30 Jun, 2023 | 15:40
Updated-04 Dec, 2024 | 16:06
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A potential Time-of-Check to Time-of-Use (TOCTOU) vulnerability has been identified in certain HP PC products using AMI UEFI Firmware (system BIOS), which might allow arbitrary code execution. AMI has released updates to mitigate the potential vulnerability.

Action-Not Available
Vendor-HP Inc.
Product-pro_tower_290_g9_desktop_firmware280_pro_g5_small_form_factor_firmware205_g4_22_all-in-one290_g1t430_firmware200_pro_g4_22_all-in-one_firmwarezhan_86_pro_g2_microtower_firmwareproone_240_g10_firmwaredesktop_pro_g1_microtower_firmware260_g4_desktop_mini_firmware280_g3_firmware280_g6_firmware470_g10desktop_pro_g1_microtowerpro_small_form_factor_280_g9_desktop_firmware240_g10_firmware282_pro_g4_microtower_firmware290_g3349_g7247_g8_firmwarepro_tower_290_g9_desktop280_g5_firmware282_g5_firmwareproone_490_g3280_g5_small_form_factor_firmware470_g9280_g4_microtower_firmwareproone_240_g10280_g4_microtowerproone_440_g3pro_small_form_factor_zhan_66_g9_desktop280_g8_microtower280_pro_g3t430250_g10_firmware255_g10_firmware290_g2280_pro_g4_microtower_firmware290_g2_firmware245_g6_firmware290_g2_microtowerproone_496_g3288_g5_firmwareproone_440_g3_firmware280_g4_firmwarepro_tower_280_g9_desktop290_g2_microtower_firmwarepro_tower_zhan_99_g9_desktop245_g6200_g3205_pro_g4_22_all-in-onepro_tower_200_g9_desktop245_g8_firmwarezhan_99_g4z_vr_backpack_g1_workstation_firmwarezhan_99_pro_g1_microtower_firmware280_pro_g5_small_form_factor288_g6zhan_99_g4_firmware247_g8288_pro_g4_microtower_firmwarez_vr_backpack_g1_workstationt628280_g4288_g6_firmware255_g10proone_496_g3_firmwarezhan_99_g2_firmwareproone_240_g9_firmwarepro_small_form_factor_290_g9_desktop_firmware280_g3200_g4_22_all-in-onepro_tower_200_g9_desktop_firmwarezhan_86_pro_g2_microtower250_g10282_pro_g4_microtowerpro_tower_zhan_99_g9_desktop_firmware282_g6240_g10zhan_99_g2290_g4proone_490_g3_firmware280_g5260_g4_desktop_mini290_g4_firmware280_g5_small_form_factor280_pro_g4_microtower282_g6_firmware290_g1_firmware290_g3_small_form_factorpro_small_form_factor_zhan_66_g9_desktop_firmwarezhan_99_pro_g1_microtower200_g3_firmwarepro_small_form_factor_280_g9_desktoppro_small_form_factor_290_g9_desktop349_g7_firmware280_g8_microtower_firmwareproone_240_g9t628_firmware245_g7470_g10_firmware282_g5288_pro_g4_microtower280_pro_g3_firmwarevr_backpack_g2_firmware280_g6200_g4_22_all-in-one_firmware205_g4_22_all-in-one_firmwarepro_tower_280_g9_desktop_firmwarevr_backpack_g2470_g9_firmware245_g7_firmware200_pro_g4_22_all-in-one290_g3_small_form_factor_firmware288_g5290_g3_firmware205_pro_g4_22_all-in-one_firmware245_g8HP PC products using AMI UEFI Firmware
CWE ID-CWE-367
Time-of-check Time-of-use (TOCTOU) Race Condition
CVE-2024-27134
Matching Score-4
Assigner-JFrog
ShareView Details
Matching Score-4
Assigner-JFrog
CVSS Score-7||HIGH
EPSS-0.02% / 2.50%
||
7 Day CHG~0.00%
Published-25 Nov, 2024 | 13:48
Updated-03 Feb, 2025 | 15:05
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Excessive directory permissions in MLflow leads to local privilege escalation when using spark_udf

Excessive directory permissions in MLflow leads to local privilege escalation when using spark_udf. This behavior can be exploited by a local attacker to gain elevated permissions by using a ToCToU attack. The issue is only relevant when the spark_udf() MLflow API is called.

Action-Not Available
Vendor-lfprojectslfprojects
Product-mlflowmlflow
CWE ID-CWE-276
Incorrect Default Permissions
CWE ID-CWE-367
Time-of-check Time-of-use (TOCTOU) Race Condition
CVE-2020-3680
Matching Score-4
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-4
Assigner-Qualcomm, Inc.
CVSS Score-7||HIGH
EPSS-0.02% / 4.13%
||
7 Day CHG~0.00%
Published-02 Jun, 2020 | 15:05
Updated-04 Aug, 2024 | 07:44
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A race condition can occur when using the fastrpc memory mapping API. in Snapdragon Auto, Snapdragon Compute, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Wearables in APQ8009, APQ8053, MSM8909W, MSM8917, MSM8953, QCS605, QM215, SA415M, SDM429, SDM429W, SDM439, SDM450, SDM632, SDM670, SDM710, SDM845, SDX24, SXR1130

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-msm8953sdm450sdm429wsdm632_firmwaresdm845sdm450_firmwaresdm632sdx24sdm439sdm429sa415m_firmwaresdm710msm8909w_firmwareqm215sdm429w_firmwaresdm710_firmwareapq8009apq8009_firmwaremsm8917sdm670qcs605_firmwaresdm670_firmwaresdx24_firmwaresdm439_firmwaresa415mqm215_firmwareqcs605msm8953_firmwareapq8053msm8917_firmwaresdm429_firmwaresxr1130_firmwaresxr1130msm8909wapq8053_firmwaresdm845_firmwareSnapdragon Auto, Snapdragon Compute, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Wearables
CWE ID-CWE-367
Time-of-check Time-of-use (TOCTOU) Race Condition
CVE-2020-3619
Matching Score-4
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-4
Assigner-Qualcomm, Inc.
CVSS Score-7||HIGH
EPSS-0.03% / 6.30%
||
7 Day CHG~0.00%
Published-08 Sep, 2020 | 09:31
Updated-04 Aug, 2024 | 07:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

u'Non-secure memory is touched multiple times during TrustZone\u2019s execution and can lead to privilege escalation or memory corruption' in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wired Infrastructure and Networking in APQ8009, APQ8017, APQ8053, APQ8098, IPQ8074, Kamorta, MDM9150, MDM9206, MDM9607, MDM9650, MSM8905, MSM8909, MSM8917, MSM8920, MSM8937, MSM8940, MSM8953, MSM8998, QCA8081, QCS404, QCS605, QCS610, QM215, Rennell, SA415M, SC7180, SDA660, SDA845, SDM429, SDM439, SDM450, SDM630, SDM632, SDM636, SDM660, SDM670, SDM710, SDM845, SDM850, SDX24, SM6150, SM7150, SM8150, SXR1130

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-mdm9150_firmwarekamorta_firmwareqcs610sdm632_firmwaresdm845sdm450_firmwaresdm632sdx24sdm439qcs404_firmwaremdm9650sdm429msm8940_firmwaresm7150_firmwaresm6150sm7150apq8009_firmwaremsm8917sdm670qcs605_firmwaremdm9206sdm670_firmwareqcs404sdx24_firmwareipq8074sdm636sda845_firmwaresa415mapq8098mdm9206_firmwareqcs605msm8937_firmwaremdm9650_firmwaresdm429_firmwaremsm8905_firmwaresda660sxr1130_firmwareqca8081_firmwaresxr1130apq8009msm8909_firmwareapq8053_firmwaresda845sdm850_firmwaremsm8920msm8953sdm450sdm636_firmwareapq8098_firmwaremsm8998_firmwaresdm660msm8920_firmwaresdm630mdm9607_firmwaresa415m_firmwareipq8074_firmwaresdm710qm215sc7180_firmwaremdm9607apq8017_firmwaresdm710_firmwareqca8081qcs610_firmwaremsm8937mdm9150msm8905sm8150_firmwaremsm8909sdm439_firmwarerennellsc7180sdm630_firmwaresda660_firmwarerennell_firmwareqm215_firmwaremsm8953_firmwaremsm8940sm6150_firmwareapq8053msm8917_firmwaremsm8998sm8150sdm850kamortaapq8017sdm660_firmwaresdm845_firmwareSnapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wired Infrastructure and Networking
CWE ID-CWE-787
Out-of-bounds Write
CWE ID-CWE-367
Time-of-check Time-of-use (TOCTOU) Race Condition
CVE-2025-24036
Matching Score-4
Assigner-Microsoft Corporation
ShareView Details
Matching Score-4
Assigner-Microsoft Corporation
CVSS Score-7||HIGH
EPSS-0.05% / 15.39%
||
7 Day CHG~0.00%
Published-11 Feb, 2025 | 17:58
Updated-12 Mar, 2025 | 01:42
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Microsoft AutoUpdate (MAU) Elevation of Privilege Vulnerability

Microsoft AutoUpdate (MAU) Elevation of Privilege Vulnerability

Action-Not Available
Vendor-Microsoft Corporation
Product-autoupdateMicrosoft AutoUpdate for Mac
CWE ID-CWE-367
Time-of-check Time-of-use (TOCTOU) Race Condition
CVE-2020-25212
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-7||HIGH
EPSS-0.03% / 7.50%
||
7 Day CHG~0.00%
Published-09 Sep, 2020 | 15:52
Updated-04 Aug, 2024 | 15:33
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A TOCTOU mismatch in the NFS client code in the Linux kernel before 5.8.3 could be used by local attackers to corrupt memory or possibly have unspecified other impact because a size check is in fs/nfs/nfs4proc.c instead of fs/nfs/nfs4xdr.c, aka CID-b4487b935452.

Action-Not Available
Vendor-n/aLinux Kernel Organization, IncopenSUSEDebian GNU/LinuxCanonical Ltd.
Product-ubuntu_linuxdebian_linuxlinux_kernelleapn/a
CWE ID-CWE-787
Out-of-bounds Write
CWE ID-CWE-367
Time-of-check Time-of-use (TOCTOU) Race Condition
CVE-2025-53134
Matching Score-4
Assigner-Microsoft Corporation
ShareView Details
Matching Score-4
Assigner-Microsoft Corporation
CVSS Score-7||HIGH
EPSS-0.06% / 17.32%
||
7 Day CHG~0.00%
Published-12 Aug, 2025 | 17:10
Updated-27 Aug, 2025 | 16:08
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability

Concurrent execution using shared resource with improper synchronization ('race condition') in Windows Ancillary Function Driver for WinSock allows an authorized attacker to elevate privileges locally.

Action-Not Available
Vendor-Microsoft Corporation
Product-windows_10_1607windows_11_23h2windows_10_22h2windows_server_2008windows_server_2019windows_10_1507windows_server_2022windows_server_2022_23h2windows_10_1809windows_10_21h2windows_server_2016windows_server_2025windows_11_24h2windows_11_22h2windows_server_2012Windows 11 Version 23H2Windows Server 2008 R2 Service Pack 1 (Server Core installation)Windows Server 2012Windows Server 2016 (Server Core installation)Windows Server 2012 (Server Core installation)Windows Server 2012 R2 (Server Core installation)Windows Server 2025Windows 10 Version 1809Windows Server 2019 (Server Core installation)Windows 11 Version 24H2Windows 10 Version 1507Windows 10 Version 22H2Windows Server 2016Windows Server 2008 Service Pack 2Windows Server 2019Windows 10 Version 21H2Windows 11 version 22H2Windows Server 2008 R2 Service Pack 1Windows Server 2022Windows Server 2025 (Server Core installation)Windows 11 version 22H3Windows Server 2022, 23H2 Edition (Server Core installation)Windows Server 2008 Service Pack 2Windows Server 2012 R2Windows Server 2008 Service Pack 2 (Server Core installation)Windows 10 Version 1607
CWE ID-CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
CWE ID-CWE-367
Time-of-check Time-of-use (TOCTOU) Race Condition
CVE-2020-2032
Matching Score-4
Assigner-Palo Alto Networks, Inc.
ShareView Details
Matching Score-4
Assigner-Palo Alto Networks, Inc.
CVSS Score-7||HIGH
EPSS-0.10% / 28.02%
||
7 Day CHG~0.00%
Published-10 Jun, 2020 | 17:29
Updated-17 Sep, 2024 | 02:27
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
GlobalProtect App: File race condition vulnerability leads to local privilege escalation during upgrade

A race condition vulnerability Palo Alto Networks GlobalProtect app on Windows allows a local limited Windows user to execute programs with SYSTEM privileges. This issue can be exploited only while performing a GlobalProtect app upgrade. This issue affects: GlobalProtect app 5.0 versions earlier than GlobalProtect app 5.0.10 on Windows; GlobalProtect app 5.1 versions earlier than GlobalProtect app 5.1.4 on Windows.

Action-Not Available
Vendor-Palo Alto Networks, Inc.
Product-globalprotectGlobalProtect App
CWE ID-CWE-367
Time-of-check Time-of-use (TOCTOU) Race Condition
CVE-2021-42835
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-7||HIGH
EPSS-16.91% / 94.70%
||
7 Day CHG~0.00%
Published-08 Dec, 2021 | 14:34
Updated-04 Aug, 2024 | 03:38
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An issue was discovered in Plex Media Server through 1.24.4.5081-e362dc1ee. An attacker (with a foothold in a endpoint via a low-privileged user account) can access the exposed RPC service of the update service component. This RPC functionality allows the attacker to interact with the RPC functionality and execute code from a path of his choice (local, or remote via SMB) because of a TOCTOU race condition. This code execution is in the context of the Plex update service (which runs as SYSTEM).

Action-Not Available
Vendor-plexn/aMicrosoft Corporation
Product-windowsmedia_servern/a
CWE ID-CWE-367
Time-of-check Time-of-use (TOCTOU) Race Condition
CVE-2020-15702
Matching Score-4
Assigner-Canonical Ltd.
ShareView Details
Matching Score-4
Assigner-Canonical Ltd.
CVSS Score-7||HIGH
EPSS-0.10% / 28.96%
||
7 Day CHG~0.00%
Published-06 Aug, 2020 | 22:50
Updated-16 Sep, 2024 | 17:28
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
TOCTOU in apport

TOCTOU Race Condition vulnerability in apport allows a local attacker to escalate privileges and execute arbitrary code. An attacker may exit the crashed process and exploit PID recycling to spawn a root process with the same PID as the crashed process, which can then be used to escalate privileges. Fixed in 2.20.1-0ubuntu2.24, 2.20.9 versions prior to 2.20.9-0ubuntu7.16 and 2.20.11 versions prior to 2.20.11-0ubuntu27.6. Was ZDI-CAN-11234.

Action-Not Available
Vendor-Canonical Ltd.
Product-apportubuntu_linuxapport
CWE ID-CWE-367
Time-of-check Time-of-use (TOCTOU) Race Condition
CVE-2025-46327
Matching Score-4
Assigner-GitHub, Inc.
ShareView Details
Matching Score-4
Assigner-GitHub, Inc.
CVSS Score-3.3||LOW
EPSS-0.01% / 1.53%
||
7 Day CHG~0.00%
Published-28 Apr, 2025 | 22:33
Updated-09 May, 2025 | 19:38
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Go Snowflake Driver has race condition when checking access to Easy Logging configuration file

gosnowflake is the Snowflake Golang driver. Versions starting from 1.7.0 to before 1.13.3, are vulnerable to a Time-of-Check to Time-of-Use (TOCTOU) race condition. When using the Easy Logging feature on Linux and macOS, the Driver reads logging configuration from a user-provided file. On Linux and macOS the Driver verifies that the configuration file can be written to only by its owner. That check was vulnerable to a TOCTOU race condition and failed to verify that the file owner matches the user running the Driver. This could allow a local attacker with write access to the configuration file or the directory containing it to overwrite the configuration and gain control over logging level and output location. This issue has been patched in version 1.13.3.

Action-Not Available
Vendor-snowflakesnowflakedb
Product-gosnowflakegosnowflake
CWE ID-CWE-367
Time-of-check Time-of-use (TOCTOU) Race Condition
CVE-2025-46326
Matching Score-4
Assigner-GitHub, Inc.
ShareView Details
Matching Score-4
Assigner-GitHub, Inc.
CVSS Score-3.3||LOW
EPSS-0.01% / 1.16%
||
7 Day CHG~0.00%
Published-28 Apr, 2025 | 22:33
Updated-10 May, 2025 | 01:03
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Snowflake Connector for .NET has race condition when checking access to Easy Logging configuration file

snowflake-connector-net is the Snowflake Connector for .NET. Versions starting from 2.1.2 to before 4.4.1, are vulnerable to a Time-of-Check to Time-of-Use (TOCTOU) race condition. When using the Easy Logging feature on Linux and macOS, the Connector reads logging configuration from a user-provided file. On Linux and macOS, the Connector verifies that the configuration file can be written to only by its owner. That check was vulnerable to a TOCTOU race condition and failed to verify that the file owner matches the user running the Connector. This could allow a local attacker with write access to the configuration file or the directory containing it to overwrite the configuration and gain control over logging level and output location. This issue has been patched in version 4.4.1.

Action-Not Available
Vendor-snowflakesnowflakedb
Product-snowflake_connectorsnowflake-connector-net
CWE ID-CWE-367
Time-of-check Time-of-use (TOCTOU) Race Condition
CVE-2020-14418
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-7||HIGH
EPSS-0.06% / 19.90%
||
7 Day CHG~0.00%
Published-30 Jan, 2021 | 05:26
Updated-04 Aug, 2024 | 12:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A TOCTOU vulnerability exists in madCodeHook before 2020-07-16 that allows local attackers to elevate their privileges to SYSTEM. This occurs because path redirection can occur via vectors involving directory junctions.

Action-Not Available
Vendor-madshimorphisecn/aCisco Systems, Inc.
Product-advanced_malware_protectionunified_threat_prevention_platformmadcodehookn/a
CWE ID-CWE-367
Time-of-check Time-of-use (TOCTOU) Race Condition
CVE-2023-20135
Matching Score-4
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-4
Assigner-Cisco Systems, Inc.
CVSS Score-5.7||MEDIUM
EPSS-0.01% / 1.21%
||
7 Day CHG~0.00%
Published-13 Sep, 2023 | 16:38
Updated-23 Oct, 2024 | 19:41
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A vulnerability in Cisco IOS XR Software image verification checks could allow an authenticated, local attacker to execute arbitrary code on the underlying operating system. This vulnerability is due to a time-of-check, time-of-use (TOCTOU) race condition when an install query regarding an ISO image is performed during an install operation that uses an ISO image. An attacker could exploit this vulnerability by modifying an ISO image and then carrying out install requests in parallel. A successful exploit could allow the attacker to execute arbitrary code on an affected device.

Action-Not Available
Vendor-Cisco Systems, Inc.
Product-ios_xrCisco IOS XR Software
CWE ID-CWE-347
Improper Verification of Cryptographic Signature
CWE ID-CWE-367
Time-of-check Time-of-use (TOCTOU) Race Condition
CVE-2020-13162
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-7||HIGH
EPSS-0.35% / 56.55%
||
7 Day CHG~0.00%
Published-16 Jun, 2020 | 19:41
Updated-05 May, 2025 | 17:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A time-of-check time-of-use vulnerability in PulseSecureService.exe in Pulse Secure Client versions prior to 9.1.6 down to 5.3 R70 for Windows (which runs as NT AUTHORITY/SYSTEM) allows unprivileged users to run a Microsoft Installer executable with elevated privileges.

Action-Not Available
Vendor-n/aPulse Secure
Product-pulse_secure_desktop_clientpulse_secure_installer_servicen/a
CWE ID-CWE-367
Time-of-check Time-of-use (TOCTOU) Race Condition
CVE-2020-11298
Matching Score-4
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-4
Assigner-Qualcomm, Inc.
CVSS Score-7.8||HIGH
EPSS-0.02% / 3.36%
||
7 Day CHG~0.00%
Published-09 Jun, 2021 | 06:20
Updated-04 Aug, 2024 | 11:28
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

While waiting for a response to a callback or listener request, non-secure clients can change permissions to shared memory buffers used by HLOS Invoke Call to secure kernel in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wired Infrastructure and Networking

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-qca9377_firmwarewcn3991_firmwarewsa8830sd678sm6250p_firmwareqcs610qcs2290_firmwareqca8337qca6431_firmwaresd7c_firmwaremdm9628_firmwarewcd9360_firmwarecsra6620qcs4290wcn3950_firmwaresc8180x\+sdx55sd765g_firmwareqca6420_firmwareqca6595au_firmwareqcs2290qca6390_firmwaresd690_5gsd730_firmwarewcd9370csra6620_firmwareqcs605_firmwaresd_675_firmwaresd675_firmwarecsra6640_firmwareqcs6125_firmwareqca6426qca6584au_firmwarewcn3990_firmwareqca9984_firmwareqca9377sa415mwcn3998sd_8cx_firmwarewcd9371_firmwaresdxr2_5g_firmwarewcd9385_firmwaresm4125mdm9628sd720gmdm9206_firmwarewcd9326_firmwarewcn3950whs9410sd662sd710_firmwaresd460_firmwaresa8155qca6574au_firmwaresdx55_firmwareqca6595auwcd9375_firmwarewcn3998_firmwarewcn3999_firmwaresm7250p_firmwareqca6420qca6436_firmwarewcd9360qca6564au_firmwareqca6584ausa6155p_firmwareqca9367_firmwarewcd9306whs9410_firmwarewcn3999sa515m_firmwaresdxr2_5gqca9367qcs6125sa8155_firmwareqca4004_firmwaresd662_firmwaresa415m_firmwareqcs405qca6430wcn3988_firmwareqca6421sd712_firmwaresm6250wcd9306_firmwaresa8195psdm830_firmwarewcd9340wsa8810_firmwaresd765gsd765_firmwareqca6436wcd9326wcd9335sa6155pwcn6851qcs603_firmwareqcs4290_firmwarewcd9385wcd9341qca6431qca6696_firmwarewcd9371sd750gsd870_firmwarear8035qca6390sd_8cxaqt1000sd750g_firmwarewcd9375sc8180x\+sdx55_firmwaresm6250_firmwarewcn3910_firmwareqca4004wsa8830_firmwaresd855_firmwaresd865_5g_firmwaresd712sd888_5g_firmwarewcn3988wcn6850_firmwarewsa8815_firmwarewsa8835_firmwaresa8195p_firmwareqca6564awcn6750_firmwareqcm6125_firmwareqcm2290_firmwarewcn3991qca8337_firmwarewcd9380_firmwarewcn3990sd_675wcd9330sd865_5gqca6595qca6564ausdx24sdx55m_firmwaresd670_firmwarewsa8835sd665_firmwarewcd9380sd888_5gsm6250pqcs410qca6574asd690_5g_firmwaresdx50m_firmwaremdm9206sdx24_firmwareqca6430_firmwarewcd9335_firmwarewcn3980wcn6750mdm9205sa515mqcs605wcd9340_firmwaresd855sm4125_firmwarewcn6850sd665sd7cwcn3910wsa8815sd_8c_firmwaresd765qca6426_firmwareqca6574a_firmwareqca9984sd768g_firmwarewcn3980_firmwaresd460qca6391sd730sdx55msdxr1_firmwarewcd9330_firmwareqca6421_firmwareaqt1000_firmwaresd678_firmwarear8031_firmwareqcm4290sdx50msd480_firmwareqcs603wcn6851_firmwareqca6574ausa8155p_firmwaresd710sd670qca6564a_firmwarewcd9341_firmwareqcm6125qcm4290_firmwaresd480sd870wsa8810qcs610_firmwareqsm8250sd_8csdxr1sd768gar8031qca6595_firmwareqcs405_firmwareqca6696mdm9205_firmwareqca6391_firmwarewcd9370_firmwaresdx55sa8155pcsra6640sd675sm7250psdm830sd720g_firmwareqcs410_firmwarear8035_firmwareqcm2290qsm8250_firmwareSnapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wired Infrastructure and Networking
CWE ID-CWE-367
Time-of-check Time-of-use (TOCTOU) Race Condition
CVE-2023-1295
Matching Score-4
Assigner-Google LLC
ShareView Details
Matching Score-4
Assigner-Google LLC
CVSS Score-7.8||HIGH
EPSS-0.02% / 3.65%
||
7 Day CHG~0.00%
Published-28 Jun, 2023 | 11:08
Updated-13 Feb, 2025 | 16:39
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Privilege escalation with IO_RING_OP_CLOSE in the Linux Kernel

A time-of-check to time-of-use issue exists in io_uring subsystem's IORING_OP_CLOSE operation in the Linux kernel's versions 5.6 - 5.11 (inclusive), which allows a local user to elevate their privileges to root. Introduced in b5dba59e0cf7e2cc4d3b3b1ac5fe81ddf21959eb, patched in 9eac1904d3364254d622bf2c771c4f85cd435fc2, backported to stable in 788d0824269bef539fe31a785b1517882eafed93.

Action-Not Available
Vendor-Linux Kernel Organization, IncNetApp, Inc.
Product-linux_kernelh500sh410sh410ch300sh700sLinux Kernel
CWE ID-CWE-367
Time-of-check Time-of-use (TOCTOU) Race Condition
CVE-2020-11233
Matching Score-4
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-4
Assigner-Qualcomm, Inc.
CVSS Score-7||HIGH
EPSS-0.03% / 5.30%
||
7 Day CHG~0.00%
Published-09 Jun, 2021 | 05:00
Updated-04 Aug, 2024 | 11:28
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Time-of-check time-of-use race condition While processing partition entries due to newly created buffer was read again from mmc without validation in Snapdragon Auto, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-qfe3100qca9377_firmwarepm8909qfe1040qfe2550mdm9640_firmwarepm660pmd9607_firmwarepmi8996pmi632qfe1040_firmwareqfe1045mdm9628_firmwareqfe2340_firmwaremdm9650qln1030smb1360_firmwarepmk8001qfe2340mdm9250smb1358_firmwarepmd9635_firmwareapq8009_firmwareqca6174_firmwareqcc1110_firmwareapq8076wtr3905wtr5975_firmwareapq8076_firmwareqca9377pmi632_firmwaresdw2500_firmwarewcd9326_firmwaremdm9628wcn3615_firmwaremdm9206_firmwareqsw8573_firmwarergr7640au_firmwarewtr2955wcn3660bwgr7640_firmwareqln1021aqqcc112qca4020mdm9230_firmwarepm8953_firmwareqca6574au_firmwareqca6584mdm9630qln1031_firmwarewcn3615wcn3680b_firmwaremsm8909wapq8009w_firmwarewcn3610_firmwareapq8053_firmwaresdx20mqca6564au_firmwarewcd9306qca9367_firmwarepm8937pm660_firmwarepm8996qca9367mdm9607_firmwaremdm9655_firmwareqcc1110smb1360sd205wcd9306_firmwareapq8017_firmwarewsa8810_firmwarepm8953qualcomm215_firmwaresmb231pm439_firmwareqca4020_firmwarewcd9326wcd9335qet4200aqqfe1045_firmwaremsm8937qfe3345pm8004_firmwareqca6174a_firmwaremdm9250_firmwaresmb1358pm439pmi8952mdm9655pm8937_firmwareqet4100_firmwaresmb1350qfe2550_firmwarepm8952_firmwaremdm9330_firmwaresd210wcn3620_firmwaresd820sdx20_firmwarewsa8815_firmwarepmi8937wcn3620sdw3100wtr3925_firmwarewtr3925sdw3100_firmwareapq8017qcc112_firmwarecsr6030_firmwareqca6564amdm9630_firmwareqet4100wcn3610mdm9640pmi8952_firmwareqfe3335_firmwaresmb1355wcd9330msm8996au_firmwarewtr2955_firmwarewgr7640csr6030qca6564aupmi8994_firmwarepmm8996au_firmwareqet4101_firmwaremsm8909w_firmwaremsm8996aupmk8001_firmwareqfe1035pmm8996ausmb1355_firmwaresmb1351_firmwarepmd9655_firmwarergr7640aumdm9230qualcomm215pm8996_firmwareqet4200aq_firmwarepm8909_firmwareqca6574amdm9206pm8916_firmwareqca9379_firmwareqca6174aqfe3100_firmwaresmb358s_firmwaresmb358swtr4905wtr5975qca6174wcd9335_firmwareqtc801s_firmwaresd439_firmwarepmd9645pm8956_firmwareqsw8573qfe3335qln1036aq_firmwarewsa8815qca6584_firmwaremsm8937_firmwaremdm9650_firmwarewcn3660b_firmwarewcn3680pmx20pmd9607qca6574a_firmwareapq8009qfe3320_firmwaresmb1351smb1357_firmwarewcd9330_firmwarewtr3905_firmwarepm215_firmwaremdm9626wtr2965_firmwareqfe1035_firmwarewcn3680_firmwaresdx20qln1021aq_firmwarepm8916qln1036aqqtc801spmd9635mdm9626_firmwarepmd9655qca6574auqfe3320mdm9607sd205_firmwareqca6564a_firmwareapq8009wpmd9645_firmwaresdx20m_firmwarewsa8810smb231_firmwarewtr4905_firmwaresd210_firmwareqfe3345_firmwarewcn3680bpm215apq8096auqln1030_firmwaresmb1350_firmwarewtr2965sd820_firmwarepmi8996_firmwarepmx20_firmwarepmi8937_firmwarepm8004sdw2500apq8053apq8096au_firmwaresd439qet4101pm8952pmi8994smb1357mdm9330qca9379pm8956qln1031Snapdragon Auto, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables
CWE ID-CWE-367
Time-of-check Time-of-use (TOCTOU) Race Condition
CVE-2020-0238
Matching Score-4
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
ShareView Details
Matching Score-4
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
CVSS Score-7||HIGH
EPSS-0.01% / 0.30%
||
7 Day CHG~0.00%
Published-11 Aug, 2020 | 19:26
Updated-04 Aug, 2024 | 05:55
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In updatePreferenceIntents of AccountTypePreferenceLoader, there is a possible confused deputy attack due to a race condition. This could lead to local escalation of privilege and launching privileged activities with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-8.1 Android-9 Android-10 Android-8.0Android ID: A-150946634

Action-Not Available
Vendor-n/aGoogle LLC
Product-androidAndroid
CWE ID-CWE-367
Time-of-check Time-of-use (TOCTOU) Race Condition
CVE-2019-7307
Matching Score-4
Assigner-Canonical Ltd.
ShareView Details
Matching Score-4
Assigner-Canonical Ltd.
CVSS Score-6.5||MEDIUM
EPSS-0.04% / 9.75%
||
7 Day CHG~0.00%
Published-29 Aug, 2019 | 14:40
Updated-16 Sep, 2024 | 23:56
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Apport contains a TOCTTOU vulnerability when reading the users ~/.apport-ignore.xml

Apport before versions 2.14.1-0ubuntu3.29+esm1, 2.20.1-0ubuntu2.19, 2.20.9-0ubuntu7.7, 2.20.10-0ubuntu27.1, 2.20.11-0ubuntu5 contained a TOCTTOU vulnerability when reading the users ~/.apport-ignore.xml file, which allows a local attacker to replace this file with a symlink to any other file on the system and so cause Apport to include the contents of this other file in the resulting crash report. The crash report could then be read by that user either by causing it to be uploaded and reported to Launchpad, or by leveraging some other vulnerability to read the resulting crash report, and so allow the user to read arbitrary files on the system.

Action-Not Available
Vendor-apport_projectCanonical Ltd.Ubuntu
Product-apportubuntu_linuxapport
CWE ID-CWE-367
Time-of-check Time-of-use (TOCTOU) Race Condition
CVE-2022-48618
Matching Score-4
Assigner-Apple Inc.
ShareView Details
Matching Score-4
Assigner-Apple Inc.
CVSS Score-7||HIGH
EPSS-0.18% / 39.85%
||
7 Day CHG~0.00%
Published-09 Jan, 2024 | 17:58
Updated-30 Jul, 2025 | 01:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Known KEV||Action Due Date - 2024-02-21||Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.

The issue was addressed with improved checks. This issue is fixed in macOS Ventura 13.1, watchOS 9.2, iOS 16.2 and iPadOS 16.2, tvOS 16.2. An attacker with arbitrary read and write capability may be able to bypass Pointer Authentication. Apple is aware of a report that this issue may have been exploited against versions of iOS released before iOS 15.7.1.

Action-Not Available
Vendor-Apple Inc.
Product-ipadoswatchostvosiphone_osmacostvOSwatchOSiOS and iPadOSmacOSwatchosiphone_osmacosipadostvosMultiple Products
CWE ID-CWE-367
Time-of-check Time-of-use (TOCTOU) Race Condition
CVE-2025-46328
Matching Score-4
Assigner-GitHub, Inc.
ShareView Details
Matching Score-4
Assigner-GitHub, Inc.
CVSS Score-3.3||LOW
EPSS-0.01% / 0.21%
||
7 Day CHG~0.00%
Published-28 Apr, 2025 | 22:33
Updated-09 May, 2025 | 19:38
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
NodeJS Driver for Snowflake has race condition when checking access to Easy Logging configuration file

snowflake-connector-nodejs is a NodeJS driver for Snowflake. Versions starting from 1.10.0 to before 2.0.4, are vulnerable to a Time-of-Check to Time-of-Use (TOCTOU) race condition. When using the Easy Logging feature on Linux and macOS the Driver reads logging configuration from a user-provided file. On Linux and macOS the Driver verifies that the configuration file can be written to only by its owner. That check was vulnerable to a TOCTOU race condition and failed to verify that the file owner matches the user running the Driver. This could allow a local attacker with write access to the configuration file or the directory containing it to overwrite the configuration and gain control over logging level and output location. This issue has been patched in version 2.0.4.

Action-Not Available
Vendor-snowflakesnowflakedb
Product-snowflake_connectorsnowflake-connector-nodejs
CWE ID-CWE-367
Time-of-check Time-of-use (TOCTOU) Race Condition
CVE-2025-27076
Matching Score-4
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-4
Assigner-Qualcomm, Inc.
CVSS Score-7.8||HIGH
EPSS-0.01% / 1.06%
||
7 Day CHG~0.00%
Published-06 Aug, 2025 | 07:26
Updated-19 Aug, 2025 | 13:08
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Time-of-check Time-of-use (TOCTOU) Race Condition in Display

Memory corruption while processing simultaneous requests via escape path.

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-qcm6490_firmwaresnapdragon_8cx_gen_3_compute_platform_\(sc8280xp-bb\)aqt1000snapdragon_8cx_gen_3_compute_platform_\(sc8280xp-ab\)_firmwaresnapdragon_7c\+_gen_3_compute_firmwaresm6250snapdragon_7c_compute_platform_\(sc7180-ac\)wsa8835qca6391snapdragon_8cx_gen_2_5g_compute_platform_\(sc8180xp-aa\)snapdragon_8cx_gen_3_compute_platform_\(sc8280xp-ab\)fastconnect_7800_firmwarewsa8845_firmwaresc8180x\+sdx55_firmwarewsa8830snapdragon_8cx_gen_2_5g_compute_platform_\(sc8180x-ac\)_firmwarewsa8845h_firmwaresnapdragon_8c_compute_platform_\(sc8180xp-ad\)snapdragon_8cx_gen_2_5g_compute_platform_\(sc8180xp-ab\)_firmwareqca6430qcs6490_firmwaresnapdragon_8cx_compute_platform_\(sc8180x-aa\)wsa8815_firmwarevideo_collaboration_vc3_platform_firmwarewsa8810qca6420snapdragon_8cx_gen_2_5g_compute_platform_\(sc8180x-ac\)wcd9370_firmwaresnapdragon_8c_compute_platform_\(sc8180x-ad\)fastconnect_6800snapdragon_8cx_compute_platform_\(sc8180x-ab\)_firmwarefastconnect_6200_firmwarewsa8840_firmwarewsa8810_firmwarewcd9380_firmwarewsa8835_firmwaresnapdragon_7c_gen_2_compute_platform_\(sc7180-ad\)_\"rennell_pro\"_firmwarewcd9341snapdragon_8cx_compute_platform_\(sc8180xp-ac\)_firmwarewcd9370sm6250_firmwareaqt1000_firmwareqcm5430_firmwaresnapdragon_8cx_compute_platform_\(sc8180xp-af\)wcd9385snapdragon_8cx_gen_3_compute_platform_\(sc8280xp-bb\)_firmwarefastconnect_6800_firmwaresnapdragon_7c\+_gen_3_computewsa8840wcd9375_firmwaresc8180x\+sdx55wcd9385_firmwarewsa8815wcd9341_firmwaresnapdragon_8cx_compute_platform_\(sc8180xp-ac\)fastconnect_6700_firmwarefastconnect_7800snapdragon_8cx_gen_2_5g_compute_platform_\(sc8180xp-ab\)qcs5430snapdragon_8c_compute_platform_\(sc8180xp-ad\)_firmwarewsa8845hsc8380xpwcd9340qcm6490qcs5430_firmwarefastconnect_6900_firmwaresnapdragon_7c_gen_2_compute_platform_\(sc7180-ad\)_\"rennell_pro\"snapdragon_8cx_gen_2_5g_compute_platform_\(sc8180x-af\)_firmwarefastconnect_6700qca6430_firmwaresnapdragon_8c_compute_platform_\(sc8180x-ad\)_firmwarewsa8845fastconnect_6900qcs6490wcd9375video_collaboration_vc3_platformsnapdragon_8cx_compute_platform_\(sc8180xp-af\)_firmwaresc8380xp_firmwaresnapdragon_8cx_gen_2_5g_compute_platform_\(sc8180x-af\)wcd9340_firmwareqcm5430snapdragon_8cx_compute_platform_\(sc8180x-aa\)_firmwaresnapdragon_8cx_compute_platform_\(sc8180x-ab\)qca6391_firmwarewsa8830_firmwarewcd9380snapdragon_7c_compute_platform_\(sc7180-ac\)_firmwarefastconnect_6200qca6420_firmwaresnapdragon_8cx_gen_2_5g_compute_platform_\(sc8180xp-aa\)_firmwareSnapdragon
CWE ID-CWE-367
Time-of-check Time-of-use (TOCTOU) Race Condition
CVE-2022-48191
Matching Score-4
Assigner-Trend Micro, Inc.
ShareView Details
Matching Score-4
Assigner-Trend Micro, Inc.
CVSS Score-7||HIGH
EPSS-0.05% / 16.42%
||
7 Day CHG~0.00%
Published-18 Jan, 2023 | 23:07
Updated-03 Apr, 2025 | 20:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A vulnerability exists in Trend Micro Maximum Security 2022 (17.7) wherein a low-privileged user can write a known malicious executable to a specific location and in the process of removal and restoral an attacker could replace an original folder with a mount point to an arbitrary location, allowing a escalation of privileges on an affected system.

Action-Not Available
Vendor-Microsoft CorporationTrend Micro Incorporated
Product-maximum_security_2022windowsTrend Micro Maxium Security (Consumer)
CWE ID-CWE-367
Time-of-check Time-of-use (TOCTOU) Race Condition
CVE-2022-33214
Matching Score-4
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-4
Assigner-Qualcomm, Inc.
CVSS Score-8.4||HIGH
EPSS-0.06% / 17.14%
||
7 Day CHG~0.00%
Published-17 Oct, 2022 | 00:00
Updated-14 May, 2025 | 15:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Memory corruption in display due to time-of-check time-of-use of metadata reserved size in Snapdragon Auto, Snapdragon Compute, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Wearables

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-sm4375wcn6855_firmwareqca6391_firmwareqcs4290sd888_5g_firmwareqca6574_firmwaresdx50m_firmwaresw5100_firmwareqca6430sa8155wcn7850_firmwarewcd9375_firmwaresd855_firmwaresm4125qcm4290_firmwaresd680_firmwareqca6574au_firmwarewcn3990wsa8835_firmwareqca6696_firmwareqcs2290qcs410sa6145pwcn6855qam8295pwsa8830qca6696sm8475sd778g_firmwaresm7325pwcn3910sa6155pqca6420sm4375_firmwarewcn3998_firmwarewcn6750_firmwaresdx55qca6390_firmwaresm7250pqcn7606wcn6740_firmwaresd765sdx55_firmwaresd750g_firmwareqca6574a_firmwarewcd9385_firmwaresa8195p_firmwarewcn3950_firmwarewsa8815_firmwaresd439qcm6490sd678qcs410_firmwaresd660_firmwaresd660qcs6125sa4155psa6145p_firmwarewcd9335qca6430_firmwaresd675_firmwareqcs2290_firmwareaqt1000qca6391wcd9370_firmwaresa8295pwcn3991_firmwaresa8295p_firmwaresd662wsa8835sa8195psm7250p_firmwarewcn6851_firmwaresd768g_firmwarewcn3980_firmwaresd480_firmwaresm7315_firmwareqca6574aqcs610wcn6750qca6595auwcn3615_firmwarewcn6851sd690_5gqcs6490_firmwaresa4150psd865_5gwcn6850_firmwaresd865_5g_firmwarewcn3660b_firmwarewsa8830_firmwarewcd9341wcn3660bwcn3991sd460wcn3998qca6574ausd888_firmwaresm7315wcn3990_firmwarewcn6856_firmwaresdx55mqcm2290_firmwareqcm6125_firmwarewcd9341_firmwarewcn3615qca6420_firmwaresd_675sa4150p_firmwarewcd9335_firmwarewsa8815sd750gwcd9326sw5100p_firmwaresda429wwcn6856wcn6740wcn7850sd690_5g_firmwaresda429w_firmwaresd_8_gen1_5g_firmwaresd460_firmwarewcd9380wcn3988qcm6125sa8155p_firmwaresd780g_firmwaresd870_firmwarewcd9326_firmwarewcn3988_firmwareqca6574sd870sd765_firmwarewcn7851_firmwaresa6150p_firmwareqcs6490sd778gqam8295p_firmwaresw5100sd680sd_675_firmwareqcs6125_firmwaresd768gwcn3610_firmwarewcn3680bwcn6850wsa8810sd855qcs4290_firmwaresa8145psd439_firmwareqcc5100_firmwarewcd9380_firmwaresd678_firmwaresa8145p_firmwaresd888_5gsa8155_firmwaresd662_firmwaresd720g_firmwaresd780gsd480sm6250qca6390wcn3910_firmwaresd695qcm4290sa6155sa6150pqca6595au_firmwaresm4125_firmwarewcn3610qcm2290sd695_firmwareqcm6490_firmwarewsa8810_firmwaresd730_firmwaresdx55m_firmwaresm6250_firmwarewcd9375wcd9370sa8150p_firmwarewcn7851qcn7606_firmwarewcd9385sa6155p_firmwaresa8150psd765gwcn3950sw5100psd730sa6155_firmwareaqt1000_firmwaresd888sd720gsdx50msd675wcn3680b_firmwarewcn3980sm7325p_firmwareqcc5100sa8155pqcs610_firmwaresd765g_firmwaresa4155p_firmwareSnapdragon Auto, Snapdragon Compute, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Wearables
CWE ID-CWE-367
Time-of-check Time-of-use (TOCTOU) Race Condition
CVE-2022-33257
Matching Score-4
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-4
Assigner-Qualcomm, Inc.
CVSS Score-9.3||CRITICAL
EPSS-0.04% / 11.86%
||
7 Day CHG~0.00%
Published-07 Mar, 2023 | 04:43
Updated-03 Aug, 2024 | 08:01
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Time-of-check time-of-use race condition in Core

Memory corruption in Core due to time-of-check time-of-use race condition during dump collection in trust zone.

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-qca9377_firmwaresd_8cx_gen3_firmwareqca8337qca6431_firmwaresdx65wcn3950_firmwaresa8150p_firmwareqcs2290qca6595au_firmwaresa6155qca6335csra6620_firmwareqcs605_firmwaresd_675_firmwarecsra6640_firmwarewcn3998qam8295psd_8cx_gen2_firmwareqcn6024_firmwaresm4125wcn3950sd_8_gen1_5g_firmwareqsm8350_firmwareqsm8350sd460_firmwaresm7315_firmwarewcn7850qca6574au_firmwarewcd9375_firmwareqca8081_firmwaresa6155_firmwarewcn3998_firmwareqca6420sd680_firmwarewcn3999sd_8cx_gen2qrb5165_firmwareqrb5165m_firmwareqca6698aqsa8155_firmwareqca4004_firmwaresd662_firmwareqcs405qca6430wcd9306_firmwarewcd9340sd765gsw5100qca6436sd680wcn6851sa6155pqcs603_firmwarewcn7851_firmwareqca6698aq_firmwarewcd9341qca6431qca6696_firmwaresd750gsd870_firmwarewcn3910_firmwaresxr2150p_firmwaresd_8cxsa8150pqca4004wsa8830_firmwaresd855_firmwaresd865_5g_firmwaresnapdragon_4_gen_1wcn3988wcn7850_firmwaresm8475qcn7606_firmwaresa8295p_firmwarewcn6750_firmwarewcn3991qca8337_firmwarewcd9380_firmwaressg2125psw5100pqca6564ausdx55m_firmwarewcn6856_firmwaresd670_firmwareqca6574wcd9380sd690_5g_firmwaresdx50m_firmwaresxr1230psdx24_firmwareqca6430_firmwareqcn9012_firmwarewcd9335_firmwarewcn3980qca6335_firmwareqcm4325_firmwareqcs605wcd9340_firmwarewsa8815wcn6850wcn3910qca6426_firmwareqca9984sd695qcn9024wcn3980_firmwaresdx55mqcc5100_firmwareqca6421_firmwaresa8295pwcn6740_firmwaresd678_firmwarear8031_firmwareqrb5165wcn6851_firmwareqcs603sd670qca6564a_firmwareqcn9024_firmwaresdx57mqcm4290_firmwaresd480sd870wcn6855wsa8832sa8540psw5100p_firmwareqsm8250sa6145psd695_firmwarear8031qca6595_firmwareqcs405_firmwaremdm9205_firmwareqca6391_firmwaresd780g_firmwarewcd9370_firmwaresdx55sd888_firmwaresa8155pcsra6640sd675sdx70mssg2115p_firmwaresxr2150par8035_firmwareqsm8250_firmwareqcm2290qcn7606wcn3991_firmwarewsa8830sd678qcs2290_firmwaresnapdragon_4_gen_1_firmwarecsra6620qcs4290sd765g_firmwareqca6420_firmwareqca6390_firmwaresd690_5gwcd9370sd675_firmwaressg2115pqca6426wcn3990_firmwareqrb5165n_firmwareqca9984_firmwareqca9377sd_8cx_firmwarewcd9385_firmwaresdxr2_5g_firmwarewcd9326_firmwaresd662qam8295p_firmwareqcn9011_firmwaresa8155sa9000p_firmwaresdx55_firmwareqca6595auwcn3999_firmwaresm7250p_firmwareqca6436_firmwareqrb5165nqca6564au_firmwaresd778gsa6155p_firmwareqca6310wcd9306wcn7851qcs6490sdxr2_5gwcn3988_firmwaresa6145p_firmwareqca6421sd778g_firmwarewsa8810_firmwaresd765_firmwarewcd9326wcd9335sg4150pqca8081qca6174a_firmwareqcs4290_firmwarewcd9385qcs6490_firmwaresd_8cx_gen3sdx70m_firmwarear8035qca6390sd750g_firmwareaqt1000wcd9375qcm6490sd888_5g_firmwarewcn6850_firmwarewsa8815_firmwarewsa8835_firmwareqca6564asg4150p_firmwareqcm4325qcm2290_firmwarewcn3990sd_675sd780gsd865_5gqca6595qcc5100sdx24qcn9012sd888wsa8835sxr1230p_firmwaresd665_firmwaresa8540p_firmwaresd888_5gssg2125p_firmwareqca6574awcn6855_firmwareqca6174asm7325pqca6310_firmwarewcn6750mdm9205sa9000pqca6574_firmwaresd855sm4125_firmwaresm7325p_firmwaresd665sdx57m_firmwaresd765qca6574a_firmwaresd768g_firmwareqrb5165msd850_firmwaresm7315sd460qca6391aqt1000_firmwaresdx65_firmwareqcm4290qcm6490_firmwaresdx50mwsa8832_firmwaresd480_firmwareqcn9011qca6574ausa8155p_firmwarewcd9341_firmwarewsa8810wcn6856sd768gwcn6740qca6696sd845_firmwareqcn6024sd845sm7250psw5100_firmwaresd850Snapdragonqca9377_firmwaresd_8cx_gen3_firmwarewcn3991_firmwareqcs2290_firmwareqca6431_firmwaresnapdragon_4_gen_1_firmwarewcn3950_firmwaresa8150p_firmwaresd765g_firmwareqca6420_firmwareqca6595au_firmwareqca6390_firmwarecsra6620_firmwareqcs605_firmwaresd_675_firmwaresd675_firmwarecsra6640_firmwarewcn3990_firmwareqrb5165n_firmwareqca9984_firmwaresd_8cx_firmwarewcd9385_firmwaresdxr2_5g_firmwaresd_8cx_gen2_firmwareqcn6024_firmwarewcd9326_firmwaresd_8_gen1_5g_firmwareqsm8350_firmwaresd460_firmwareqam8295p_firmwareqcn9011_firmwaresa9000p_firmwaresm7315_firmwareqca6574au_firmwaresdx55_firmwarewcd9375_firmwareqca8081_firmwaresa6155_firmwarewcn3998_firmwaresm7250p_firmwarewcn3999_firmwareqca6436_firmwareqca6564au_firmwaresd680_firmwaresa6155p_firmwareqrb5165_firmwareqrb5165m_firmwaresa8155_firmwareqca4004_firmwaresd662_firmwarewcn3988_firmwaresa6145p_firmwarewcd9306_firmwaresd778g_firmwarewsa8810_firmwaresd765_firmwareqcs603_firmwarewcn7851_firmwareqca6698aq_firmwareqca6174a_firmwareqcs4290_firmwareqca6696_firmwareqcs6490_firmwaresd870_firmwaresdx70m_firmwarewcn3910_firmwaresxr2150p_firmwaresd750g_firmwarewsa8830_firmwaresd855_firmwaresd865_5g_firmwarewsa8815_firmwaresd888_5g_firmwarewcn6850_firmwarewcn7850_firmwarewsa8835_firmwaresa8295p_firmwareqcn7606_firmwarewcn6750_firmwaresg4150p_firmwareqcm2290_firmwareqca8337_firmwarewcd9380_firmwaresdx55m_firmwarewcn6856_firmwaresd670_firmwaresxr1230p_firmwaresd665_firmwaresa8540p_firmwaressg2125p_firmwaresd690_5g_firmwaresdx50m_firmwarewcn6855_firmwaresdx24_firmwareqca6310_firmwareqca6430_firmwareqcn9012_firmwarewcd9335_firmwareqca6335_firmwareqcm4325_firmwareqca6574_firmwarewcd9340_firmwaresm4125_firmwaresm7325p_firmwaresdx57m_firmwareqca6426_firmwareqca6574a_firmwaresd768g_firmwaresd850_firmwarewcn3980_firmwareqcc5100_firmwareqca6421_firmwareaqt1000_firmwarewcn6740_firmwaresdx65_firmwaresd678_firmwarear8031_firmwareqcm6490_firmwarewsa8832_firmwaresd480_firmwarewcn6851_firmwaresa8155p_firmwareqca6564a_firmwareqcn9024_firmwarewcd9341_firmwareqcm4290_firmwaresw5100p_firmwaresd695_firmwareqca6595_firmwareqcs405_firmwaremdm9205_firmwareqca6391_firmwaresd845_firmwaresd780g_firmwarewcd9370_firmwaresd888_firmwaressg2115p_firmwaresw5100_firmwarear8035_firmwareqsm8250_firmware
CWE ID-CWE-367
Time-of-check Time-of-use (TOCTOU) Race Condition
CVE-2022-34398
Matching Score-4
Assigner-Dell
ShareView Details
Matching Score-4
Assigner-Dell
CVSS Score-7.5||HIGH
EPSS-0.04% / 10.02%
||
7 Day CHG~0.00%
Published-01 Feb, 2023 | 05:28
Updated-26 Mar, 2025 | 18:53
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Dell BIOS contains a Time-of-check Time-of-use vulnerability. A local authenticated malicious user could\u00a0potentially exploit this vulnerability by using a specifically timed DMA transaction during an SMI to gain arbitrary code execution on the system.

Action-Not Available
Vendor-Dell Inc.
Product-optiplex_7760_all-in-one_firmwarelatitude_5401optiplex_7770_all-in-oneinspiron_3470latitude_e7270precision_3541_firmwarealienware_m15_r1alienware_x15_r2vostro_3669inspiron_5680vostro_3881_firmwarelatitude_7200_2-in-1inspiron_5477_firmwarelatitude_5511_firmwarelatitude_7380_firmwareprecision_3550vostro_3888inspiron_5490_all-in-one_firmwaredell_g3_15_3590inspiron_5570latitude_7370vostro_3888_firmwarelatitude_7370_firmwareoptiplex_5070_firmwarealienware_aurora_r13precision_7540latitude_3390_2-in-1latitude_3310_2-in-1wyse_5070latitude_5490alienware_area_51m_r1_firmwarelatitude_5590optiplex_5080latitude_5511latitude_7390_2-in-1latitude_7214_rugged_extreme_firmwareprecision_5530_2-in-1alienware_m17_r2vostro_3070_firmwarelatitude_3190_2-in-1optiplex_7071alienware_x14_firmwarealienware_m15_r1_firmwaredell_g5_5000_firmwareinspiron_3583alienware_m17_r3_firmwarelatitude_5300precision_7720edge_gateway_5000vostro_3481alienware_x14latitude_9410_firmwarevostro_7590precision_5530_firmwarelatitude_e7270_firmwarelatitude_5280_firmwarelatitude_3180latitude_5300_2-in-1latitude_7424_rugged_extreme_firmwareoptiplex_5050optiplex_3070_firmwarealienware_aurora_r11latitude_7410_firmwarevostro_3667latitude_7300alienware_x15_r2_firmwarelatitude_e7470_firmwareprecision_3620_toweroptiplex_5260_all-in-oneprecision_7720_firmwarelatitude_5310_2-in-1precision_3431_toweroptiplex_3060_firmwareinspiron_3780inspiron_3782latitude_3590_firmwarelatitude_7490_firmwarealienware_m15_r2latitude_7390_firmwarelatitude_5500_firmwareprecision_7710latitude_5410_firmwareprecision_5520vostro_5090_firmwarelatitude_5310_2-in-1_firmwarexps_8950latitude_7400latitude_5591optiplex_5270_all-in-one_firmwareinspiron_3502_firmwareprecision_3520dell_g3_3579inspiron_3471inspiron_3880_firmwareoptiplex_5050_firmwareprecision_7520_firmwareoptiplex_7071_firmwareoptiplex_3050precision_7820_tower_firmwareoptiplex_5080_firmwareoptiplex_7460_all-in-onevostro_3471optiplex_5070dell_latitude_3480_firmwareinspiron_3480_firmwarealienware_m15_r3optiplex_5060_firmwareoptiplex_3050_all-in-one_firmwarexps_15_9575_2-in-1optiplex_3090_firmwarevostro_3581_firmwareprecision_7530_firmwarealienware_m17_r4_firmwarealienware_x17_r1vostro_3581latitude_9410inspiron_7777optiplex_7070optiplex_7080_firmwarevostro_3583_firmwarelatitude_5420_rugged_firmwareinspiron_3521latitude_3190_firmwarelatitude_5310aurora_r14_firmwareinspiron_5490_all-in-oneoptiplex_7460_all-in-one_firmwareinspiron_5401_all-in-one_firmwaredell_g3_3779_firmwarelatitude_5420_ruggedvostro_3268_firmwarealienware_aurora_r8latitude_7220_rugged_extreme_tabletlatitude_5500alienware_x15_r1precision_7550_firmwarelatitude_7390_2-in-1_firmwareinspiron_5400latitude_7480_firmwareinspiron_5477chengming_3991latitude_5288_firmwarevostro_5090inspiron_5480latitude_3190inspiron_3510_firmwarelatitude_7220ex_rugged_extreme_tablet_firmwarealienware_aurora_r8_firmwarexps_8950_firmwareinspiron_3881_firmwarelatitude_5488latitude_5290_2-in-1_firmwareinspiron_3471_firmwarevostro_3669_firmwarelatitude_7380optiplex_5480_all-in-one_firmwareprecision_3540alienware_aurora_r11_firmwarealienware_x17_r2_firmwarelatitude_5501latitude_7400_firmwareprecision_7710_firmwareinspiron_3580_firmwarelatitude_3590inspiron_3781_firmwarewyse_5070_firmwareprecision_5720_all-in-onechengming_3990vostro_3670_firmwarelatitude_7214_rugged_extremeinspiron_3510inspiron_3280_firmwarelatitude_3310latitude_7414_rugged_extreme_firmwarelatitude_5290_2-in-1precision_7520vostro_3583alienware_x17_r2wyse_5470_all-in-one_firmwarelatitude_5491_firmwarevostro_5880_firmwareprecision_7820_toweroptiplex_3090latitude_7290latitude_7212_rugged_extreme_tablet_firmwarealienware_area_51m_r1precision_7540_firmwarelatitude_13_3380_firmwareinspiron_3582latitude_7480latitude_7285_2-in-1_firmwareoptiplex_3060vostro_3881wyse_5470_firmwareoptiplex_5060latitude_5285_2-in-1edge_gateway_5000_firmwarechengming_3988_firmwareinspiron_3584inspiron_5770alienware_m17_r2_firmwarewyse_5470_all-in-onelatitude_3580precision_5820_tower_firmwareprecision_3530_firmwarelatitude_3190_2-in-1_firmwarelatitude_5580_firmwareinspiron_5480_firmwareinspiron_5481_2-in-1latitude_7210_2-in-1latitude_3189optiplex_xe3_firmwareinspiron_7590xps_15_9575_2-in-1_firmwarevostro_5880vostro_3580latitude_13_3380vostro_3268precision_7750optiplex_7070_firmwarevostro_3584optiplex_5270_all-in-oneoptiplex_xe3embedded_box_pc_5000dell_g5_15_5590embedded_box_pc_3000_firmwarevostro_3481_firmwareinspiron_3502latitude_5491inspiron_3580vostro_3267_firmwarevostro_3470_firmwareoptiplex_7080alienware_aurora_r12optiplex_5480_all-in-onealienware_aurora_r9dell_g7_15_7590_firmwarelatitude_7280alienware_area_51m_r2_firmwarelatitude_5400alienware_m15_r4_firmwarealienware_aurora_r13_firmwarelatitude_5410latitude_5480precision_3541xps_8940optiplex_7050_firmwareprecision_7730_firmwareprecision_3551latitude_5401_firmwarealienware_m17_r3precision_5820_towerprecision_7730latitude_5414_rugged_firmwareprecision_3640_tower_firmwarelatitude_5424_rugged_firmwarelatitude_7275_2-in-1_firmwarelatitude_7300_firmwarealienware_x15_r1_firmwareembedded_box_pc_3000latitude_5510dell_g3_3779optiplex_7770_all-in-one_firmwarelatitude_5400_firmwarewyse_5470alienware_m17_r4optiplex_7780_all-in-one_firmwareinspiron_7700_all-in-onevostro_3671_firmwareprecision_3440precision_7510_firmwareprecision_3440_firmwareprecision_5530_2-in-1_firmwarealienware_x17_r1_firmwarexps_8930optiplex_7470_all-in-onelatitude_3310_2-in-1_firmwareoptiplex_5250_firmwareinspiron_5680_firmwarealienware_m15_r3_firmwareinspiron_3671_firmwareprecision_3550_firmwarevostro_3668_firmwarelatitude_7410latitude_3310_firmwarelatitude_5501_firmwaredell_g3_15_3590_firmwareinspiron_3781optiplex_3280_all-in-one_firmwarelatitude_5411optiplex_3050_firmwarealienware_aurora_r10_firmwareoptiplex_7450_firmwareoptiplex_7450inspiron_7590_firmwareinspiron_3521_firmwareprecision_7740_firmwaredell_g5_5090_firmwarelatitude_7285_2-in-1latitude_3189_firmwarealienware_m15_r2_firmwarelatitude_7389vostro_3681inspiron_7591_firmwaredell_g5_15_5590_firmwareinspiron_5570_firmwareprecision_7920_towerlatitude_5290latitude_7400_2-in-1_firmwarelatitude_5289_firmwarechengming_3980_firmwareinspiron_3481inspiron_3780_firmwareprecision_3530inspiron_3582_firmwarelatitude_5411_firmwarelatitude_3120_firmwareinspiron_3470_firmwareaurora_r14latitude_5590_firmwareoptiplex_7070_ultraprecision_7740vostro_3267inspiron_3671inspiron_3481_firmwareprecision_5530latitude_7275_2-in-1latitude_7310_firmwareprecision_5540optiplex_3050_all-in-onedell_latitude_3580_firmwareinspiron_3584_firmwarelatitude_9510optiplex_3280_all-in-onewyse_7040_thininspiron_3480inspiron_3583_firmwareinspiron_5770_firmwarelatitude_3490precision_3930_rack_firmwareinspiron_3670latitude_3180_firmwarevostro_3681_firmwarealienware_m17_r1_firmwarevostro_3580_firmwareinspiron_3581_firmwarelatitude_9510_firmwareprecision_3430_tower_firmwarelatitude_3300_firmwarelatitude_7400_2-in-1precision_3640_towerdell_g5_5090latitude_3490_firmwarelatitude_5300_2-in-1_firmwarevostro_3668latitude_7210_2-in-1_firmwareoptiplex_7760_all-in-onelatitude_7280_firmwarelatitude_5510_firmwarevostro_3670edge_gateway_3000latitude_5280inspiron_3670_firmwarelatitude_7212_rugged_extreme_tabletoptiplex_7780_all-in-onelatitude_7220_rugged_extreme_tablet_firmwareprecision_3540_firmwarelatitude_5300_firmwareinspiron_7777_firmwareinspiron_3482_firmwareinspiron_3880latitude_5289inspiron_5481_2-in-1_firmwarelatitude_5480_firmwareprecision_3431_tower_firmwarevostro_3471_firmwareoptiplex_3080_firmwareprecision_3930_rackprecision_7550precision_3420_towerinspiron_7700_all-in-one_firmwareinspiron_3881inspiron_3482dell_g3_3579_firmwarexps_13_9380latitude_7220ex_rugged_extreme_tabletlatitude_7414_rugged_extremeprecision_3420_tower_firmwareoptiplex_3080alienware_m17_r1alienware_area_51m_r2dell_g5_5000dell_g7_17_7790_firmwarelatitude_3480latitude_5490_firmwarelatitude_5591_firmwarelatitude_5310_firmwareinspiron_3782_firmwarevostro_3070alienware_m15_r4precision_3430_towervostro_3671precision_5520_firmwareinspiron_7591latitude_7310inspiron_5401_all-in-oneinspiron_7790wyse_7040_thin_firmwarechengming_3988inspiron_7790_firmwarexps_15_7590latitude_3300latitude_5580precision_3620_tower_firmwareedge_gateway_3000_firmwareprecision_5540_firmwarevostro_3584_firmwarelatitude_3390_2-in-1_firmwareoptiplex_7480_all-in-onechengming_3990_firmwarexps_8940_firmwaredell_g7_15_7590latitude_3120vostro_3480precision_3520_firmwarechengming_3980precision_3551_firmwareoptiplex_7070_ultra_firmwareoptiplex_5260_all-in-one_firmwareoptiplex_7060latitude_7200_2-in-1_firmwarelatitude_5290_firmwarelatitude_7424_rugged_extremevostro_3582_firmwareprecision_3630_towervostro_3470latitude_5414_ruggedoptiplex_7480_all-in-one_firmwarealienware_aurora_r9_firmwareoptiplex_3070inspiron_3280latitude_7390latitude_7290_firmwareprecision_7530xps_8930_firmwaredell_g7_17_7790precision_3240_compactprecision_7750_firmwareprecision_5720_all-in-one_firmwarealienware_aurora_r12_firmwarelatitude_5285_2-in-1_firmwareprecision_7510vostro_3480_firmwarechengming_3991_firmwarevostro_7590_firmwarexps_15_7590_firmwareembedded_box_pc_5000_firmwarealienware_aurora_r10optiplex_7050precision_3510_firmwareprecision_3510xps_13_9380_firmwarelatitude_7490latitude_5288latitude_7389_firmwareoptiplex_7060_firmwareprecision_3240_compact_firmwareoptiplex_7470_all-in-one_firmwarelatitude_e7470precision_3630_tower_firmwareoptiplex_5250inspiron_3581vostro_3582vostro_3667_firmwareprecision_7920_tower_firmwareinspiron_5400_firmwarelatitude_5424_ruggedlatitude_5488_firmwareCPG BIOS
CWE ID-CWE-367
Time-of-check Time-of-use (TOCTOU) Race Condition
CVE-2022-31642
Matching Score-4
Assigner-HP Inc.
ShareView Details
Matching Score-4
Assigner-HP Inc.
CVSS Score-7||HIGH
EPSS-0.11% / 29.65%
||
7 Day CHG~0.00%
Published-14 Jun, 2023 | 16:32
Updated-30 Dec, 2024 | 16:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Potential vulnerabilities have been identified in the system BIOS of certain HP PC products, which might allow arbitrary code execution, escalation of privilege, denial of service, and information disclosure.

Action-Not Available
Vendor-HP Inc.
Product-probook_640_g3zbook_studio_g5_firmwareelitedesk_800_g3elitebook_725_g4elitebook_845_g8eliteone_800_g3_healthcare_edition_firmwarezbook_17_g4_firmwareprobook_640_g7z2_tower_g4engage_flex_pro-c_retail_systemzhan_66_pro_14_g2probook_630_g8_firmwareelitebook_x360_830_g5_firmwareelitebook_x360_830_g5elitedesk_805_g6prodesk_400_g5_firmwarez240_towerelite_x2_1013_g3pro_x360_fortis_g10engage_flex_pro-c_retail_system_firmwareprodesk_480_g6elitedesk_800_g4_firmwareproone_440_g9eliteone_800_g3_healthcare_editionprodesk_400_g4probook_445_g6z2_tower_g9pro_tower_400_g9_firmwareelitebook_840_g7_firmwareprobook_445_g7zbook_17_g6eliteone_840_g9_firmwareprobook_650_g8_firmwareeliteone_800_g4zbook_studio_g9elitebook_630_g9_firmwarezbook_fury_17_g7_firmwareprobook_645_g4_firmwarezhan_66_pro_14_g3elitebook_836_g6probook_440_g4zbook_17_g6_firmwareproone_400_g4_firmwarez2_mini_g3elitebook_850_g5_firmwareprodesk_600_g3elitebook_x360_1020_g2elite_tower_600_g9_firmwareelite_slice_g2_firmwareelitebook_x360_1030_g7_firmwarezbook_17_g4elite_tower_880_g9_firmwarezbook_fury_15_g7mt32elitebook_840_g4elitedesk_880_g8zhan_66_pro_15_g3zbook_power_g9mt22_firmwarez2_mini_g5_firmwareelite_x360_830_g9_firmwareelitebook_x360_1040_g8_firmwareproone_480_g3elitedesk_880_g4_firmwareelitedesk_880_g6elitebook_865_g9elitebook_846_g5_healthcare_edition_firmwareelitebook_848_g4probook_455_g4probook_x360_11_g6_eeelitebook_820_g4_firmwareelitebook_840_g5_firmwarepro_tower_480_g9z2_small_form_factor_g8_firmwareproone_440_g4eliteone_800_g6elitebook_835_g8z2_small_form_factor_g9_firmwareprodesk_480_g4prodesk_400_g6elitebook_x360_1030_g8probook_640_g5eliteone_840_g9elitedesk_800_g8elitebook_755_g4elitedesk_805_g8prodesk_600_g5probook_x360_11_g4_ee_firmwareprodesk_400_g4_firmwarez2_small_form_factor_g5zbook_firefly_g9elitebook_830_g6elite_dragonfly_g2z2_mini_g9_firmwareprobook_430_g6_firmwareprobook_650_g5_firmwarepro_mt440_g3_firmwareprobook_x360_435_g7_firmwareprobook_x360_11_g6_ee_firmwareelite_x2_1012_g2_firmwarez2_tower_g9_firmwareproone_400_g6_firmwareelitebook_x360_830_g7probook_445_g7_firmwareelitebook_x360_1040_g8probook_450_g5probook_450_g6_firmwareprodesk_680_g3_firmwareprobook_455_g5probook_430_g5_firmwareelitebook_836_g5_firmwarezbook_17_g5probook_650_g7_firmwarezhan_66_pro_15_g3_firmwareprobook_440_g7elite_tower_880_g9prodesk_480_g4_firmwareengage_one_all-in-one_systemelitebook_846r_g4probook_430_g4probook_470_g4eliteone_800_g4_healthcare_edition_firmwareelitebook_x360_1030_g2elitedesk_800_g4elitebook_865_g9_firmwarepro_x2_612_g2elite_tower_600_g9elitebook_830_g8_firmwarez240_small_form_factor_firmwareprodesk_480_g5_firmwareeliteone_1000_g2_firmwarepro_tower_400_g9elitebook_845_g9zbook_firefly_14_g7mp9_g4_retail_systemeliteone_800_g5probook_445_g8elitebook_855_g7_firmwareprobook_470_g5_firmwareelitebook_x360_830_g8elitebook_860_g9_firmwareelitedesk_800_g8_firmwareprobook_455_g7elite_tower_800_g9_firmwareelitebook_x360_830_g6probook_635_aero_g8_firmwareelitebook_835_g9_firmwarepro_sff_400_g9probook_445_g6_firmwareprobook_445_g9elitebook_645_g9_firmwareproone_440_g5_firmwarezbook_studio_g7elitebook_835_g8_firmwareelitedesk_800_g6proone_480_g3_firmwareelitebook_846_g5_healthcare_editionzbook_fury_15_g7_firmwarezbook_power_g8_firmwareproone_600_g3_firmwarezbook_14u_g5_firmwareprobook_640_g8_firmwaremt45_firmwareproone_440_g6z1_g9_towerz2_mini_g3_firmwareelitedesk_880_g3elite_mini_600_g9elitebook_845_g7_firmwarezhan_66_pro_a_14_g5elitebook_1040_g4probook_x360_11_g3_eeelitebook_735_g5elitebook_1040_g9_firmwareelitebook_735_g5_firmwareelitebook_846_g5_firmwarez1_entry_tower_g5_firmwareeliteone_1000_g2z2_mini_g5zbook_fury_17_g7elite_mini_800_g9elitedesk_880_g5_firmwareprodesk_480_g7_pci_firmwareprobook_fortis_g10elitebook_835_g7elite_x2_g8_zbook_fury_g8_firmwarezbook_14u_g6proone_600_g3elitebook_755_g5zbook_15u_g6_firmwarezbook_15_g4eliteone_800_g8_firmwaremt44_firmwareprobook_440_g8prodesk_480_g5mini_conferencing_firmwareelitebook_735_g6z2_mini_g4_firmwareprobook_455_g9probook_640_g5_firmwareprobook_440_g6probook_450_g6z1_g8_towerprodesk_680_g3probook_630_g8probook_650_g8probook_650_g4_firmwareprobook_450_g9zhan_x_13_g2zbook_studio_g5z2_mini_g4elitebook_860_g9eliteone_870_g9prodesk_405_g6_firmwareprobook_430_g8prodesk_405_g8_firmwareelitebook_x360_1040_g7elitebook_830_g9elite_x2_g4zbook_15_g5probook_455_g8elitebook_830_g8elitebook_840_g9_firmwarezhan_66_pro_a_14_g4elite_x2_g8__firmwareelitebook_x360_830_g8_firmwarezhan_66_pro_a_14_g3_firmwareprobook_445_g8_firmwarezhan_66_pro_14_g4elite_dragonfly_g3z2_small_form_factor_g4eliteone_800_g5_firmwareprobook_455_g5_firmwareengage_one_pro_aio_systemz240_small_form_factorproone_600_g4_firmwareelitebook_830_g7elitebook_640_g9mt31probook_455_g6_firmwareprobook_450_g4mt32_firmwareprobook_440_g6_firmwareelitebook_850_g4elitebook_x360_830_g6_firmwareelitebook_830_g6_firmwareelite_tower_680_g9zhan_66_pro_g1_firmwareelite_x2_g4_firmwarezhan_66_pro_13_g2_firmwareelitebook_x360_830_g7_firmwareengage_go_10_mobile_system_firmwareelite_dragonfly_g3_firmwareelite_dragonfly_g2_firmwareprobook_x360_11_g7_eemt43_firmwareelitebook_x360_1030_g3_firmwareelite_x360_1040_g9_firmwareelite_mini_800_g9_firmwareelitebook_645_g9proone_400_g4elitebook_840_g6_healthcare_editionelite_sff_600_g9prodesk_600_g4zhan_66_pro_15_g2_firmwarezhan_66_pro_14_g4_firmwarezbook_firefly_15_g7mt31_firmwarez2_tower_g4_firmwarezbook_studio_g4eliteone_800_g8z1_entry_tower_g5z238_microtower_firmwareeliteone_800_g5_healthcare_editionzbook_power_g9_firmwaremt43probook_440_g4_firmwareelitebook_845_g8_firmwareprobook_640_g8elitebook_830_g9_firmwarezhan_66_pro_g1rp9_g1_retail_system_firmwareelitebook_840_g7elitebook_1050_g1elitebook_850_g5prodesk_400_g7zbook_power_g7proone_600_g4elite_x360_830_g9eliteone_800_g4_healthcare_editionelite_mini_600_g9_firmwarez238_microtowerelitedesk_880_g6_firmwareelitebook_630_g9elitedesk_705_g4elitebook_x360_1040_g6_firmwarezbook_firefly_g9_firmwareelitebook_x360_1030_g4_firmwareprobook_x360_11_g3_ee_firmwarezhan_66_pro_14_g3_firmwareproone_400_g3probook_430_g4_firmwarezhan_66_pro_a_14_g3zbook_power_g8probook_440_g8_firmwareelitebook_x360_1020_g2_firmwarezbook_15_g6_firmwareelite_sff_800_g9zbook_fury_16_g9zbook_create_g7_firmwareproone_440_g6_firmwareprobook_fortis_g10_firmwareelitebook_840_g5elitebook_850_g4_firmwareprobook_440_g5mt21_firmwareproone_440_g9_firmwarezhan_66_pro_a_14_g4_firmwarezhan_66_pro_g3elitebook_1050_g1_firmwareelitebook_755_g5_firmwareprobook_640_g4probook_455_g9_firmwareprobook_445r_g6_firmwarezhan_66_pro_g3_firmwareproone_400_g5_firmwareprobook_455_g4_firmwarez2_tower_g5z2_tower_g8_firmwaremt46elitedesk_800_g3_firmwareprodesk_600_g6_firmwareproone_600_g6zhan_66_pro_13_g2elite_dragonflyzbook_firefly_g8probook_440_g5_firmwarez2_small_form_factor_g5_firmwareelite_dragonfly_maxzbook_14u_g6_firmwareprobook_445r_g6zbook_15_g6z1_entry_tower_g6elitebook_835_g7_firmwareelitebook_745_g5_firmwareelitebook_850_g6_firmwareelitebook_820_g4z2_tower_g8eliteone_1000_g1eliteone_800_g3_firmwareprobook_430_g8_firmwareelitedesk_880_g4elitedesk_880_g5probook_fortis_g9_firmwareprobook_635_aero_g7eliteone_800_g6_firmwareprobook_470_g5prodesk_400_g3z1_g9_tower_firmwareelitebook_840_g8probook_640_g4_firmwareelitebook_846_g5zbook_fury_g8zbook_studio_g4_firmwareelitebook_828_g4probook_455r_g6_firmwareprodesk_405_g4proone_400_g3_firmwareengage_go_mobile_systemelitebook_755_g4_firmwarezbook_17_g5_firmwareelitebook_830_g5elitedesk_880_g8_firmwareeliteone_800_g4_firmwareelitebook_640_g9_firmwareelitebook_x360_1040_g6proone_600_g6_firmwareelitebook_840_g6_firmwarezhan_66_pro_15_g2prodesk_680_g4_firmwareprodesk_600_g5_firmwareelitebook_735_g6_firmwarez240_tower_firmwareprodesk_480_g7_pcizbook_firefly_14_g7_firmwareelitebook_745_g5mini_conferencingprobook_440_g9probook_x360_11_g2_ee_firmwarepro_x360_fortis_g9_firmwareelitebook_855_g8elitebook_745_g6_firmwareprobook_470_g4_firmwareelite_sff_800_g9_firmwareeliteone_800_g3elitebook_836_g6_firmwareelitebook_x360_1030_g7probook_x360_11_g5_eeeliteone_870_g9_firmwareprobook_440_g9_firmwareelitebook_x360_1040_g7_firmwareprobook_x360_440_g1z1_entry_tower_g6_firmwarez2_small_form_factor_g8elite_tower_800_g9elitebook_x360_1040_g5elitebook_850_g8elitebook_835_g9elite_sff_600_g9_firmwarerp9_g1_retail_systemelitebook_x360_1030_g4zbook_15_g4_firmwareprobook_x360_440_g1_firmwareprodesk_405_g6elitebook_846r_g4_firmwarezbook_15_g5_firmwareproone_440_g5elitebook_840_g5_healthcare_edition_firmwareprobook_455_g8_firmwareprobook_x360_435_g8elitebook_840_g4_firmwareelitedesk_705_g4_firmwareproone_400_g5elitebook_840_g6_healthcare_edition_firmwareprodesk_680_g6_pci_firmwareprobook_655_g3probook_640_g7_firmwareprodesk_600_g4_firmwareelitebook_840_g6engage_flex_mini_retail_system_firmwareprobook_455_g6elitebook_850_g8_firmwareprobook_x360_11_g4_eeprodesk_400_g6_firmwarezbook_studio_g9_firmwareelitedesk_800_g5prodesk_405_g4_firmwaremt44probook_640_g3_firmwareprobook_450_g8pro_x2_612_g2_firmwareelitebook_745_g4_firmwarezbook_studio_g8_firmwareelitebook_840_aero_g8_firmwareelite_x2_1012_g2probook_450_g9_firmwareprobook_445_g9_firmwareelitebook_840_g9zbook_studio_x360_g5zbook_15u_g6zbook_studio_x360_g5_firmwareengage_go_10_mobile_systemzbook_x2_g4_firmwaremt21probook_650_g3pro_x360_fortis_g10_firmwareelite_dragonfly_max_firmwareprobook_x360_435_g8_firmwarezbook_studio_g7_firmwarezbook_firefly_15_g7_firmwareelitedesk_705_g5eliteone_800_g5_healthcare_edition_firmwareelite_x360_1040_g9engage_one_pro_aio_system_firmwarezbook_15u_g5elitedesk_805_g6_firmwareelitebook_840_g5_healthcare_editionelitebook_855_g8_firmwareelite_x2_1013_g3_firmwareprobook_x360_435_g7z2_small_form_factor_g4_firmwareelitebook_828_g4_firmwareelitebook_830_g7_firmwarepro_x360_fortis_g9z2_mini_g9elitebook_850_g6probook_450_g7engage_go_mobile_system_firmwareengage_one_all-in-one_system_firmwareelitebook_848_g4_firmwarezhan_66_pro_a_14_g5_firmwareelitedesk_800_g6_firmwareprobook_450_g7_firmwareelitebook_745_g4pro_mini_400_g9elitebook_725_g4_firmwareelite_tower_680_g9_firmwareprobook_650_g4zbook_fury_16_g9_firmwareprobook_650_g5zbook_create_g7prodesk_400_g3_firmwarezhan_66_pro_14_g2_firmwareeliteone_1000_g1_firmwareproone_440_g4_firmwareelitebook_745_g6elitebook_650_g9_firmwareprobook_430_g6engage_flex_pro_retail_system_firmwareelitebook_1040_g9elitebook_x360_1030_g3proone_600_g5_firmwarezhan_66_pro_g5_firmwarez1_all-in-one_g3_firmwareelitedesk_800_g5_firmwareprodesk_600_g6zhan_x_13_g2_firmwarepro_mini_400_g9_firmwareprobook_455r_g6elitedesk_705_g5_firmwareprobook_430_g7elitebook_650_g9prodesk_600_g3_firmwareprobook_450_g8_firmwarepro_sff_400_g9_firmwareelitebook_836_g5probook_650_g3_firmwareelitebook_855_g7probook_x360_11_g7_ee_firmwareprodesk_400_g7_firmwaremt46_firmwareprobook_650_g7probook_455_g7_firmwareelitebook_x360_1030_g2_firmwareproone_400_g6probook_x360_11_g2_eeelite_dragonfly_firmwareprobook_450_g4_firmwareelitebook_840_g8_firmwarepro_tower_480_g9_firmwareelitebook_850_g7mt22z2_tower_g5_firmwareelitebook_x360_1040_g5_firmwareproone_600_g5probook_430_g5probook_430_g7_firmwarezbook_power_g7_firmwareprobook_x360_11_g5_ee_firmwareelite_slice_g2elitebook_845_g7elitebook_850_g7_firmwareprodesk_400_g5elitebook_655_g9elitebook_1040_g4_firmwareelitedesk_880_g3_firmwareprobook_450_g5_firmwareelitebook_840_aero_g8zbook_firefly_g8_firmwareprobook_645_g3zbook_14u_g5elitebook_x360_1030_g8_firmwaremp9_g4_retail_system_firmwareelitebook_840r_g4probook_645_g4z1_g8_tower_firmwarez2_small_form_factor_g9engage_flex_mini_retail_systemzbook_studio_g8elitebook_845_g9_firmwareprobook_655_g3_firmwareprodesk_680_g4probook_635_aero_g8probook_440_g7_firmwareprodesk_680_g6_pcimt45zbook_15u_g5_firmwareelitebook_655_g9_firmwareengage_flex_pro_retail_systemelitedesk_805_g8_firmwarezbook_x2_g4z1_all-in-one_g3probook_645_g3_firmwareelitebook_830_g5_firmwareprobook_635_aero_g7_firmwareelitebook_840r_g4_firmwarezhan_66_pro_g5prodesk_480_g6_firmwareprodesk_405_g8pro_mt440_g3probook_fortis_g9HP PC BIOS
CWE ID-CWE-367
Time-of-check Time-of-use (TOCTOU) Race Condition
CVE-2022-31466
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-7.9||HIGH
EPSS-0.04% / 8.71%
||
7 Day CHG~0.00%
Published-23 May, 2022 | 18:19
Updated-03 Aug, 2024 | 07:19
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
TOCTOU Vulnerability in Quick Heal Total Security

Time of Check - Time of Use (TOCTOU) vulnerability in Quick Heal Total Security prior to 12.1.1.27 allows a local attacker to achieve privilege escalation, potentially leading to deletion of system files. This is achieved through exploiting the time between detecting a file as malicious and when the action of quarantining or cleaning is performed, and using the time to replace the malicious file by a symlink.

Action-Not Available
Vendor-quickhealn/a
Product-total_securityn/a
CWE ID-CWE-59
Improper Link Resolution Before File Access ('Link Following')
CWE ID-CWE-367
Time-of-check Time-of-use (TOCTOU) Race Condition
CVE-2019-14119
Matching Score-4
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-4
Assigner-Qualcomm, Inc.
CVSS Score-7||HIGH
EPSS-0.03% / 6.81%
||
7 Day CHG~0.00%
Published-08 Sep, 2020 | 09:31
Updated-05 Aug, 2024 | 00:12
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

u'While processing SMCInvoke asynchronous message header, message count is modified leading to a TOCTOU race condition and lead to memory corruption' in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wired Infrastructure and Networking in IPQ6018, Kamorta, MDM9205, MDM9607, Nicobar, QCS404, QCS405, QCS605, QCS610, Rennell, SA415M, SA515M, SA6155P, SC7180, SC8180X, SDM670, SDM710, SDX24, SDX55, SM6150, SM7150, SM8150, SM8250, SXR1130, SXR2130

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-kamorta_firmwaresa6155p_firmwareqcs610sa515m_firmwaresdx24qcs404_firmwaremdm9607_firmwaresm8250_firmwaresc8180x_firmwaresa415m_firmwareqcs405sm7150_firmwaresdm710sc7180_firmwaremdm9607sm6150sdm710_firmwaresm7150sa6155psdm670qcs610_firmwaresxr2130qcs605_firmwaresc8180xipq6018sdm670_firmwareqcs404sdx24_firmwaresm8150_firmwaresxr2130_firmwareqcs405_firmwarerennellsa415msc7180mdm9205_firmwarerennell_firmwareipq6018_firmwaremdm9205sa515mqcs605sdx55sm6150_firmwaresm8250sm8150sxr1130_firmwarekamortasdx55_firmwarenicobar_firmwaresxr1130nicobarSnapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wired Infrastructure and Networking
CWE ID-CWE-787
Out-of-bounds Write
CWE ID-CWE-367
Time-of-check Time-of-use (TOCTOU) Race Condition
CVE-2022-31641
Matching Score-4
Assigner-HP Inc.
ShareView Details
Matching Score-4
Assigner-HP Inc.
CVSS Score-7||HIGH
EPSS-0.10% / 28.99%
||
7 Day CHG~0.00%
Published-14 Jun, 2023 | 16:31
Updated-30 Dec, 2024 | 16:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Potential vulnerabilities have been identified in the system BIOS of certain HP PC products, which might allow arbitrary code execution, escalation of privilege, denial of service, and information disclosure.

Action-Not Available
Vendor-HP Inc.
Product-probook_640_g3zbook_studio_g5_firmwareelitedesk_800_g3elitebook_725_g4elitebook_845_g8eliteone_800_g3_healthcare_edition_firmwarezbook_17_g4_firmwareprobook_640_g7z2_tower_g4engage_flex_pro-c_retail_systemzhan_66_pro_14_g2probook_630_g8_firmwareelitebook_x360_830_g5_firmwareelitebook_x360_830_g5elitedesk_805_g6prodesk_400_g5_firmwarez240_towerelite_x2_1013_g3pro_x360_fortis_g10engage_flex_pro-c_retail_system_firmwareprodesk_480_g6elitedesk_800_g4_firmwareproone_440_g9eliteone_800_g3_healthcare_editionprodesk_400_g4probook_445_g6z2_tower_g9pro_tower_400_g9_firmwareelitebook_840_g7_firmwareprobook_445_g7zbook_17_g6eliteone_840_g9_firmwareprobook_650_g8_firmwareeliteone_800_g4zbook_studio_g9elitebook_630_g9_firmwarezbook_fury_17_g7_firmwareprobook_645_g4_firmwarezhan_66_pro_14_g3elitebook_836_g6probook_440_g4zbook_17_g6_firmwareproone_400_g4_firmwarez2_mini_g3elitebook_850_g5_firmwareprodesk_600_g3elitebook_x360_1020_g2elite_tower_600_g9_firmwareelite_slice_g2_firmwareelitebook_x360_1030_g7_firmwarezbook_17_g4elite_tower_880_g9_firmwarezbook_fury_15_g7mt32elitebook_840_g4elitedesk_880_g8zhan_66_pro_15_g3zbook_power_g9mt22_firmwarez2_mini_g5_firmwareelite_x360_830_g9_firmwareelitebook_x360_1040_g8_firmwareproone_480_g3elitedesk_880_g4_firmwareelitedesk_880_g6elitebook_865_g9elitebook_846_g5_healthcare_edition_firmwareelitebook_848_g4probook_455_g4probook_x360_11_g6_eeelitebook_820_g4_firmwareelitebook_840_g5_firmwarepro_tower_480_g9z2_small_form_factor_g8_firmwareproone_440_g4eliteone_800_g6elitebook_835_g8z2_small_form_factor_g9_firmwareprodesk_480_g4prodesk_400_g6elitebook_x360_1030_g8probook_640_g5eliteone_840_g9elitedesk_800_g8elitebook_755_g4elitedesk_805_g8prodesk_600_g5probook_x360_11_g4_ee_firmwareprodesk_400_g4_firmwarez2_small_form_factor_g5zbook_firefly_g9elitebook_830_g6elite_dragonfly_g2z2_mini_g9_firmwareprobook_430_g6_firmwareprobook_650_g5_firmwarepro_mt440_g3_firmwareprobook_x360_435_g7_firmwareprobook_x360_11_g6_ee_firmwareelite_x2_1012_g2_firmwarez2_tower_g9_firmwareproone_400_g6_firmwareelitebook_x360_830_g7probook_445_g7_firmwareelitebook_x360_1040_g8probook_450_g5probook_450_g6_firmwareprodesk_680_g3_firmwareprobook_455_g5probook_430_g5_firmwareelitebook_836_g5_firmwarezbook_17_g5probook_650_g7_firmwarezhan_66_pro_15_g3_firmwareprobook_440_g7elite_tower_880_g9prodesk_480_g4_firmwareengage_one_all-in-one_systemelitebook_846r_g4probook_430_g4probook_470_g4eliteone_800_g4_healthcare_edition_firmwareelitebook_x360_1030_g2elitedesk_800_g4elitebook_865_g9_firmwarepro_x2_612_g2elite_tower_600_g9elitebook_830_g8_firmwarez240_small_form_factor_firmwareprodesk_480_g5_firmwareeliteone_1000_g2_firmwarepro_tower_400_g9elitebook_845_g9zbook_firefly_14_g7mp9_g4_retail_systemeliteone_800_g5probook_445_g8elitebook_855_g7_firmwareprobook_470_g5_firmwareelitebook_x360_830_g8elitebook_860_g9_firmwareelitedesk_800_g8_firmwareprobook_455_g7elite_tower_800_g9_firmwareelitebook_x360_830_g6probook_635_aero_g8_firmwareelitebook_835_g9_firmwarepro_sff_400_g9probook_445_g6_firmwareprobook_445_g9elitebook_645_g9_firmwareproone_440_g5_firmwarezbook_studio_g7elitebook_835_g8_firmwareelitedesk_800_g6proone_480_g3_firmwareelitebook_846_g5_healthcare_editionzbook_fury_15_g7_firmwarezbook_power_g8_firmwareproone_600_g3_firmwarezbook_14u_g5_firmwareprobook_640_g8_firmwaremt45_firmwareproone_440_g6z1_g9_towerz2_mini_g3_firmwareelitedesk_880_g3elite_mini_600_g9elitebook_845_g7_firmwarezhan_66_pro_a_14_g5elitebook_1040_g4probook_x360_11_g3_eeelitebook_735_g5elitebook_1040_g9_firmwareelitebook_735_g5_firmwareelitebook_846_g5_firmwarez1_entry_tower_g5_firmwareeliteone_1000_g2z2_mini_g5zbook_fury_17_g7elite_mini_800_g9elitedesk_880_g5_firmwareprodesk_480_g7_pci_firmwareprobook_fortis_g10elitebook_835_g7elite_x2_g8_zbook_fury_g8_firmwarezbook_14u_g6proone_600_g3elitebook_755_g5zbook_15u_g6_firmwarezbook_15_g4eliteone_800_g8_firmwaremt44_firmwareprobook_440_g8prodesk_480_g5mini_conferencing_firmwareelitebook_735_g6z2_mini_g4_firmwareprobook_455_g9probook_640_g5_firmwareprobook_440_g6probook_450_g6z1_g8_towerprodesk_680_g3probook_630_g8probook_650_g8probook_650_g4_firmwareprobook_450_g9zhan_x_13_g2zbook_studio_g5z2_mini_g4elitebook_860_g9eliteone_870_g9prodesk_405_g6_firmwareprobook_430_g8prodesk_405_g8_firmwareelitebook_x360_1040_g7elitebook_830_g9elite_x2_g4zbook_15_g5probook_455_g8elitebook_830_g8elitebook_840_g9_firmwarezhan_66_pro_a_14_g4elite_x2_g8__firmwareelitebook_x360_830_g8_firmwarezhan_66_pro_a_14_g3_firmwareprobook_445_g8_firmwarezhan_66_pro_14_g4elite_dragonfly_g3z2_small_form_factor_g4eliteone_800_g5_firmwareprobook_455_g5_firmwareengage_one_pro_aio_systemz240_small_form_factorproone_600_g4_firmwareelitebook_830_g7elitebook_640_g9mt31probook_455_g6_firmwareprobook_450_g4mt32_firmwareprobook_440_g6_firmwareelitebook_850_g4elitebook_x360_830_g6_firmwareelitebook_830_g6_firmwareelite_tower_680_g9zhan_66_pro_g1_firmwareelite_x2_g4_firmwarezhan_66_pro_13_g2_firmwareelitebook_x360_830_g7_firmwareengage_go_10_mobile_system_firmwareelite_dragonfly_g3_firmwareelite_dragonfly_g2_firmwareprobook_x360_11_g7_eemt43_firmwareelitebook_x360_1030_g3_firmwareelite_x360_1040_g9_firmwareelite_mini_800_g9_firmwareelitebook_645_g9proone_400_g4elitebook_840_g6_healthcare_editionelite_sff_600_g9prodesk_600_g4zhan_66_pro_15_g2_firmwarezhan_66_pro_14_g4_firmwarezbook_firefly_15_g7mt31_firmwarez2_tower_g4_firmwarezbook_studio_g4eliteone_800_g8z1_entry_tower_g5z238_microtower_firmwareeliteone_800_g5_healthcare_editionzbook_power_g9_firmwaremt43probook_440_g4_firmwareelitebook_845_g8_firmwareprobook_640_g8elitebook_830_g9_firmwarezhan_66_pro_g1rp9_g1_retail_system_firmwareelitebook_840_g7elitebook_1050_g1elitebook_850_g5prodesk_400_g7zbook_power_g7proone_600_g4elite_x360_830_g9eliteone_800_g4_healthcare_editionelite_mini_600_g9_firmwarez238_microtowerelitedesk_880_g6_firmwareelitebook_630_g9elitedesk_705_g4elitebook_x360_1040_g6_firmwarezbook_firefly_g9_firmwareelitebook_x360_1030_g4_firmwareprobook_x360_11_g3_ee_firmwarezhan_66_pro_14_g3_firmwareproone_400_g3probook_430_g4_firmwarezhan_66_pro_a_14_g3zbook_power_g8probook_440_g8_firmwareelitebook_x360_1020_g2_firmwarezbook_15_g6_firmwareelite_sff_800_g9zbook_fury_16_g9zbook_create_g7_firmwareproone_440_g6_firmwareprobook_fortis_g10_firmwareelitebook_840_g5elitebook_850_g4_firmwareprobook_440_g5mt21_firmwareproone_440_g9_firmwarezhan_66_pro_a_14_g4_firmwarezhan_66_pro_g3elitebook_1050_g1_firmwareelitebook_755_g5_firmwareprobook_640_g4probook_455_g9_firmwareprobook_445r_g6_firmwarezhan_66_pro_g3_firmwareproone_400_g5_firmwareprobook_455_g4_firmwarez2_tower_g5z2_tower_g8_firmwaremt46elitedesk_800_g3_firmwareprodesk_600_g6_firmwareproone_600_g6zhan_66_pro_13_g2elite_dragonflyzbook_firefly_g8probook_440_g5_firmwarez2_small_form_factor_g5_firmwareelite_dragonfly_maxzbook_14u_g6_firmwareprobook_445r_g6zbook_15_g6z1_entry_tower_g6elitebook_835_g7_firmwareelitebook_745_g5_firmwareelitebook_850_g6_firmwareelitebook_820_g4z2_tower_g8eliteone_1000_g1eliteone_800_g3_firmwareprobook_430_g8_firmwareelitedesk_880_g4elitedesk_880_g5probook_fortis_g9_firmwareprobook_635_aero_g7eliteone_800_g6_firmwareprobook_470_g5prodesk_400_g3z1_g9_tower_firmwareelitebook_840_g8probook_640_g4_firmwareelitebook_846_g5zbook_fury_g8zbook_studio_g4_firmwareelitebook_828_g4probook_455r_g6_firmwareprodesk_405_g4proone_400_g3_firmwareengage_go_mobile_systemelitebook_755_g4_firmwarezbook_17_g5_firmwareelitebook_830_g5elitedesk_880_g8_firmwareeliteone_800_g4_firmwareelitebook_640_g9_firmwareelitebook_x360_1040_g6proone_600_g6_firmwareelitebook_840_g6_firmwarezhan_66_pro_15_g2prodesk_680_g4_firmwareprodesk_600_g5_firmwareelitebook_735_g6_firmwarez240_tower_firmwareprodesk_480_g7_pcizbook_firefly_14_g7_firmwareelitebook_745_g5mini_conferencingprobook_440_g9probook_x360_11_g2_ee_firmwarepro_x360_fortis_g9_firmwareelitebook_855_g8elitebook_745_g6_firmwareprobook_470_g4_firmwareelite_sff_800_g9_firmwareeliteone_800_g3elitebook_836_g6_firmwareelitebook_x360_1030_g7probook_x360_11_g5_eeeliteone_870_g9_firmwareprobook_440_g9_firmwareelitebook_x360_1040_g7_firmwareprobook_x360_440_g1z1_entry_tower_g6_firmwarez2_small_form_factor_g8elite_tower_800_g9elitebook_x360_1040_g5elitebook_850_g8elitebook_835_g9elite_sff_600_g9_firmwarerp9_g1_retail_systemelitebook_x360_1030_g4zbook_15_g4_firmwareprobook_x360_440_g1_firmwareprodesk_405_g6elitebook_846r_g4_firmwarezbook_15_g5_firmwareproone_440_g5elitebook_840_g5_healthcare_edition_firmwareprobook_455_g8_firmwareprobook_x360_435_g8elitebook_840_g4_firmwareelitedesk_705_g4_firmwareproone_400_g5elitebook_840_g6_healthcare_edition_firmwareprodesk_680_g6_pci_firmwareprobook_655_g3probook_640_g7_firmwareprodesk_600_g4_firmwareelitebook_840_g6engage_flex_mini_retail_system_firmwareprobook_455_g6elitebook_850_g8_firmwareprobook_x360_11_g4_eeprodesk_400_g6_firmwarezbook_studio_g9_firmwareelitedesk_800_g5prodesk_405_g4_firmwaremt44probook_640_g3_firmwareprobook_450_g8pro_x2_612_g2_firmwareelitebook_745_g4_firmwarezbook_studio_g8_firmwareelitebook_840_aero_g8_firmwareelite_x2_1012_g2probook_450_g9_firmwareprobook_445_g9_firmwareelitebook_840_g9zbook_studio_x360_g5zbook_15u_g6zbook_studio_x360_g5_firmwareengage_go_10_mobile_systemzbook_x2_g4_firmwaremt21probook_650_g3pro_x360_fortis_g10_firmwareelite_dragonfly_max_firmwareprobook_x360_435_g8_firmwarezbook_studio_g7_firmwarezbook_firefly_15_g7_firmwareelitedesk_705_g5eliteone_800_g5_healthcare_edition_firmwareelite_x360_1040_g9engage_one_pro_aio_system_firmwarezbook_15u_g5elitedesk_805_g6_firmwareelitebook_840_g5_healthcare_editionelitebook_855_g8_firmwareelite_x2_1013_g3_firmwareprobook_x360_435_g7z2_small_form_factor_g4_firmwareelitebook_828_g4_firmwareelitebook_830_g7_firmwarepro_x360_fortis_g9z2_mini_g9elitebook_850_g6probook_450_g7engage_go_mobile_system_firmwareengage_one_all-in-one_system_firmwareelitebook_848_g4_firmwarezhan_66_pro_a_14_g5_firmwareelitedesk_800_g6_firmwareprobook_450_g7_firmwareelitebook_745_g4pro_mini_400_g9elitebook_725_g4_firmwareelite_tower_680_g9_firmwareprobook_650_g4zbook_fury_16_g9_firmwareprobook_650_g5zbook_create_g7prodesk_400_g3_firmwarezhan_66_pro_14_g2_firmwareeliteone_1000_g1_firmwareproone_440_g4_firmwareelitebook_745_g6elitebook_650_g9_firmwareprobook_430_g6engage_flex_pro_retail_system_firmwareelitebook_1040_g9elitebook_x360_1030_g3proone_600_g5_firmwarezhan_66_pro_g5_firmwarez1_all-in-one_g3_firmwareelitedesk_800_g5_firmwareprodesk_600_g6zhan_x_13_g2_firmwarepro_mini_400_g9_firmwareprobook_455r_g6elitedesk_705_g5_firmwareprobook_430_g7elitebook_650_g9prodesk_600_g3_firmwareprobook_450_g8_firmwarepro_sff_400_g9_firmwareelitebook_836_g5probook_650_g3_firmwareelitebook_855_g7probook_x360_11_g7_ee_firmwareprodesk_400_g7_firmwaremt46_firmwareprobook_650_g7probook_455_g7_firmwareelitebook_x360_1030_g2_firmwareproone_400_g6probook_x360_11_g2_eeelite_dragonfly_firmwareprobook_450_g4_firmwareelitebook_840_g8_firmwarepro_tower_480_g9_firmwareelitebook_850_g7mt22z2_tower_g5_firmwareelitebook_x360_1040_g5_firmwareproone_600_g5probook_430_g5probook_430_g7_firmwarezbook_power_g7_firmwareprobook_x360_11_g5_ee_firmwareelite_slice_g2elitebook_845_g7elitebook_850_g7_firmwareprodesk_400_g5elitebook_655_g9elitebook_1040_g4_firmwareelitedesk_880_g3_firmwareprobook_450_g5_firmwareelitebook_840_aero_g8zbook_firefly_g8_firmwareprobook_645_g3zbook_14u_g5elitebook_x360_1030_g8_firmwaremp9_g4_retail_system_firmwareelitebook_840r_g4probook_645_g4z1_g8_tower_firmwarez2_small_form_factor_g9engage_flex_mini_retail_systemzbook_studio_g8elitebook_845_g9_firmwareprobook_655_g3_firmwareprodesk_680_g4probook_635_aero_g8probook_440_g7_firmwareprodesk_680_g6_pcimt45zbook_15u_g5_firmwareelitebook_655_g9_firmwareengage_flex_pro_retail_systemelitedesk_805_g8_firmwarezbook_x2_g4z1_all-in-one_g3probook_645_g3_firmwareelitebook_830_g5_firmwareprobook_635_aero_g7_firmwareelitebook_840r_g4_firmwarezhan_66_pro_g5prodesk_480_g6_firmwareprodesk_405_g8pro_mt440_g3probook_fortis_g9HP PC BIOS
CWE ID-CWE-367
Time-of-check Time-of-use (TOCTOU) Race Condition
CVE-2022-27538
Matching Score-4
Assigner-HP Inc.
ShareView Details
Matching Score-4
Assigner-HP Inc.
CVSS Score-7||HIGH
EPSS-0.11% / 29.30%
||
7 Day CHG~0.00%
Published-30 Jan, 2023 | 20:41
Updated-27 Mar, 2025 | 19:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A potential Time-of-Check to Time-of-Use (TOCTOU) vulnerability has been identified in the BIOS for certain HP PC products which may allow arbitrary code execution, denial of service, and information disclosure. HP is releasing BIOS updates to mitigate the potential vulnerability.

Action-Not Available
Vendor-HP Inc.
Product-z2_small_form_factor_g9_firmwareproone_600_g4_21.5-inch_touch_all-in-one_business_pcelitebook_x360_1040_g7_firmwareelitebook_845_g8_firmwareprodesk_600_g5_small_form_factor_pczhan_66_pro_15_g2_firmwareeliteone_1000_g1_23.8-in_touch_all-in-one_business_pcprobook_430_g7elitebook_865_g9elitedesk_800_35w_g4_desktop_mini_pc_firmwareelitebook_x360_1030_g7_firmwareelitebook_735_g6_firmwareelitebook_x360_1030_g4_firmwareelitebook_840_g9_firmwarezhan_66_pro_13_g2probook_430_g8probook_440_g8elitebook_755_g5_firmwareprobook_x360_11_g4_education_edition_firmwarezbook_17_g6zbook_firefly_15_g7engage_flex_pro_retail_systemelitedesk_880_g8_tower_pcelite_sliceprodesk_405_g6_small_form_factorz2_small_form_factor_g5elitedesk_805_g6_small_form_factor_pc_firmwareelitedesk_705_g4_desktop_mini_pc_firmwareprobook_445r_g6_firmwareprodesk_400_g6_small_form_factor_pcelitedesk_800_g6_tower_pcelitebook_630_g9_firmwareprodesk_600_g5_desktop_mini_pcpro_mt440_g3elitedesk_800_g4_tower_pcprodesk_405_g8_small_form_factor_pc_firmwareelitebook_735_g5zbook_studio_16_g9z2_mini_g5_firmwareprobook_640_g4_firmwarezbook_studio_g7_firmwareprodesk_600_g3_desktop_mini_pc_firmwarez240_tower_firmwarezbook_power_g9zbook_power_g8eliteone_800_g3_23.8_non-touch_healthcare_edition_all-in-one_business_pc_firmwarepro_mini_400_g9elitebook_835_g7_firmwaremt46pro_mini_400_g9_firmwareproone_440_23.8_inch_g9_all-in-one_firmwarezbook_studio_x360_g5_firmwareeliteone_1000_g1_34-in_curved_all-in-one_business_pc_firmwareelitebook_830_g8_firmwareprobook_450_g8_firmwareprobook_650_g7elitebook_835_g9_firmwareprodesk_400_g3_desktop_mini_pc_firmwarez1_entry_tower_g5_workstation_firmwareprodesk_600_g5_microtower_pc\(with_pci_slot\)z2_mini_g3pro_x360_fortis_g10z2_tower_g4_firmwareeliteone_1000_g2_27-in_4k_uhd_all-in-one_business_pc_firmwareelitedesk_705_g4_desktop_mini_pcprobook_x360_11_g7_education_editionelite_tower_880_g9_firmwareengage_flex_pro_retail_system_firmwareprodesk_400_g3_desktop_mini_pcengage_flex_pro-c_retail_system_firmwareproone_440_g5_23.8-in_all-in-one_business_pc_firmwareelitedesk_800_g4_small_form_factor_pceliteone_800_g5_23.8-in_healthcare_edition_all-in-oneprobook_x360_11_g6_education_edition_firmwareprodesk_480_g4_microtower_pcelite_dragonfly_g2engage_one_pro_aio_system_firmwarezbook_14u_g5prodesk_480_g7_pci_microtower_pcelite_tower_680_g9probook_430_g7_firmwareelitebook_845_g9probook_455_g6_firmwareprobook_x360_11_g5_education_edition_firmwareprobook_445_g8prodesk_480_g6_microtower_pc_firmwareprobook_445_g8_firmwareeliteone_800_g3_23.8_non-touch_healthcare_edition_all-in-one_business_pcelitedesk_805_g6_desktop_mini_pc_firmwarez2_tower_g5_firmwareeliteone_800_g3_23.8-inch_non-touch_gpu_all-in-one_pcelitedesk_800_g5_tower_pcprodesk_400_g4_desktop_mini_pc_firmwareelitedesk_705_g5_small_form_factor_pc_firmwareprobook_fortis_g9_firmwareprodesk_600_g6_small_form_factor_pc_firmwareelitebook_845_g7elitebook_645_g9elitedesk_805_g6_small_form_factor_pczhan_66_pro_a_14_g3_firmwarepro_tower_400_g9_firmwareprodesk_405_g6_desktop_minielitebook_x360_1040_g6elitedesk_800_g6_desktop_mini_pc_firmwareprobook_455r_g6z240_small_form_factorelite_dragonflyzhan_x_13_g2zhan_66_pro_14_g3eliteone_800_g6_24_all-in-one_pcpro_sff_400_g9_firmwarezbook_15u_g6probook_630_g8z2_tower_g9elitebook_830_g9eliteone_800_g4_23.8-inch_touch_gpu_all-in-one_pczbook_firefly_g9elitebook_840_g8_firmwareengage_one_all-in-one_systemprobook_630_g8_firmwareengage_one_pro_aio_systemeliteone_800_g3_23.8-inch_touch_all-in-one_pceliteone_800_g8_24_all-in-one_pc_firmwareelitebook_655_g9_firmwareprobook_455r_g6_firmwareprodesk_600_g4_small_form_factor_pcengage_go_mobile_systemelitebook_650_g9_firmwareprobook_640_g8_firmwareprodesk_400_g6_microtower_pcelitedesk_800_g3_small_form_factor_pcz1_g8_towerzhan_99_pro_23.8_inch_g9_all-in-one_firmwareprobook_455_g8probook_430_g5_firmwarez1_entry_tower_g6_workstationzhan_66_pro_a_14_g5elite_x2_g4prodesk_400_g5_small_form_factor_pc_firmwareprodesk_480_g4_microtower_pc_firmwaremt45z240_small_form_factor_firmwareprobook_440_g9_firmwareelite_slice_firmwareelitedesk_805_g6_desktop_mini_pczbook_power_g7_firmwarezhan_66_pro_15_g3elitebook_745_g5z2_tower_g5proone_400_g3_20-inch_non-touch_all-in-one_pcz2_small_form_factor_g4_firmwareprodesk_600_g4_small_form_factor_pc_firmwareprodesk_400_g7_microtower_pc_firmwareprobook_x360_11_g5_education_editionmt46_firmwareelite_sff_600_g9_firmwareprodesk_405_g8_desktop_mini_pcz1_all-in-one_g3_firmwaremt22zbook_firefly_g8zhan_66_pro_g5_firmwareelitebook_840_aero_g8pro_sff_400_g9pro_mt440_g3_firmwareelitebook_x360_1040_g5_firmwareprodesk_680_g6_pci_microtower_pc_firmwareeliteone_800_g4_23.8-inch_non-touch_gpu_all-in-one_pcelitebook_x360_1040_g6_firmwareproone_400_g4_20-inch_non-touch_all-in-one_business_pc_firmwareelitedesk_705_g5_desktop_mini_pcelitedesk_805_g8_small_form_factor_pczhan_66_pro_14_g4_firmwarezhan_66_pro_g1zbook_fury_15_g7_firmwareprodesk_600_g5_microtower_pc\(with_pci_slot\)_firmwaremt31_mobile_thin_client_firmwareprodesk_600_g3_small_form_factor_pc_firmwareprobook_fortis_g10elitebook_840_g6zbook_15_g5z238_microtower_firmwareprodesk_680_g3_microtower_pczbook_studio_16_g9_firmwareelitedesk_800_35w_g4_desktop_mini_pcelitedesk_800_g5_desktop_mini_pcelitebook_x360_1040_g7z238_microtowerprodesk_400_g4_desktop_mini_pcprodesk_600_g6_small_form_factor_pcproone_440_g4_23.8-inch_non-touch_all-in-one_business_pc_firmwareelitebook_x360_830_g8prodesk_405_g6_small_form_factor_firmwarezhan_66_pro_g3_24_all-in-one_pc_firmwareprodesk_600_g6_microtower_pceliteone_800_g4_23.8-inch_touch_all-in-one_pc_firmwareelitebook_630_g9zhan_66_pro_g5elitebook_840_g6_firmwarez2_tower_g4elite_mini_800_g9mt45_firmwareprobook_455_g5_firmwareelitebook_845_g7_firmwareprodesk_400_g5_desktop_mini_pcprodesk_600_g4_microtower_pc_firmwarezhan_66_pro_g1_firmwareelitebook_1050_g1elite_tower_600_g9prodesk_600_g3_microtower_pc_firmwareelitebook_x360_830_g6_firmwarezbook_create_g7elitebook_855_g8_firmwareproone_440_g4_23.8-inch_non-touch_all-in-one_business_pcproone_600_g6_22_all-in-one_pceliteone_1000_g1_23.8-in_all-in-one_business_pceliteone_870_27_inch_g9_all-in-oneelitebook_840_g5_healthcare_editionprodesk_480_g5_microtower_pcelitebook_845_g8elitebook_655_g9elitedesk_800_g6_small_form_factor_pc_firmwarezhan_99_pro_23.8_inch_g9_all-in-oneelitedesk_800_g3_tower_pc_firmwareprobook_x360_435_g8_firmwarezbook_14u_g6_firmwareelitebook_830_g9_firmwareelite_tower_680_g9_firmwareprobook_645_g4probook_x360_11_g3_education_editionprobook_x360_440_g1_firmwareelitebook_x360_1030_g3elitedesk_800_g4_tower_pc_firmwarezbook_fury_g8_firmwareprodesk_400_g5_small_form_factor_pceliteone_800_g3_23.8-inch_non-touch_all-in-one_pc_firmwaremt44probook_450_g7prodesk_600_g6_pci_microtower_pcz2_small_form_factor_g8_firmwareelitedesk_880_g3_tower_pc_firmwareproone_600_g5_21.5-in_all-in-one_business_pcz2_mini_g4elitebook_755_g5probook_445r_g6probook_x360_435_g8zbook_fury_g8probook_650_g8_firmwarez1_g8_tower_firmwareelitebook_x360_1030_g4proone_600_g3_21.5-inch_non-touch_all-in-one_pc_firmwareelitedesk_800_g6_desktop_mini_pceliteone_800_g8_27_all-in-one_pc_firmwaremt22_firmwarezhan_66_pro_15_g2elitebook_745_g5_firmwareproone_440_g5_23.8-in_all-in-one_business_pczhan_66_pro_g3_24_all-in-one_pcz2_small_form_factor_g8elite_dragonfly_maxmt32_firmwareelitedesk_800_35w_g3_desktop_mini_pc_firmwareelitedesk_800_g6_tower_pc_firmwareelitebook_865_g9_firmwareprodesk_600_g6_microtower_pc_firmwareelitebook_650_g9zbook_15_g6elitedesk_880_g6_tower_pc_firmwarez2_tower_g8zhan_66_pro_a_14_g4_firmwareprodesk_600_g3_desktop_mini_pczbook_studio_g5elite_dragonfly_g3probook_650_g4mt44_firmwarepro_x360_fortis_g10_firmwareeliteone_800_g4_23.8-inch_touch_gpu_all-in-one_pc_firmwareprobook_640_g4elitebook_845_g9_firmwareprodesk_600_g5_small_form_factor_pc_firmwareelite_tower_800_g9probook_635_aero_g7_firmwareengage_go_10_mobile_systemelitedesk_800_g8_desktop_mini_pc_firmwareprobook_455_g6zbook_fury_17_g8engage_go_10_mobile_system_firmwareelitebook_840_g6_healthcare_edition_firmwareprobook_fortis_g10_firmwareprodesk_405_g4_desktop_mini_pcproone_400_g4_23.8-inch_non-touch_all-in-one_business_pcprodesk_405_g8_small_form_factor_pcprobook_640_g7probook_450_g5_firmwareelite_x2_g8_tabletzbook_fury_17_g7zbook_15u_g5elitedesk_805_g8_desktop_mini_pcelitedesk_800_65w_g3_desktop_mini_pceliteone_800_g3_23.8-inch_non-touch_gpu_all-in-one_pc_firmwareelitebook_830_g8engage_one_all-in-one_system_firmwareelite_x2_g4_firmwarezhan_66_pro_14_g3_firmwareeliteone_1000_g2_23.8-in_touch_all-in-one_business_pcproone_400_g6_24_all-in-one_pc_firmwareelite_sff_600_g9mt32elitebook_830_g5prodesk_480_g5_microtower_pc_firmwarez240_towerelitedesk_800_g8_small_form_factor_pc_firmwareelite_slice_g2zhan_66_pro_a_14_g5_firmwaremp9_g4_retail_systemelitedesk_880_g8_tower_pc_firmwareelitebook_840_g5_firmwarez2_small_form_factor_g5_firmwarezbook_14u_g6prodesk_400_g4_small_form_factor_pcprodesk_600_g4_desktop_mini_pc_firmwareeliteone_1000_g2_27-in_4k_uhd_all-in-one_business_pceliteone_800_g4_23.8-inch_non-touch_all-in-one_pc_firmwarezbook_power_g9_firmwareelitedesk_800_95w_g4_desktop_mini_pc_firmwareproone_600_g3_21.5-inch_non-touch_all-in-one_pcelite_sff_800_g9elitedesk_800_g8_small_form_factor_pcprobook_635_aero_g7eliteone_840_23.8_inch_g9_all-in-oneprodesk_400_g4_small_form_factor_pc_firmwareprodesk_680_g6_pci_microtower_pczhan_66_pro_15_g3_firmwarez1_entry_tower_g6_workstation_firmwareproone_600_g6_22_all-in-one_pc_firmwarezbook_studio_g8_firmwareelitebook_x360_830_g7elitebook_x360_1030_g3_firmwareelitebook_850_g8eliteone_800_g4_23.8-inch_non-touch_gpu_all-in-one_pc_firmwareelitebook_846_g5_firmwareprodesk_600_g3_microtower_pcprobook_635_aero_g8_firmwareelite_dragonfly_g2_firmwareproone_400_g5_23.8-inch_all-in-one_business_pcprobook_440_g5prodesk_600_g4_microtower_pcelitedesk_800_g8_desktop_mini_pcproone_400_g4_23.8-inch_non-touch_all-in-one_business_pc_firmwareproone_600_g4_21.5-inch_touch_all-in-one_business_pc_firmwareelite_tower_880_g9zbook_studio_g5_firmwarez2_mini_g9_firmwareelitedesk_880_g3_tower_pczbook_fury_15_g7prodesk_680_g3_microtower_pc_firmwareelitebook_840_aero_g8_firmwareprobook_640_g5_firmwareelite_slice_g2_firmwareelitebook_x360_1040_g8prodesk_400_g6_small_form_factor_pc_firmwareelitedesk_800_65w_g4_desktop_mini_pc_firmwareeliteone_800_g3_23.8-inch_touch_gpu_all-in-one_pc_firmwareproone_600_g5_21.5-in_all-in-one_business_pc_firmwareelitebook_735_g6eliteone_1000_g2_34-in_curved_all-in-one_business_pcprobook_450_g7_firmwareprobook_650_g4_firmwareprobook_640_g7_firmwarez2_mini_g4_firmwaremt31_mobile_thin_clientelitebook_830_g6_firmwarezbook_fury_16_g9_firmwareprobook_430_g6_firmwareproone_400_g5_20-inch_all-in-one_business_pc_firmwareprodesk_600_g5_microtower_pc_firmwareeliteone_1000_g1_27-in_4k_uhd_all-in-one_business_pc_firmwareelitedesk_880_g6_tower_pcelitebook_x360_1030_g8zbook_create_g7_firmwareeliteone_800_g6_27_all-in-one_pcprodesk_600_g6_desktop_mini_pczbook_17_g6_firmwareelitebook_840_g7probook_445_g6_firmwareprobook_445_g9_firmwarezbook_studio_g7elitebook_645_g9_firmwareelite_tower_800_g9_firmwarezhan_66_pro_14_g2prodesk_680_g4_microtower_pc\(with_pci_slot\)_firmwareprobook_440_g9z1_all-in-one_g3prodesk_400_g5_microtower_pczbook_fury_16_g9elite_x2_g8_tablet_firmwareprodesk_400_g5_microtower_pc_firmwareprodesk_405_g4_desktop_mini_pc_firmwareeliteone_800_g5_23.8-inch_all-in-one_firmwareprobook_x360_435_g7elitedesk_880_g4_tower_pcproone_440_23.8_inch_g9_all-in-oneelitedesk_800_g4_small_form_factor_pc_firmwarez2_mini_g3_firmwareelitebook_745_g6_firmwareprodesk_400_g6_desktop_mini_pc_firmwareproone_400_g3_20-inch_touch_all-in-one_pcengage_flex_pro-c_retail_systemprobook_470_g5elitebook_745_g6z2_tower_g8_firmwareelitedesk_880_g5_tower_pc_firmwareelitebook_830_g7elitedesk_705_g5_desktop_mini_pc_firmwareeliteone_840_23.8_inch_g9_all-in-one_firmwareelitebook_860_g9elite_dragonfly_max_firmwareelitebook_855_g7z1_entry_tower_g5_workstationelitedesk_705_g5_small_form_factor_pcprobook_645_g4_firmwareelitebook_835_g7elitebook_860_g9_firmwareelitebook_1040_g9prodesk_600_g4_desktop_mini_pcprodesk_600_g5_desktop_mini_pc_firmwareprodesk_680_g4_microtower_pc\(with_pci_slot\)probook_650_g5prodesk_600_g5_microtower_pcelitedesk_800_g8_tower_pcelitebook_840_g9proone_400_g4_20-inch_non-touch_all-in-one_business_pceliteone_800_g5_23.8-in_healthcare_edition_all-in-one_firmwarepro_tower_400_g9elite_x360_1040_g9_2-in-1_firmwareprobook_440_g7eliteone_1000_g1_27-in_4k_uhd_all-in-one_business_pcelite_mini_800_g9_firmwareelitebook_835_g9z2_tower_g9_firmwareelite_sff_800_g9_firmwareprobook_445_g6probook_640_g8probook_455_g9_firmwareelitebook_830_g5_firmwarezbook_firefly_15_g8_firmwaremp9_g4_retail_system_firmwareprobook_x360_11_g7_education_edition_firmwareprobook_650_g8elitebook_836_g6_firmwareelitedesk_805_g8_small_form_factor_pc_firmwareelitedesk_800_g5_small_form_factor_pc_firmwareproone_400_g5_23.8-inch_all-in-one_business_pc_firmwarezbook_firefly_g9_firmwareelitedesk_805_g8_desktop_mini_pc_firmwareprobook_635_aero_g8probook_445_g7_firmwareelitebook_850_g6_firmwarepro_x360_435_g9probook_455_g5elitebook_846_g5zbook_firefly_15_g7_firmwareprobook_440_g6zbook_studio_g8elitedesk_800_g3_tower_pczbook_studio_x360_g5elitebook_x360_830_g7_firmwareelitedesk_705_g4_small_form_factor_pc_firmwareproone_400_g6_20_all-in-one_pceliteone_800_g3_23.8-inch_touch_all-in-one_pc_firmwareprobook_450_g8zbook_17_g5eliteone_800_g4_23.8-in_healthcare_edition_all-in-one_business_pczbook_firefly_14_g7zhan_66_pro_a_14_g3probook_640_g5zbook_17_g5_firmwarez2_small_form_factor_g9elitebook_850_g5prodesk_600_g6_pci_microtower_pc_firmwareelitebook_840_g5eliteone_800_g4_23.8-in_healthcare_edition_all-in-one_business_pc_firmwareprobook_450_g9elitebook_835_g8_firmwarezbook_15u_g5_firmwareprobook_650_g7_firmwarezhan_66_pro_14_g4eliteone_1000_g1_23.8-in_all-in-one_business_pc_firmwareelitebook_850_g8_firmwareeliteone_800_g6_27_all-in-one_pc_firmwareelitebook_850_g7zbook_15_g6_firmwarezbook_fury_17_g8_firmwareprodesk_400_g7_small_form_factor_pc_firmwareelitebook_840_g5_healthcare_edition_firmwareprobook_x360_11_g3_education_edition_firmwarezbook_15u_g6_firmwareelitedesk_800_65w_g3_desktop_mini_pc_firmwareelitedesk_880_g5_tower_pczbook_firefly_15_g8elite_x2_1013_g3_firmwareprobook_450_g9_firmwareelitedesk_800_95w_g4_desktop_mini_pcproone_400_g5_20-inch_all-in-one_business_pcelitedesk_800_g3_small_form_factor_pc_firmwareelitebook_x360_1040_g5elitebook_x360_1040_g8_firmwareelitebook_x360_830_g5_firmwareprobook_445_g7proone_400_g6_24_all-in-one_pcelitebook_640_g9elitedesk_705_g4_microtower_pcdragonfly_folio_g3_2-in-1proone_480_g3_20-inch_non-touch_all-in_one_pcproone_400_g3_20-inch_non-touch_all-in-one_pc_firmwareelite_dragonfly_firmwareelitebook_x360_830_g8_firmwareprobook_445_g9probook_455_g9elite_dragonfly_g3_firmwarepro_x360_fortis_g9zhan_66_pro_14_g2_firmwareelitedesk_800_g8_tower_pc_firmwarezbook_15_g5_firmwareeliteone_800_g5_23.8-inch_all-in-onepro_x360_435_g9_firmwareprobook_450_g5elitebook_840r_g4_firmwareprobook_x360_435_g7_firmwareprobook_fortis_g9eliteone_800_g8_27_all-in-one_pcprobook_x360_11_g6_education_editioneliteone_800_g3_23.8-inch_touch_gpu_all-in-one_pcprodesk_600_g3_small_form_factor_pcelitedesk_880_g4_tower_pc_firmwareelitedesk_800_g5_desktop_mini_pc_firmwareelitebook_735_g5_firmwareelitebook_840r_g4elitebook_836_g5_firmwareeliteone_1000_g2_23.8-in_touch_all-in-one_business_pc_firmwareprodesk_405_g6_desktop_mini_firmwareeliteone_800_g3_23.8-inch_non-touch_all-in-one_pcelitebook_x360_1030_g7zhan_x_13_g2_firmwareeliteone_1000_g2_34-in_curved_all-in-one_business_pc_firmwareelite_x2_1013_g3eliteone_800_g8_24_all-in-one_pczhan_66_pro_a_14_g4prodesk_405_g8_desktop_mini_pc_firmwareelitedesk_800_65w_g4_desktop_mini_pcprobook_430_g6prodesk_400_g6_microtower_pc_firmwarezbook_firefly_g8_firmwareelitedesk_800_g6_small_form_factor_pcelitebook_850_g6eliteone_870_27_inch_g9_all-in-one_firmwareelitedesk_800_35w_g3_desktop_mini_pcprodesk_480_g6_microtower_pczbook_fury_17_g7_firmwareelitebook_1040_g9_firmwareelitebook_836_g6elitebook_x360_830_g5proone_440_g6_24_all-in-one_pc_firmwareelite_x360_1040_g9_2-in-1eliteone_1000_g1_34-in_curved_all-in-one_business_pcelitebook_836_g5prodesk_400_g5_desktop_mini_pc_firmwareproone_480_g3_20-inch_non-touch_all-in_one_pc_firmwareprobook_x360_440_g1proone_400_g3_20-inch_touch_all-in-one_pc_firmwareelitebook_835_g8elitebook_850_g5_firmwareprobook_440_g7_firmwarezbook_14u_g5_firmwarez2_mini_g9elitedesk_800_g5_tower_pc_firmwareelitebook_x360_830_g6probook_440_g5_firmwareelitebook_830_g6zbook_firefly_16_g9_firmwarezbook_firefly_16_g9probook_650_g5_firmwareprobook_450_g6z2_small_form_factor_g4elitebook_855_g7_firmwarezbook_power_g7elitedesk_705_g4_small_form_factor_pcprodesk_400_g6_desktop_mini_pcengage_go_mobile_system_firmwareprobook_440_g6_firmwareelite_tower_600_g9_firmwareeliteone_800_g4_23.8-inch_touch_all-in-one_pcelitebook_850_g7_firmwarezhan_66_pro_g3_22_all-in-one_pc_firmwarez2_mini_g5elitebook_x360_1030_g8_firmwareprobook_455_g7_firmwareelitebook_840_g8zbook_firefly_14_g7_firmwareprodesk_480_g7_pci_microtower_pc_firmwarezbook_power_g8_firmwareprobook_455_g8_firmwareprodesk_600_g6_desktop_mini_pc_firmwareproone_400_g6_20_all-in-one_pc_firmwareprodesk_400_g7_small_form_factor_pcelitebook_640_g9_firmwareelitebook_830_g7_firmwareprobook_470_g5_firmwareelitebook_840_g7_firmwarezhan_66_pro_g3_22_all-in-one_pcelitebook_855_g8eliteone_1000_g1_23.8-in_touch_all-in-one_business_pc_firmwareelite_mini_600_g9_firmwareelitedesk_705_g4_microtower_pc_firmwareelitedesk_800_g5_small_form_factor_pcproone_440_g6_24_all-in-one_pcdragonfly_folio_g3_2-in-1_firmwareeliteone_1000_g2_23.8-in_all-in-one_business_pceliteone_800_g4_23.8-inch_non-touch_all-in-one_pcprobook_440_g8_firmwareelitebook_840_g6_healthcare_editioneliteone_800_g6_24_all-in-one_pc_firmwareprodesk_400_g7_microtower_pcpro_x360_fortis_g9_firmwarezhan_66_pro_13_g2_firmwareprobook_450_g6_firmwareelitebook_1050_g1_firmwareeliteone_1000_g2_23.8-in_all-in-one_business_pc_firmwareprobook_430_g8_firmwareelite_mini_600_g9pro_tower_480_g9_firmwareprobook_x360_11_g4_education_editionprobook_430_g5probook_455_g7pro_tower_480_g9HP PC BIOS
CWE ID-CWE-367
Time-of-check Time-of-use (TOCTOU) Race Condition
CVE-2023-46649
Matching Score-4
Assigner-GitHub, Inc. (Products Only)
ShareView Details
Matching Score-4
Assigner-GitHub, Inc. (Products Only)
CVSS Score-6.3||MEDIUM
EPSS-0.15% / 35.77%
||
7 Day CHG~0.00%
Published-21 Dec, 2023 | 20:45
Updated-02 Aug, 2024 | 20:53
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Race Condition allows Administrative Access on Organization Repositories

A race condition in GitHub Enterprise Server was identified that could allow an attacker administrator access. To exploit this, an organization needs to be converted from a user. This vulnerability affected all versions of GitHub Enterprise Server since 3.7 and was fixed in version 3.7.19, 3.8.12, 3.9.7, 3.10.4, and 3.11.1. 

Action-Not Available
Vendor-GitHub, Inc.
Product-enterprise_serverEnterprise Server
CWE ID-CWE-367
Time-of-check Time-of-use (TOCTOU) Race Condition
CVE-2022-25165
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-7||HIGH
EPSS-1.64% / 81.17%
||
7 Day CHG~0.00%
Published-14 Apr, 2022 | 15:19
Updated-03 Aug, 2024 | 04:36
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An issue was discovered in Amazon AWS VPN Client 2.0.0. A TOCTOU race condition exists during the validation of VPN configuration files. This allows parameters outside of the AWS VPN Client allow list to be injected into the configuration file prior to the AWS VPN Client service (running as SYSTEM) processing the file. Dangerous arguments can be injected by a low-level user such as log, which allows an arbitrary destination to be specified for writing log files. This leads to an arbitrary file write as SYSTEM with partial control over the files content. This can be abused to cause an elevation of privilege or denial of service.

Action-Not Available
Vendor-amazonn/a
Product-aws_client_vpnn/a
CWE ID-CWE-367
Time-of-check Time-of-use (TOCTOU) Race Condition
CVE-2019-10486
Matching Score-4
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-4
Assigner-Qualcomm, Inc.
CVSS Score-7||HIGH
EPSS-0.03% / 7.75%
||
7 Day CHG~0.00%
Published-21 Nov, 2019 | 14:38
Updated-04 Aug, 2024 | 22:24
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Race condition due to the lack of resource lock which will be concurrently modified in the memcpy statement leads to out of bound access in Snapdragon Auto, Snapdragon Consumer Electronics Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon IoT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables in APQ8009, APQ8017, APQ8053, APQ8096AU, APQ8098, MDM9206, MDM9207C, MDM9607, MDM9640, MDM9650, MSM8905, MSM8909W, MSM8939, MSM8953, MSM8996AU, MSM8998, Nicobar, QCN7605, QCS405, QCS605, QM215, SDA660, SDA845, SDM429, SDM439, SDM630, SDM632, SDM636, SDM660, SDM710, SDM845, SDX20, SDX24, SM6150, SM7150, SM8150

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-mdm9640_firmwaresdm632_firmwaremsm8996au_firmwaresdm845sdm632sdx24sdm439mdm9650sdm429sm7150_firmwaresm6150msm8909w_firmwaremsm8996ausm7150apq8009_firmwareqcs605_firmwaremdm9206sdx24_firmwaresdm636sda845_firmwareapq8098qcn7605mdm9206_firmwaremsm8939qcs605mdm9640sdm429_firmwaremdm9650_firmwaremsm8905_firmwaresda660msm8909wapq8009apq8053_firmwaresda845nicobarmsm8953sdm636_firmwareapq8098_firmwaresdx20msm8998_firmwaresdm660sdm630mdm9607_firmwareqcs405sdm710qm215mdm9607apq8017_firmwaresdm710_firmwaremsm8939_firmwareqcn7605_firmwaremdm9207c_firmwaremsm8905mdm9207csm8150_firmwareapq8096ausdm439_firmwareqcs405_firmwaresdm630_firmwaresda660_firmwareqm215_firmwaremsm8953_firmwareapq8053apq8096au_firmwaresm6150_firmwaremsm8998sm8150sdx20_firmwareapq8017nicobar_firmwaresdm660_firmwaresdm845_firmwareSnapdragon Auto, Snapdragon Consumer Electronics Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon IoT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables
CWE ID-CWE-367
Time-of-check Time-of-use (TOCTOU) Race Condition
CVE-2024-39425
Matching Score-4
Assigner-Adobe Systems Incorporated
ShareView Details
Matching Score-4
Assigner-Adobe Systems Incorporated
CVSS Score-7||HIGH
EPSS-0.04% / 9.47%
||
7 Day CHG~0.00%
Published-14 Aug, 2024 | 15:07
Updated-15 Aug, 2024 | 17:17
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Security vulnerability in AdobeARMHelper

Acrobat Reader versions 20.005.30636, 24.002.20965, 24.002.20964, 24.001.30123 and earlier are affected by a Time-of-check Time-of-use (TOCTOU) Race Condition vulnerability that could lead to privilege escalation. Exploitation of this issue require local low-privilege access to the affected system and attack complexity is high.

Action-Not Available
Vendor-Apple Inc.Microsoft CorporationAdobe Inc.
Product-acrobat_dcacrobat_readeracrobatacrobat_reader_dcwindowsmacosAcrobat Readeracrobat_dcacrobat_readeracrobat_reader_dcacrobat
CWE ID-CWE-367
Time-of-check Time-of-use (TOCTOU) Race Condition
  • Previous
  • 1
  • 2
  • 3
  • Next
Details not found