Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
Vulnerability Details :

CVE-2024-20820

Summary
Assigner-SamsungMobile
Assigner Org ID-3af57064-a867-422c-b2ad-40307b65c458
Published At-06 Feb, 2024 | 02:23
Updated At-01 Aug, 2024 | 22:06
Rejected At-
Credits

Improper input validation in bootloader prior to SMR Feb-2024 Release 1 allows local privileged attackers to cause an Out-Of-Bounds read.

Vendors
-
Not available
Products
-
Metrics (CVSS)
VersionBase scoreBase severityVector
Weaknesses
Attack Patterns
Solution/Workaround
References
HyperlinkResource Type
EPSS History
Score
Latest Score
-
N/A
No data available for selected date range
Percentile
Latest Percentile
-
N/A
No data available for selected date range
Stakeholder-Specific Vulnerability Categorization (SSVC)
▼Common Vulnerabilities and Exposures (CVE)
cve.org
Assigner:SamsungMobile
Assigner Org ID:3af57064-a867-422c-b2ad-40307b65c458
Published At:06 Feb, 2024 | 02:23
Updated At:01 Aug, 2024 | 22:06
Rejected At:
▼CVE Numbering Authority (CNA)

Improper input validation in bootloader prior to SMR Feb-2024 Release 1 allows local privileged attackers to cause an Out-Of-Bounds read.

Affected Products
Vendor
Samsung ElectronicsSamsung Mobile
Product
Samsung Mobile Devices
Default Status
affected
Versions
Unaffected
  • SMR Feb-2024 Release in Selected Android 11, 12, 13 MediaTek devices
Problem Types
TypeCWE IDDescription
N/AN/ACWE-20: Improper Input Validation
Type: N/A
CWE ID: N/A
Description: CWE-20: Improper Input Validation
Metrics
VersionBase scoreBase severityVector
3.14.4MEDIUM
CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N
Version: 3.1
Base score: 4.4
Base severity: MEDIUM
Vector:
CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://security.samsungmobile.com/securityUpdate.smsb?year=2024&month=02
N/A
Hyperlink: https://security.samsungmobile.com/securityUpdate.smsb?year=2024&month=02
Resource: N/A
▼Authorized Data Publishers (ADP)
1. CISA ADP Vulnrichment
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
2. CVE Program Container
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://security.samsungmobile.com/securityUpdate.smsb?year=2024&month=02
x_transferred
Hyperlink: https://security.samsungmobile.com/securityUpdate.smsb?year=2024&month=02
Resource:
x_transferred
Information is not available yet
▼National Vulnerability Database (NVD)
nvd.nist.gov
Source:mobile.security@samsung.com
Published At:06 Feb, 2024 | 03:15
Updated At:02 Apr, 2024 | 01:15

Improper input validation in bootloader prior to SMR Feb-2024 Release 1 allows local privileged attackers to cause an Out-Of-Bounds read.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Date Added: N/A
Due Date: N/A
Vulnerability Name: N/A
Required Action: N/A
Metrics
TypeVersionBase scoreBase severityVector
Primary3.17.1HIGH
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
Secondary3.14.4MEDIUM
CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N
Type: Primary
Version: 3.1
Base score: 7.1
Base severity: HIGH
Vector:
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
Type: Secondary
Version: 3.1
Base score: 4.4
Base severity: MEDIUM
Vector:
CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N
CPE Matches

Samsung
samsung
>>android>>11.0
cpe:2.3:o:samsung:android:11.0:-:*:*:*:*:*:*
Samsung
samsung
>>android>>11.0
cpe:2.3:o:samsung:android:11.0:smr-apr-2021-r1:*:*:*:*:*:*
Samsung
samsung
>>android>>11.0
cpe:2.3:o:samsung:android:11.0:smr-apr-2022-r1:*:*:*:*:*:*
Samsung
samsung
>>android>>11.0
cpe:2.3:o:samsung:android:11.0:smr-apr-2023-r1:*:*:*:*:*:*
Samsung
samsung
>>android>>11.0
cpe:2.3:o:samsung:android:11.0:smr-aug-2021-r1:*:*:*:*:*:*
Samsung
samsung
>>android>>11.0
cpe:2.3:o:samsung:android:11.0:smr-aug-2022-r1:*:*:*:*:*:*
Samsung
samsung
>>android>>11.0
cpe:2.3:o:samsung:android:11.0:smr-aug-2023-r1:*:*:*:*:*:*
Samsung
samsung
>>android>>11.0
cpe:2.3:o:samsung:android:11.0:smr-dec-2020-r1:*:*:*:*:*:*
Samsung
samsung
>>android>>11.0
cpe:2.3:o:samsung:android:11.0:smr-dec-2021-r1:*:*:*:*:*:*
Samsung
samsung
>>android>>11.0
cpe:2.3:o:samsung:android:11.0:smr-dec-2022-r1:*:*:*:*:*:*
Samsung
samsung
>>android>>11.0
cpe:2.3:o:samsung:android:11.0:smr-dec-2023-r1:*:*:*:*:*:*
Samsung
samsung
>>android>>11.0
cpe:2.3:o:samsung:android:11.0:smr-feb-2021-r1:*:*:*:*:*:*
Samsung
samsung
>>android>>11.0
cpe:2.3:o:samsung:android:11.0:smr-feb-2022-r1:*:*:*:*:*:*
Samsung
samsung
>>android>>11.0
cpe:2.3:o:samsung:android:11.0:smr-feb-2023-r1:*:*:*:*:*:*
Samsung
samsung
>>android>>11.0
cpe:2.3:o:samsung:android:11.0:smr-feb-2024-r1:*:*:*:*:*:*
Samsung
samsung
>>android>>11.0
cpe:2.3:o:samsung:android:11.0:smr-jan-2021-r1:*:*:*:*:*:*
Samsung
samsung
>>android>>11.0
cpe:2.3:o:samsung:android:11.0:smr-jan-2022-r1:*:*:*:*:*:*
Samsung
samsung
>>android>>11.0
cpe:2.3:o:samsung:android:11.0:smr-jan-2023-r1:*:*:*:*:*:*
Samsung
samsung
>>android>>11.0
cpe:2.3:o:samsung:android:11.0:smr-jan-2024-r1:*:*:*:*:*:*
Samsung
samsung
>>android>>11.0
cpe:2.3:o:samsung:android:11.0:smr-jul-2021-r1:*:*:*:*:*:*
Samsung
samsung
>>android>>11.0
cpe:2.3:o:samsung:android:11.0:smr-jul-2022-r1:*:*:*:*:*:*
Samsung
samsung
>>android>>11.0
cpe:2.3:o:samsung:android:11.0:smr-jul-2023-r1:*:*:*:*:*:*
Samsung
samsung
>>android>>11.0
cpe:2.3:o:samsung:android:11.0:smr-jun-2021-r1:*:*:*:*:*:*
Samsung
samsung
>>android>>11.0
cpe:2.3:o:samsung:android:11.0:smr-jun-2022-r1:*:*:*:*:*:*
Samsung
samsung
>>android>>11.0
cpe:2.3:o:samsung:android:11.0:smr-jun-2023-r1:*:*:*:*:*:*
Samsung
samsung
>>android>>11.0
cpe:2.3:o:samsung:android:11.0:smr-mar-2021-r1:*:*:*:*:*:*
Samsung
samsung
>>android>>11.0
cpe:2.3:o:samsung:android:11.0:smr-mar-2022-r1:*:*:*:*:*:*
Samsung
samsung
>>android>>11.0
cpe:2.3:o:samsung:android:11.0:smr-mar-2023-r1:*:*:*:*:*:*
Samsung
samsung
>>android>>11.0
cpe:2.3:o:samsung:android:11.0:smr-may-2021-r1:*:*:*:*:*:*
Samsung
samsung
>>android>>11.0
cpe:2.3:o:samsung:android:11.0:smr-may-2022-r1:*:*:*:*:*:*
Samsung
samsung
>>android>>11.0
cpe:2.3:o:samsung:android:11.0:smr-may-2023-r1:*:*:*:*:*:*
Samsung
samsung
>>android>>11.0
cpe:2.3:o:samsung:android:11.0:smr-nov-2021-r1:*:*:*:*:*:*
Samsung
samsung
>>android>>11.0
cpe:2.3:o:samsung:android:11.0:smr-nov-2022-r1:*:*:*:*:*:*
Samsung
samsung
>>android>>11.0
cpe:2.3:o:samsung:android:11.0:smr-nov-2023-r1:*:*:*:*:*:*
Samsung
samsung
>>android>>11.0
cpe:2.3:o:samsung:android:11.0:smr-oct-2021-r1:*:*:*:*:*:*
Samsung
samsung
>>android>>11.0
cpe:2.3:o:samsung:android:11.0:smr-oct-2022-r1:*:*:*:*:*:*
Samsung
samsung
>>android>>11.0
cpe:2.3:o:samsung:android:11.0:smr-oct-2023-r1:*:*:*:*:*:*
Samsung
samsung
>>android>>11.0
cpe:2.3:o:samsung:android:11.0:smr-sep-2021-r1:*:*:*:*:*:*
Samsung
samsung
>>android>>11.0
cpe:2.3:o:samsung:android:11.0:smr-sep-2022-r1:*:*:*:*:*:*
Samsung
samsung
>>android>>11.0
cpe:2.3:o:samsung:android:11.0:smr-sep-2023-r1:*:*:*:*:*:*
Samsung
samsung
>>android>>12.0
cpe:2.3:o:samsung:android:12.0:-:*:*:*:*:*:*
Samsung
samsung
>>android>>12.0
cpe:2.3:o:samsung:android:12.0:smr-apr-2022-r1:*:*:*:*:*:*
Samsung
samsung
>>android>>12.0
cpe:2.3:o:samsung:android:12.0:smr-apr-2023-r1:*:*:*:*:*:*
Samsung
samsung
>>android>>12.0
cpe:2.3:o:samsung:android:12.0:smr-aug-2022-r1:*:*:*:*:*:*
Samsung
samsung
>>android>>12.0
cpe:2.3:o:samsung:android:12.0:smr-aug-2023-r1:*:*:*:*:*:*
Samsung
samsung
>>android>>12.0
cpe:2.3:o:samsung:android:12.0:smr-dec-2021-r1:*:*:*:*:*:*
Samsung
samsung
>>android>>12.0
cpe:2.3:o:samsung:android:12.0:smr-dec-2022-r1:*:*:*:*:*:*
Samsung
samsung
>>android>>12.0
cpe:2.3:o:samsung:android:12.0:smr-dec-2023-r1:*:*:*:*:*:*
Samsung
samsung
>>android>>12.0
cpe:2.3:o:samsung:android:12.0:smr-feb-2022-r1:*:*:*:*:*:*
Samsung
samsung
>>android>>12.0
cpe:2.3:o:samsung:android:12.0:smr-feb-2023-r1:*:*:*:*:*:*
Weaknesses
CWE IDTypeSource
CWE-125Primarynvd@nist.gov
CWE ID: CWE-125
Type: Primary
Source: nvd@nist.gov
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
https://security.samsungmobile.com/securityUpdate.smsb?year=2024&month=02mobile.security@samsung.com
Vendor Advisory
Hyperlink: https://security.samsungmobile.com/securityUpdate.smsb?year=2024&month=02
Source: mobile.security@samsung.com
Resource:
Vendor Advisory

Change History

0
Information is not available yet

Similar CVEs

529Records found

CVE-2022-49844
Matching Score-4
Assigner-kernel.org
ShareView Details
Matching Score-4
Assigner-kernel.org
CVSS Score-7.1||HIGH
EPSS-0.02% / 3.31%
||
7 Day CHG~0.00%
Published-01 May, 2025 | 14:09
Updated-07 May, 2025 | 13:32
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
can: dev: fix skb drop check

In the Linux kernel, the following vulnerability has been resolved: can: dev: fix skb drop check In commit a6d190f8c767 ("can: skb: drop tx skb if in listen only mode") the priv->ctrlmode element is read even on virtual CAN interfaces that do not create the struct can_priv at startup. This out-of-bounds read may lead to CAN frame drops for virtual CAN interfaces like vcan and vxcan. This patch mainly reverts the original commit and adds a new helper for CAN interface drivers that provide the required information in struct can_priv. [mkl: patch pch_can, too]

Action-Not Available
Vendor-Linux Kernel Organization, Inc
Product-linux_kernelLinux
CWE ID-CWE-125
Out-of-bounds Read
CVE-2022-49740
Matching Score-4
Assigner-kernel.org
ShareView Details
Matching Score-4
Assigner-kernel.org
CVSS Score-7.1||HIGH
EPSS-0.01% / 1.38%
||
7 Day CHG-0.01%
Published-27 Mar, 2025 | 16:42
Updated-04 May, 2025 | 08:44
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
wifi: brcmfmac: Check the count value of channel spec to prevent out-of-bounds reads

In the Linux kernel, the following vulnerability has been resolved: wifi: brcmfmac: Check the count value of channel spec to prevent out-of-bounds reads This patch fixes slab-out-of-bounds reads in brcmfmac that occur in brcmf_construct_chaninfo() and brcmf_enable_bw40_2g() when the count value of channel specifications provided by the device is greater than the length of 'list->element[]', decided by the size of the 'list' allocated with kzalloc(). The patch adds checks that make the functions free the buffer and return -EINVAL if that is the case. Note that the negative return is handled by the caller, brcmf_setup_wiphybands() or brcmf_cfg80211_attach(). Found by a modified version of syzkaller. Crash Report from brcmf_construct_chaninfo(): ================================================================== BUG: KASAN: slab-out-of-bounds in brcmf_setup_wiphybands+0x1238/0x1430 Read of size 4 at addr ffff888115f24600 by task kworker/0:2/1896 CPU: 0 PID: 1896 Comm: kworker/0:2 Tainted: G W O 5.14.0+ #132 Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.12.1-0-ga5cab58e9a3f-prebuilt.qemu.org 04/01/2014 Workqueue: usb_hub_wq hub_event Call Trace: dump_stack_lvl+0x57/0x7d print_address_description.constprop.0.cold+0x93/0x334 kasan_report.cold+0x83/0xdf brcmf_setup_wiphybands+0x1238/0x1430 brcmf_cfg80211_attach+0x2118/0x3fd0 brcmf_attach+0x389/0xd40 brcmf_usb_probe+0x12de/0x1690 usb_probe_interface+0x25f/0x710 really_probe+0x1be/0xa90 __driver_probe_device+0x2ab/0x460 driver_probe_device+0x49/0x120 __device_attach_driver+0x18a/0x250 bus_for_each_drv+0x123/0x1a0 __device_attach+0x207/0x330 bus_probe_device+0x1a2/0x260 device_add+0xa61/0x1ce0 usb_set_configuration+0x984/0x1770 usb_generic_driver_probe+0x69/0x90 usb_probe_device+0x9c/0x220 really_probe+0x1be/0xa90 __driver_probe_device+0x2ab/0x460 driver_probe_device+0x49/0x120 __device_attach_driver+0x18a/0x250 bus_for_each_drv+0x123/0x1a0 __device_attach+0x207/0x330 bus_probe_device+0x1a2/0x260 device_add+0xa61/0x1ce0 usb_new_device.cold+0x463/0xf66 hub_event+0x10d5/0x3330 process_one_work+0x873/0x13e0 worker_thread+0x8b/0xd10 kthread+0x379/0x450 ret_from_fork+0x1f/0x30 Allocated by task 1896: kasan_save_stack+0x1b/0x40 __kasan_kmalloc+0x7c/0x90 kmem_cache_alloc_trace+0x19e/0x330 brcmf_setup_wiphybands+0x290/0x1430 brcmf_cfg80211_attach+0x2118/0x3fd0 brcmf_attach+0x389/0xd40 brcmf_usb_probe+0x12de/0x1690 usb_probe_interface+0x25f/0x710 really_probe+0x1be/0xa90 __driver_probe_device+0x2ab/0x460 driver_probe_device+0x49/0x120 __device_attach_driver+0x18a/0x250 bus_for_each_drv+0x123/0x1a0 __device_attach+0x207/0x330 bus_probe_device+0x1a2/0x260 device_add+0xa61/0x1ce0 usb_set_configuration+0x984/0x1770 usb_generic_driver_probe+0x69/0x90 usb_probe_device+0x9c/0x220 really_probe+0x1be/0xa90 __driver_probe_device+0x2ab/0x460 driver_probe_device+0x49/0x120 __device_attach_driver+0x18a/0x250 bus_for_each_drv+0x123/0x1a0 __device_attach+0x207/0x330 bus_probe_device+0x1a2/0x260 device_add+0xa61/0x1ce0 usb_new_device.cold+0x463/0xf66 hub_event+0x10d5/0x3330 process_one_work+0x873/0x13e0 worker_thread+0x8b/0xd10 kthread+0x379/0x450 ret_from_fork+0x1f/0x30 The buggy address belongs to the object at ffff888115f24000 which belongs to the cache kmalloc-2k of size 2048 The buggy address is located 1536 bytes inside of 2048-byte region [ffff888115f24000, ffff888115f24800) Memory state around the buggy address: ffff888115f24500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ffff888115f24580: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 >ffff888115f24600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc ^ ffff888115f24680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc ffff888115f24700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc ================================================================== Crash Report from brcmf_enable_bw40_2g(): ========== ---truncated---

Action-Not Available
Vendor-Linux Kernel Organization, Inc
Product-linux_kernelLinux
CWE ID-CWE-125
Out-of-bounds Read
CVE-2022-48739
Matching Score-4
Assigner-kernel.org
ShareView Details
Matching Score-4
Assigner-kernel.org
CVSS Score-7.1||HIGH
EPSS-0.04% / 9.54%
||
7 Day CHG~0.00%
Published-20 Jun, 2024 | 11:13
Updated-04 May, 2025 | 08:22
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
ASoC: hdmi-codec: Fix OOB memory accesses

In the Linux kernel, the following vulnerability has been resolved: ASoC: hdmi-codec: Fix OOB memory accesses Correct size of iec_status array by changing it to the size of status array of the struct snd_aes_iec958. This fixes out-of-bounds slab read accesses made by memcpy() of the hdmi-codec driver. This problem is reported by KASAN.

Action-Not Available
Vendor-Linux Kernel Organization, Inc
Product-linux_kernelLinux
CWE ID-CWE-125
Out-of-bounds Read
CVE-2022-48866
Matching Score-4
Assigner-kernel.org
ShareView Details
Matching Score-4
Assigner-kernel.org
CVSS Score-7.1||HIGH
EPSS-0.02% / 3.21%
||
7 Day CHG~0.00%
Published-16 Jul, 2024 | 12:25
Updated-04 May, 2025 | 08:25
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
HID: hid-thrustmaster: fix OOB read in thrustmaster_interrupts

In the Linux kernel, the following vulnerability has been resolved: HID: hid-thrustmaster: fix OOB read in thrustmaster_interrupts Syzbot reported an slab-out-of-bounds Read in thrustmaster_probe() bug. The root case is in missing validation check of actual number of endpoints. Code should not blindly access usb_host_interface::endpoint array, since it may contain less endpoints than code expects. Fix it by adding missing validaion check and print an error if number of endpoints do not match expected number

Action-Not Available
Vendor-Linux Kernel Organization, Inc
Product-linux_kernelLinux
CWE ID-CWE-125
Out-of-bounds Read
CVE-2022-48966
Matching Score-4
Assigner-kernel.org
ShareView Details
Matching Score-4
Assigner-kernel.org
CVSS Score-7.1||HIGH
EPSS-0.04% / 8.91%
||
7 Day CHG~0.00%
Published-21 Oct, 2024 | 20:05
Updated-04 May, 2025 | 08:27
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
net: mvneta: Prevent out of bounds read in mvneta_config_rss()

In the Linux kernel, the following vulnerability has been resolved: net: mvneta: Prevent out of bounds read in mvneta_config_rss() The pp->indir[0] value comes from the user. It is passed to: if (cpu_online(pp->rxq_def)) inside the mvneta_percpu_elect() function. It needs bounds checkeding to ensure that it is not beyond the end of the cpu bitmap.

Action-Not Available
Vendor-Linux Kernel Organization, Inc
Product-linux_kernelLinux
CWE ID-CWE-125
Out-of-bounds Read
CVE-2022-49560
Matching Score-4
Assigner-kernel.org
ShareView Details
Matching Score-4
Assigner-kernel.org
CVSS Score-7.1||HIGH
EPSS-0.05% / 13.41%
||
7 Day CHG~0.00%
Published-26 Feb, 2025 | 02:14
Updated-04 May, 2025 | 08:40
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
exfat: check if cluster num is valid

In the Linux kernel, the following vulnerability has been resolved: exfat: check if cluster num is valid Syzbot reported slab-out-of-bounds read in exfat_clear_bitmap. This was triggered by reproducer calling truncute with size 0, which causes the following trace: BUG: KASAN: slab-out-of-bounds in exfat_clear_bitmap+0x147/0x490 fs/exfat/balloc.c:174 Read of size 8 at addr ffff888115aa9508 by task syz-executor251/365 Call Trace: __dump_stack lib/dump_stack.c:77 [inline] dump_stack_lvl+0x1e2/0x24b lib/dump_stack.c:118 print_address_description+0x81/0x3c0 mm/kasan/report.c:233 __kasan_report mm/kasan/report.c:419 [inline] kasan_report+0x1a4/0x1f0 mm/kasan/report.c:436 __asan_report_load8_noabort+0x14/0x20 mm/kasan/report_generic.c:309 exfat_clear_bitmap+0x147/0x490 fs/exfat/balloc.c:174 exfat_free_cluster+0x25a/0x4a0 fs/exfat/fatent.c:181 __exfat_truncate+0x99e/0xe00 fs/exfat/file.c:217 exfat_truncate+0x11b/0x4f0 fs/exfat/file.c:243 exfat_setattr+0xa03/0xd40 fs/exfat/file.c:339 notify_change+0xb76/0xe10 fs/attr.c:336 do_truncate+0x1ea/0x2d0 fs/open.c:65 Move the is_valid_cluster() helper from fatent.c to a common header to make it reusable in other *.c files. And add is_valid_cluster() to validate if cluster number is within valid range in exfat_clear_bitmap() and exfat_set_bitmap().

Action-Not Available
Vendor-Linux Kernel Organization, Inc
Product-linux_kernelLinux
CWE ID-CWE-125
Out-of-bounds Read
CVE-2022-49395
Matching Score-4
Assigner-kernel.org
ShareView Details
Matching Score-4
Assigner-kernel.org
CVSS Score-7.1||HIGH
EPSS-0.02% / 4.56%
||
7 Day CHG~0.00%
Published-26 Feb, 2025 | 02:11
Updated-04 May, 2025 | 08:36
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
um: Fix out-of-bounds read in LDT setup

In the Linux kernel, the following vulnerability has been resolved: um: Fix out-of-bounds read in LDT setup syscall_stub_data() expects the data_count parameter to be the number of longs, not bytes. ================================================================== BUG: KASAN: stack-out-of-bounds in syscall_stub_data+0x70/0xe0 Read of size 128 at addr 000000006411f6f0 by task swapper/1 CPU: 0 PID: 1 Comm: swapper Not tainted 5.18.0+ #18 Call Trace: show_stack.cold+0x166/0x2a7 __dump_stack+0x3a/0x43 dump_stack_lvl+0x1f/0x27 print_report.cold+0xdb/0xf81 kasan_report+0x119/0x1f0 kasan_check_range+0x3a3/0x440 memcpy+0x52/0x140 syscall_stub_data+0x70/0xe0 write_ldt_entry+0xac/0x190 init_new_ldt+0x515/0x960 init_new_context+0x2c4/0x4d0 mm_init.constprop.0+0x5ed/0x760 mm_alloc+0x118/0x170 0x60033f48 do_one_initcall+0x1d7/0x860 0x60003e7b kernel_init+0x6e/0x3d4 new_thread_handler+0x1e7/0x2c0 The buggy address belongs to stack of task swapper/1 and is located at offset 64 in frame: init_new_ldt+0x0/0x960 This frame has 2 objects: [32, 40) 'addr' [64, 80) 'desc' ==================================================================

Action-Not Available
Vendor-Linux Kernel Organization, Inc
Product-linux_kernelLinux
CWE ID-CWE-125
Out-of-bounds Read
CVE-2022-49218
Matching Score-4
Assigner-kernel.org
ShareView Details
Matching Score-4
Assigner-kernel.org
CVSS Score-7.1||HIGH
EPSS-0.03% / 6.06%
||
7 Day CHG~0.00%
Published-26 Feb, 2025 | 01:55
Updated-04 May, 2025 | 08:32
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
drm/dp: Fix OOB read when handling Post Cursor2 register

In the Linux kernel, the following vulnerability has been resolved: drm/dp: Fix OOB read when handling Post Cursor2 register The link_status array was not large enough to read the Adjust Request Post Cursor2 register, so remove the common helper function to avoid an OOB read, found with a -Warray-bounds build: drivers/gpu/drm/drm_dp_helper.c: In function 'drm_dp_get_adjust_request_post_cursor': drivers/gpu/drm/drm_dp_helper.c:59:27: error: array subscript 10 is outside array bounds of 'const u8[6]' {aka 'const unsigned char[6]'} [-Werror=array-bounds] 59 | return link_status[r - DP_LANE0_1_STATUS]; | ~~~~~~~~~~~^~~~~~~~~~~~~~~~~~~~~~~ drivers/gpu/drm/drm_dp_helper.c:147:51: note: while referencing 'link_status' 147 | u8 drm_dp_get_adjust_request_post_cursor(const u8 link_status[DP_LINK_STATUS_SIZE], | ~~~~~~~~~^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Replace the only user of the helper with an open-coded fetch and decode, similar to drivers/gpu/drm/amd/display/dc/core/dc_link_dp.c.

Action-Not Available
Vendor-Linux Kernel Organization, Inc
Product-linux_kernelLinux
CWE ID-CWE-125
Out-of-bounds Read
CVE-2022-49368
Matching Score-4
Assigner-kernel.org
ShareView Details
Matching Score-4
Assigner-kernel.org
CVSS Score-7.1||HIGH
EPSS-0.02% / 4.56%
||
7 Day CHG~0.00%
Published-26 Feb, 2025 | 02:11
Updated-04 May, 2025 | 08:36
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
net: ethernet: mtk_eth_soc: out of bounds read in mtk_hwlro_get_fdir_entry()

In the Linux kernel, the following vulnerability has been resolved: net: ethernet: mtk_eth_soc: out of bounds read in mtk_hwlro_get_fdir_entry() The "fsp->location" variable comes from user via ethtool_get_rxnfc(). Check that it is valid to prevent an out of bounds read.

Action-Not Available
Vendor-Linux Kernel Organization, Inc
Product-linux_kernelLinux
CWE ID-CWE-125
Out-of-bounds Read
CVE-2022-49032
Matching Score-4
Assigner-kernel.org
ShareView Details
Matching Score-4
Assigner-kernel.org
CVSS Score-7.1||HIGH
EPSS-0.04% / 8.91%
||
7 Day CHG~0.00%
Published-21 Oct, 2024 | 20:06
Updated-04 May, 2025 | 08:28
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
iio: health: afe4404: Fix oob read in afe4404_[read|write]_raw

In the Linux kernel, the following vulnerability has been resolved: iio: health: afe4404: Fix oob read in afe4404_[read|write]_raw KASAN report out-of-bounds read as follows: BUG: KASAN: global-out-of-bounds in afe4404_read_raw+0x2ce/0x380 Read of size 4 at addr ffffffffc00e4658 by task cat/278 Call Trace: afe4404_read_raw iio_read_channel_info dev_attr_show The buggy address belongs to the variable: afe4404_channel_leds+0x18/0xffffffffffffe9c0 This issue can be reproduce by singe command: $ cat /sys/bus/i2c/devices/0-0058/iio\:device0/in_intensity6_raw The array size of afe4404_channel_leds and afe4404_channel_offdacs are less than channels, so access with chan->address cause OOB read in afe4404_[read|write]_raw. Fix it by moving access before use them.

Action-Not Available
Vendor-Linux Kernel Organization, Inc
Product-linux_kernelLinux
CWE ID-CWE-125
Out-of-bounds Read
CVE-2022-47520
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-7.1||HIGH
EPSS-0.02% / 3.62%
||
7 Day CHG~0.00%
Published-18 Dec, 2022 | 00:00
Updated-17 Apr, 2025 | 15:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An issue was discovered in the Linux kernel before 6.0.11. Missing offset validation in drivers/net/wireless/microchip/wilc1000/hif.c in the WILC1000 wireless driver can trigger an out-of-bounds read when parsing a Robust Security Network (RSN) information element from a Netlink packet.

Action-Not Available
Vendor-n/aDebian GNU/LinuxLinux Kernel Organization, IncNetApp, Inc.
Product-h410s_firmwareh500slinux_kernelh410sh700sh700s_firmwareh500s_firmwareh410cdebian_linuxh410c_firmwareh300s_firmwareh300sn/a
CWE ID-CWE-125
Out-of-bounds Read
CVE-2022-48502
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-7.1||HIGH
EPSS-0.01% / 1.03%
||
7 Day CHG~0.00%
Published-31 May, 2023 | 00:00
Updated-03 Aug, 2024 | 15:17
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An issue was discovered in the Linux kernel before 6.2. The ntfs3 subsystem does not properly check for correctness during disk reads, leading to an out-of-bounds read in ntfs_set_ea in fs/ntfs3/xattr.c.

Action-Not Available
Vendor-n/aNetApp, Inc.Linux Kernel Organization, Inc
Product-linux_kernelh500sh410sh410ch300sh700sn/a
CWE ID-CWE-125
Out-of-bounds Read
CVE-2024-29755
Matching Score-4
Assigner-Google Devices
ShareView Details
Matching Score-4
Assigner-Google Devices
CVSS Score-4.4||MEDIUM
EPSS-0.01% / 0.83%
||
7 Day CHG~0.00%
Published-05 Apr, 2024 | 20:02
Updated-27 Oct, 2024 | 22:35
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In tmu_get_pi of tmu.c, there is a possible out of bounds read due to improper input validation. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.

Action-Not Available
Vendor-Google LLC
Product-Android
CWE ID-CWE-125
Out-of-bounds Read
CVE-2022-4435
Matching Score-4
Assigner-Lenovo Group Ltd.
ShareView Details
Matching Score-4
Assigner-Lenovo Group Ltd.
CVSS Score-6.7||MEDIUM
EPSS-0.05% / 14.46%
||
7 Day CHG~0.00%
Published-05 Jan, 2023 | 17:33
Updated-10 Apr, 2025 | 14:07
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A buffer over-read vulnerability was reported in the ThinkPadX13s BIOS LenovoRemoteConfigUpdateDxe driver that could allow a local attacker with elevated privileges to cause information disclosure.

Action-Not Available
Vendor-Lenovo Group Limited
Product-thinkpad_x13s_firmwarethinkpad_x13sThinkPad X13s
CWE ID-CWE-126
Buffer Over-read
CWE ID-CWE-125
Out-of-bounds Read
CVE-2022-4433
Matching Score-4
Assigner-Lenovo Group Ltd.
ShareView Details
Matching Score-4
Assigner-Lenovo Group Ltd.
CVSS Score-6.7||MEDIUM
EPSS-0.05% / 14.46%
||
7 Day CHG~0.00%
Published-05 Jan, 2023 | 17:32
Updated-10 Apr, 2025 | 14:08
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A buffer over-read vulnerability was reported in the ThinkPadX13s BIOS LenovoSetupConfigDxe driver that could allow a local attacker with elevated privileges to cause information disclosure.

Action-Not Available
Vendor-Lenovo Group Limited
Product-thinkpad_x13s_firmwarethinkpad_x13sThinkPad X13s
CWE ID-CWE-126
Buffer Over-read
CWE ID-CWE-125
Out-of-bounds Read
CVE-2017-12613
Matching Score-4
Assigner-Apache Software Foundation
ShareView Details
Matching Score-4
Assigner-Apache Software Foundation
CVSS Score-7.1||HIGH
EPSS-0.29% / 52.23%
||
7 Day CHG+0.08%
Published-24 Oct, 2017 | 01:00
Updated-20 Apr, 2025 | 01:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

When apr_time_exp*() or apr_os_exp_time*() functions are invoked with an invalid month field value in Apache Portable Runtime APR 1.6.2 and prior, out of bounds memory may be accessed in converting this value to an apr_time_exp_t value, potentially revealing the contents of a different static heap value or resulting in program termination, and may represent an information disclosure or denial of service vulnerability to applications which call these APR functions with unvalidated external input.

Action-Not Available
Vendor-Debian GNU/LinuxRed Hat, Inc.The Apache Software Foundation
Product-enterprise_linux_desktopenterprise_linux_server_tusportable_runtimejboss_core_servicesenterprise_linux_eusenterprise_linux_workstationsoftware_collectionsdebian_linuxenterprise_linux_serverenterprise_linux_server_ausjboss_enterprise_web_serverApache Portable Runtime
CWE ID-CWE-125
Out-of-bounds Read
CVE-2022-4432
Matching Score-4
Assigner-Lenovo Group Ltd.
ShareView Details
Matching Score-4
Assigner-Lenovo Group Ltd.
CVSS Score-6.7||MEDIUM
EPSS-0.04% / 11.98%
||
7 Day CHG~0.00%
Published-05 Jan, 2023 | 17:32
Updated-08 Apr, 2025 | 15:29
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A buffer over-read vulnerability was reported in the ThinkPadX13s BIOS PersistenceConfigDxe driver that could allow a local attacker with elevated privileges to cause information disclosure.

Action-Not Available
Vendor-Lenovo Group Limited
Product-thinkpad_x13s_firmwarethinkpad_x13sThinkPad X13s
CWE ID-CWE-126
Buffer Over-read
CWE ID-CWE-125
Out-of-bounds Read
CVE-2022-43995
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-7.1||HIGH
EPSS-0.09% / 26.05%
||
7 Day CHG~0.00%
Published-02 Nov, 2022 | 00:00
Updated-05 May, 2025 | 14:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Sudo 1.8.0 through 1.9.12, with the crypt() password backend, contains a plugins/sudoers/auth/passwd.c array-out-of-bounds error that can result in a heap-based buffer over-read. This can be triggered by arbitrary local users with access to Sudo by entering a password of seven characters or fewer. The impact could vary depending on the system libraries, compiler, and processor architecture.

Action-Not Available
Vendor-sudo_projectn/a
Product-sudon/a
CWE ID-CWE-125
Out-of-bounds Read
CVE-2022-20162
Matching Score-4
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
ShareView Details
Matching Score-4
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
CVSS Score-4.4||MEDIUM
EPSS-0.02% / 2.94%
||
7 Day CHG~0.00%
Published-15 Jun, 2022 | 13:19
Updated-03 Aug, 2024 | 02:02
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In asn1_p256_int of crypto/asn1.c, there is a possible out of bounds read due to an incorrect bounds check. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-223492713References: N/A

Action-Not Available
Vendor-n/aGoogle LLC
Product-androidAndroid
CWE ID-CWE-125
Out-of-bounds Read
CVE-2024-27225
Matching Score-4
Assigner-Google Devices
ShareView Details
Matching Score-4
Assigner-Google Devices
CVSS Score-4.4||MEDIUM
EPSS-0.02% / 2.85%
||
7 Day CHG~0.00%
Published-11 Mar, 2024 | 18:55
Updated-03 Apr, 2025 | 15:54
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In sendHciCommand of bluetooth_hci.cc, there is a possible out of bounds read due to a heap buffer overflow. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation.

Action-Not Available
Vendor-Google LLC
Product-androidAndroid
CWE ID-CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
CWE ID-CWE-125
Out-of-bounds Read
CVE-2023-20665
Matching Score-4
Assigner-MediaTek, Inc.
ShareView Details
Matching Score-4
Assigner-MediaTek, Inc.
CVSS Score-4.4||MEDIUM
EPSS-0.02% / 2.90%
||
7 Day CHG~0.00%
Published-06 Apr, 2023 | 00:00
Updated-13 Feb, 2025 | 15:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In ril, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07628604; Issue ID: ALPS07628604.

Action-Not Available
Vendor-MediaTek Inc.Google LLC
Product-mt6769mt8788mt6853mt6891mt6895mt6983mt8786mt6889mt6873mt8766mt8765mt6833mt6739mt6765mt6883mt6789mt8771mt6785mt6877mt6855mt8781mt6771mt6853tmt8795tmt8321mt8789mt6779mt6762mt6885mt6768mt6781mt6879mt6893mt8768mt6763mt8791tandroidmt8797mt6875mt8798mt6761mt8365MT6739, MT6761, MT6762, MT6763, MT6765, MT6768, MT6769, MT6771, MT6779, MT6781, MT6785, MT6789, MT6833, MT6853, MT6853T, MT6855, MT6873, MT6875, MT6877, MT6879, MT6883, MT6885, MT6889, MT6891, MT6893, MT6895, MT6983, MT8321, MT8365, MT8765, MT8766, MT8768, MT8771, MT8781, MT8786, MT8788, MT8789, MT8791T, MT8795T, MT8797, MT8798
CWE ID-CWE-125
Out-of-bounds Read
CVE-2024-26982
Matching Score-4
Assigner-kernel.org
ShareView Details
Matching Score-4
Assigner-kernel.org
CVSS Score-7.1||HIGH
EPSS-0.04% / 11.12%
||
7 Day CHG~0.00%
Published-01 May, 2024 | 05:27
Updated-04 May, 2025 | 09:01
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Squashfs: check the inode number is not the invalid value of zero

In the Linux kernel, the following vulnerability has been resolved: Squashfs: check the inode number is not the invalid value of zero Syskiller has produced an out of bounds access in fill_meta_index(). That out of bounds access is ultimately caused because the inode has an inode number with the invalid value of zero, which was not checked. The reason this causes the out of bounds access is due to following sequence of events: 1. Fill_meta_index() is called to allocate (via empty_meta_index()) and fill a metadata index. It however suffers a data read error and aborts, invalidating the newly returned empty metadata index. It does this by setting the inode number of the index to zero, which means unused (zero is not a valid inode number). 2. When fill_meta_index() is subsequently called again on another read operation, locate_meta_index() returns the previous index because it matches the inode number of 0. Because this index has been returned it is expected to have been filled, and because it hasn't been, an out of bounds access is performed. This patch adds a sanity check which checks that the inode number is not zero when the inode is created and returns -EINVAL if it is. [phillip@squashfs.org.uk: whitespace fix]

Action-Not Available
Vendor-Linux Kernel Organization, Inc
Product-linux_kernelLinux
CWE ID-CWE-125
Out-of-bounds Read
CVE-2022-42530
Matching Score-4
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
ShareView Details
Matching Score-4
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
CVSS Score-4.4||MEDIUM
EPSS-0.03% / 8.24%
||
7 Day CHG~0.00%
Published-16 Dec, 2022 | 00:00
Updated-17 Apr, 2025 | 19:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In Pixel firmware, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-242331893References: N/A

Action-Not Available
Vendor-n/aGoogle LLC
Product-androidAndroid
CWE ID-CWE-125
Out-of-bounds Read
CVE-2022-42522
Matching Score-4
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
ShareView Details
Matching Score-4
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
CVSS Score-4.4||MEDIUM
EPSS-0.03% / 8.24%
||
7 Day CHG~0.00%
Published-16 Dec, 2022 | 00:00
Updated-17 Apr, 2025 | 20:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In DoSetCarrierConfig of miscservice.cpp, there is a possible out of bounds read due to an incorrect bounds check. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-243130038References: N/A

Action-Not Available
Vendor-n/aGoogle LLC
Product-androidAndroid
CWE ID-CWE-125
Out-of-bounds Read
CVE-2024-26665
Matching Score-4
Assigner-kernel.org
ShareView Details
Matching Score-4
Assigner-kernel.org
CVSS Score-7.1||HIGH
EPSS-0.01% / 0.31%
||
7 Day CHG~0.00%
Published-02 Apr, 2024 | 06:22
Updated-04 May, 2025 | 08:53
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
tunnels: fix out of bounds access when building IPv6 PMTU error

In the Linux kernel, the following vulnerability has been resolved: tunnels: fix out of bounds access when building IPv6 PMTU error If the ICMPv6 error is built from a non-linear skb we get the following splat, BUG: KASAN: slab-out-of-bounds in do_csum+0x220/0x240 Read of size 4 at addr ffff88811d402c80 by task netperf/820 CPU: 0 PID: 820 Comm: netperf Not tainted 6.8.0-rc1+ #543 ... kasan_report+0xd8/0x110 do_csum+0x220/0x240 csum_partial+0xc/0x20 skb_tunnel_check_pmtu+0xeb9/0x3280 vxlan_xmit_one+0x14c2/0x4080 vxlan_xmit+0xf61/0x5c00 dev_hard_start_xmit+0xfb/0x510 __dev_queue_xmit+0x7cd/0x32a0 br_dev_queue_push_xmit+0x39d/0x6a0 Use skb_checksum instead of csum_partial who cannot deal with non-linear SKBs.

Action-Not Available
Vendor-Linux Kernel Organization, IncDebian GNU/Linux
Product-debian_linuxlinux_kernelLinux
CWE ID-CWE-125
Out-of-bounds Read
CVE-2022-42543
Matching Score-4
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
ShareView Details
Matching Score-4
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
CVSS Score-4.4||MEDIUM
EPSS-0.03% / 6.89%
||
7 Day CHG~0.00%
Published-16 Dec, 2022 | 00:00
Updated-17 Apr, 2025 | 18:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In fdt_path_offset_namelen of fdt_ro.c, there is a possible out of bounds read due to an incorrect bounds check. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-249998113References: N/A

Action-Not Available
Vendor-n/aGoogle LLC
Product-androidAndroid
CWE ID-CWE-125
Out-of-bounds Read
CVE-2022-41577
Matching Score-4
Assigner-Huawei Technologies
ShareView Details
Matching Score-4
Assigner-Huawei Technologies
CVSS Score-7.1||HIGH
EPSS-0.03% / 7.74%
||
7 Day CHG~0.00%
Published-14 Oct, 2022 | 00:00
Updated-14 May, 2025 | 15:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The kernel server has a vulnerability of not verifying the length of the data transferred in the user space.Successful exploitation of this vulnerability may cause out-of-bounds read in the kernel, which affects the device confidentiality and availability.

Action-Not Available
Vendor-Huawei Technologies Co., Ltd.
Product-harmonyosemuiHarmonyOSEMUI
CWE ID-CWE-125
Out-of-bounds Read
CVE-2022-42532
Matching Score-4
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
ShareView Details
Matching Score-4
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
CVSS Score-4.4||MEDIUM
EPSS-0.03% / 8.24%
||
7 Day CHG~0.00%
Published-16 Dec, 2022 | 00:00
Updated-17 Apr, 2025 | 20:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In Pixel firmware, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-242332610References: N/A

Action-Not Available
Vendor-n/aGoogle LLC
Product-androidAndroid
CWE ID-CWE-125
Out-of-bounds Read
CVE-2024-26593
Matching Score-4
Assigner-kernel.org
ShareView Details
Matching Score-4
Assigner-kernel.org
CVSS Score-7.1||HIGH
EPSS-0.01% / 0.57%
||
7 Day CHG-0.00%
Published-23 Feb, 2024 | 09:09
Updated-04 May, 2025 | 08:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
i2c: i801: Fix block process call transactions

In the Linux kernel, the following vulnerability has been resolved: i2c: i801: Fix block process call transactions According to the Intel datasheets, software must reset the block buffer index twice for block process call transactions: once before writing the outgoing data to the buffer, and once again before reading the incoming data from the buffer. The driver is currently missing the second reset, causing the wrong portion of the block buffer to be read.

Action-Not Available
Vendor-Linux Kernel Organization, Inc
Product-linux_kernelLinux
CWE ID-CWE-125
Out-of-bounds Read
CVE-2024-27029
Matching Score-4
Assigner-kernel.org
ShareView Details
Matching Score-4
Assigner-kernel.org
CVSS Score-7.1||HIGH
EPSS-0.01% / 0.99%
||
7 Day CHG~0.00%
Published-01 May, 2024 | 12:53
Updated-04 May, 2025 | 09:02
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
drm/amdgpu: fix mmhub client id out-of-bounds access

In the Linux kernel, the following vulnerability has been resolved: drm/amdgpu: fix mmhub client id out-of-bounds access Properly handle cid 0x140.

Action-Not Available
Vendor-Linux Kernel Organization, Inc
Product-linux_kernelLinux
CWE ID-CWE-125
Out-of-bounds Read
CVE-2024-26594
Matching Score-4
Assigner-kernel.org
ShareView Details
Matching Score-4
Assigner-kernel.org
CVSS Score-7.1||HIGH
EPSS-0.36% / 57.07%
||
7 Day CHG~0.00%
Published-23 Feb, 2024 | 13:26
Updated-04 May, 2025 | 08:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
ksmbd: validate mech token in session setup

In the Linux kernel, the following vulnerability has been resolved: ksmbd: validate mech token in session setup If client send invalid mech token in session setup request, ksmbd validate and make the error if it is invalid.

Action-Not Available
Vendor-Linux Kernel Organization, Inc
Product-linux_kernelLinux
CWE ID-CWE-125
Out-of-bounds Read
CVE-2022-1714
Matching Score-4
Assigner-Protect AI (formerly huntr.dev)
ShareView Details
Matching Score-4
Assigner-Protect AI (formerly huntr.dev)
CVSS Score-7.9||HIGH
EPSS-0.15% / 35.60%
||
7 Day CHG~0.00%
Published-13 May, 2022 | 00:00
Updated-03 Aug, 2024 | 00:10
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Out-of-bounds Read in radareorg/radare2

Out-of-bounds Read in GitHub repository radareorg/radare2 prior to 5.7.0. The bug causes the program reads data past the end of the intented buffer. Typically, this can allow attackers to read sensitive information from other memory locations or cause a crash.

Action-Not Available
Vendor-Radare2 (r2)
Product-radare2radareorg/radare2
CWE ID-CWE-125
Out-of-bounds Read
CVE-2022-42517
Matching Score-4
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
ShareView Details
Matching Score-4
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
CVSS Score-4.4||MEDIUM
EPSS-0.04% / 10.14%
||
7 Day CHG~0.00%
Published-16 Dec, 2022 | 00:00
Updated-17 Apr, 2025 | 20:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In MiscService::DoOemSetTcsFci of miscservice.cpp, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-241763682References: N/A

Action-Not Available
Vendor-n/aGoogle LLC
Product-androidAndroid
CWE ID-CWE-125
Out-of-bounds Read
CVE-2022-42514
Matching Score-4
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
ShareView Details
Matching Score-4
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
CVSS Score-4.4||MEDIUM
EPSS-0.05% / 14.62%
||
7 Day CHG~0.00%
Published-16 Dec, 2022 | 00:00
Updated-17 Apr, 2025 | 20:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In ProtocolImsBuilder::BuildSetConfig of protocolimsbuilder.cpp, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-241763298References: N/A

Action-Not Available
Vendor-n/aGoogle LLC
Product-androidAndroid
CWE ID-CWE-125
Out-of-bounds Read
CVE-2022-42512
Matching Score-4
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
ShareView Details
Matching Score-4
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
CVSS Score-4.4||MEDIUM
EPSS-0.05% / 14.62%
||
7 Day CHG~0.00%
Published-16 Dec, 2022 | 00:00
Updated-18 Apr, 2025 | 13:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In VsimOperationDataExt::encode of vsimdata.cpp, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-241763050References: N/A

Action-Not Available
Vendor-n/aGoogle LLC
Product-androidAndroid
CWE ID-CWE-125
Out-of-bounds Read
CVE-2022-42515
Matching Score-4
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
ShareView Details
Matching Score-4
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
CVSS Score-4.4||MEDIUM
EPSS-0.05% / 13.72%
||
7 Day CHG~0.00%
Published-16 Dec, 2022 | 00:00
Updated-17 Apr, 2025 | 20:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In MiscService::DoOemSetRtpPktlossThreshold of miscservice.cpp, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-241763503References: N/A

Action-Not Available
Vendor-n/aGoogle LLC
Product-androidAndroid
CWE ID-CWE-125
Out-of-bounds Read
CVE-2022-20174
Matching Score-4
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
ShareView Details
Matching Score-4
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
CVSS Score-4.4||MEDIUM
EPSS-0.06% / 17.81%
||
7 Day CHG~0.00%
Published-15 Jun, 2022 | 13:20
Updated-03 Aug, 2024 | 02:02
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In exynos_secEnv_init of mach-gs101.c, there is a possible out of bounds read due to an incorrect bounds check. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-210847407References: N/A

Action-Not Available
Vendor-n/aGoogle LLC
Product-androidAndroid
CWE ID-CWE-125
Out-of-bounds Read
CVE-2022-40135
Matching Score-4
Assigner-Lenovo Group Ltd.
ShareView Details
Matching Score-4
Assigner-Lenovo Group Ltd.
CVSS Score-4.4||MEDIUM
EPSS-0.04% / 12.27%
||
7 Day CHG~0.00%
Published-30 Jan, 2023 | 21:20
Updated-27 Mar, 2025 | 15:26
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An information leak vulnerability in the Smart USB Protection SMI Handler in some Lenovo models may allow an attacker with local access and elevated privileges to read SMM memory.

Action-Not Available
Vendor-Lenovo Group Limited
Product-thinkcentre_m70q_firmwarev330-20icbthinkcentre_e75_t\/sthinkcentre_m720eideacentre_a340-24igmthinksmart_core_device\thinkstation_p350_tiny_firmwarethinkcentre_m70t_gen_3thinkcentre_m90q_gen_2thinkcentre_e96zthinkcentre_m818z_firmwarethinkcentre_m720qideacentre_5_14iab7_firmwarev55t_gen_2_13acnthinkstation_p520yta8900fthinkcentre_m710ev50t-13imbthinkstation_p310ideacentre_5-14are05v530-22icbv330-20icb_firmwareideacentre_510-15ick_firmwareideacentre_gaming_5_17acn7_firmwarethinkcentre_m70c_firmwarev530s-07icb_firmwarev55t_gen_2_13acn_firmwarethinkstation_p340ideacentre_5-14iob6_firmwarethinkcentre_m715t_firmwarethinkcentre_m920tthinkcentre_m710tideacentre_510a-15ickthinkstation_p620thinkstation_p318_firmwarethinkstation_p350thinkcentre_m720tlegion_c530-19icb_firmwarelegion_t530-28icbthinksmart_core_\&_controller_full_room_kit\ideacentre_5-14are05_firmwareqt_m415_firmwareideacentre_510s-07icb_firmwarethinkcentre_m75s-1stadia_ggp-120thinkcentre_m70q_gen_2_firmwarev50s-07imbthinkcentre_m75s_gen_2thinkstation_p340_firmwareideacentre_5-14acn6_firmwareideacentre_gaming_5-14acn6thinkcentre_m625q_firmwarethinkstation_p520c_firmwareqt_b415_firmwarethinkcentre_m75t_gen_2_firmwarethinkcentre_m910x_firmwarethinkcentre_m910s_firmwarethinkcentre_m75q-1yangtian_afq150_firmwarev50t-13iob_g2ideacentre_gaming_5-14iob6v520sthinkcentre_neo_50t_gen_3ideacentre_g5-14imb05thinkcentre_m70a_gen_2_firmwareideacentre_t540-15ama_gthinksmart_core_\&_controller_kit\thinkcentre_m910q_firmwarethinkstation_p350_tinythinkcentre_m720s_firmwarelegion_t530-28aprthinkcentre_m70q_gen_2thinkcentre_m75s_gen_2_firmwareqt_m410_firmwarethinkcentre_m920q_firmwarethinkcentre_m920sideacentre_a340-24igm_firmwareideacentre_510s-07icbthinksystem_st58_firmwarethinkcentre_m710q_firmwarethinkcentre_m818zqt_m415v520thinkstation_p318ideacentre_t540-15ama_g_firmwarethinksmart_core_device_for_polyideacentre_g5-14amr05_firmwarethinkcentre_m75n_firmwarethinkcentre_m910qthinkcentre_m6600t_firmwarethinkcentre_m720sideacentre_720-18apr_firmwarethinkcentre_m715q_firmwarethinksmart_hub_teamsthinkcentre_m920t_firmwarethinkcentre_m810zthinksmart_core_device_for_logitechthinkcentre_m75nthinksmart_hub_zoomthinkcentre_m810z_firmwarelegion_t5-26iob6_firmwarethinkcentre_m710qthinkcentre_m60e_tinythinkcentre_m70t_gen_3_firmwareideacentre_3-07ada05thinkcentre_m710e_firmwarev530-15icbthinkcentre_m6600sstadia_ggp-120_firmwarethinkcentre_m60e_tiny_firmwarethinkcentre_m70q_gen_3_firmwarethinkcentre_m75s-1_firmwarelegion_t5-28icb05_firmwarev35s-07ada_firmwarethinksmart_core_device_for_poly_firmwarev520_firmwareideacentre_720-18aprlegion_t5-28icb05thinkcentre_m70av530s-07icr_firmwareideacentre_510-15ickthinkcentre_m6600qideacentre_3-07ada05_firmwarev55t-15areyoga_a940-27icb_firmwarev530s-07icrthinkcentre_m75q-1_firmwarev50t-13imb_firmwareideacentre_gaming_5_17iab7thinkcentre_m820zideacentre_3-07imb05_firmwarev50t-13iob_g2_firmwareqitian_a815_firmwarethinkcentre_m70q_gen_3ideacentre_t540-15ick_firmwareideacentre_g5-14amr05yta8900f_firmwareideacentre_gaming_5-14iob6_firmwarethinkcentre_m910tv540-24iwlthinkcentre_m920x_firmwarev530-15arr_firmwarethinkcentre_m920qthinksmart_hub_teams_firmwarethinkcentre_m720t_firmwarethinkstation_p320_tinythinkcentre_e75_t\/s_firmwarethinkcentre_m90q_tiny_firmwareideacentre_3_07iab7_firmwareideacentre_g5-14imb05_firmwarethinkcentre_neo_50s_gen_3thinkcentre_m6600tthinkcentre_m70qthinkstation_p330_tiny_firmwarev35s-07adathinkcentre_m630eideacentre_510a-15arrthinkcentre_m625qthinkcentre_m90a_gen2v530-15arrthinkstation_p310_firmwarethinkcentre_neo_50s_gen_3_firmwarethinkcentre_e96z_firmwareideacentre_5-14iob6v50a-24imb_firmwarev530-15icb_firmwareideacentre_510s-07ick_firmwarelegion_t530-28icb_firmwarethinkcentre_m715qideacentre_510a-15arr_firmwarethinkcentre_m70s_gen_3_firmwarethinkcentre_m70a_firmwarethinkedge_se30_firmwarev530-15icrv530s-07icbv50a-22imbyangtian_afq150v50a-24imbv530-22icb_firmwarethinkstation_p330_tinyideacentre_creator_5-14iob6legion_t530-28apr_firmwarethinkcentre_m70a_gen_2ideacentre_5-14imb05legion_c530-19icbthinksystem_st50thinkcentre_m90a_firmwarethinkcentre_m920s_firmwareideacentre_510s-07ickthinkcentre_m710s_firmwarethinkcentre_m610v55t-15are_firmwarelegion_t5-26iob6thinkcentre_m90q_tinylegion_t7-34imz5_firmwarethinkcentre_m920xv530-15icr_firmwarethinkstation_p620_firmwarev55t-15api_firmwareqt_m410ideacentre_a340-22igmthinkstation_p340_tinyv30a-24imlthinkstation_p520_firmwarethinksmart_core_device_for_logitech_firmwarethinkcentre_m910xthinkcentre_m80q_firmwarethinkcentre_m6600s_firmwarethinkcentre_m630e_firmwarethinkcentre_m910sv530-24icb_firmwareideacentre_gaming_5_17acn7ideacentre_3_07iab7thinkstation_p348thinkcentre_neo_50t_gen_3_firmwarethinkcentre_m6600q_firmwarethinkcentre_m710t_firmwareideacentre_t540-15ickqitian_a815thinkcentre_m720e_firmwarethinkcentre_m80qthinkedge_se30ideacentre_5_14iab7thinkcentre_m725sqt_b415legion_t7-34imz5v30a-24iml_firmwarethinkcentre_m725s_firmwarethinkcentre_m70cthinksystem_st50_firmwarev520s_firmwarethinkcentre_m75q_gen_2thinkcentre_m90athinkstation_p350_firmwarethinkstation_p320_tiny_firmwarethinksystem_st58ideacentre_c5-14imb05thinkcentre_m70s_gen_3v50a-22imb_firmwarethinkcentre_m90q_gen_2_firmwarev50s-07imb_firmwarev530-24icbv30a-22imlthinkstation_p340_tiny_firmwarethinkcentre_m90a_gen2_firmwareideacentre_c5-14imb05_firmwareyoga_a940-27icbthinkcentre_m610_firmwarev30a-22iml_firmwarethinkcentre_m820z_firmwarethinksmart_hub_zoom_firmwarev540-24iwl_firmwarethinkcentre_m75q_gen_2_firmwarev55t-15apiideacentre_5-14imb05_firmwarethinkcentre_m715tthinkstation_p348_firmwareideacentre_510a-15ick_firmwarethinkcentre_m910t_firmwarethinkcentre_m710sideacentre_a340-22igm_firmwareideacentre_5-14acn6ideacentre_3-07imb05ideacentre_gaming_5_17iab7_firmwareideacentre_gaming_5-14acn6_firmwarethinkcentre_m75t_gen_2ideacentre_creator_5-14iob6_firmwarethinkcentre_m720q_firmwarethinkstation_p520cBIOS
CWE ID-CWE-125
Out-of-bounds Read
CVE-2024-23439
Matching Score-4
Assigner-Fluid Attacks
ShareView Details
Matching Score-4
Assigner-Fluid Attacks
CVSS Score-7.1||HIGH
EPSS-0.02% / 2.21%
||
7 Day CHG~0.00%
Published-13 Feb, 2024 | 14:58
Updated-19 May, 2025 | 19:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Vba32 Antivirus v3.36.0 - Arbitrary Memory Read

Vba32 Antivirus v3.36.0 is vulnerable to an Arbitrary Memory Read vulnerability by triggering the 0x22201B, 0x22201F, 0x222023, 0x222027 ,0x22202B, 0x22202F, 0x22203F, 0x222057 and 0x22205B IOCTL codes of the Vba32m64.sys driver.

Action-Not Available
Vendor-anti-virusVirusBlokAda
Product-vba32Vba32 Antivirus
CWE ID-CWE-125
Out-of-bounds Read
CVE-2024-20123
Matching Score-4
Assigner-MediaTek, Inc.
ShareView Details
Matching Score-4
Assigner-MediaTek, Inc.
CVSS Score-4.4||MEDIUM
EPSS-0.01% / 0.74%
||
7 Day CHG~0.00%
Published-04 Nov, 2024 | 01:49
Updated-22 Apr, 2025 | 13:54
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In vdec, there is a possible out of bounds read due to improper structure design. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS09008925; Issue ID: MSV-1569.

Action-Not Available
Vendor-MediaTek Inc.Google LLC
Product-mt6765mt6768mt6785mt8789mt6761androidmt6779mt8768mt8766MT6761, MT6765, MT6768, MT6779, MT6785, MT8766, MT8768, MT8789mt8768mt8789androidmt6761mt8766mt6779mt6768mt6785mt6765
CWE ID-CWE-125
Out-of-bounds Read
CVE-2022-32595
Matching Score-4
Assigner-MediaTek, Inc.
ShareView Details
Matching Score-4
Assigner-MediaTek, Inc.
CVSS Score-4.4||MEDIUM
EPSS-0.04% / 10.92%
||
7 Day CHG~0.00%
Published-06 Feb, 2023 | 00:00
Updated-26 Mar, 2025 | 20:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In widevine, there is a possible out of bounds read due to an incorrect bounds check. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07446236; Issue ID: ALPS07446236.

Action-Not Available
Vendor-Google LLCMediaTek Inc.
Product-mt6895mt6769mt8765mt6853tmt6877mt6785mt6781mt6855mt6885mt6889mt6875mt6779mt8768mt8766mt8781mt6833mt6768mt6765androidmt6893mt8786mt8788mt8791mt6883mt6853mt8385mt6762mt8789mt6879mt6789mt6891mt8797mt6873MT6762, MT6765, MT6768, MT6769, MT6779, MT6781, MT6785, MT6789, MT6833, MT6853, MT6853T, MT6855, MT6873, MT6875, MT6877, MT6879, MT6883, MT6885, MT6889, MT6891, MT6893, MT6895, MT8385, MT8765, MT8766, MT8768, MT8781, MT8786, MT8788, MT8789, MT8791, MT8797
CWE ID-CWE-125
Out-of-bounds Read
CVE-2022-40136
Matching Score-4
Assigner-Lenovo Group Ltd.
ShareView Details
Matching Score-4
Assigner-Lenovo Group Ltd.
CVSS Score-4.4||MEDIUM
EPSS-0.04% / 12.27%
||
7 Day CHG~0.00%
Published-30 Jan, 2023 | 21:20
Updated-27 Mar, 2025 | 15:25
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An information leak vulnerability in SMI Handler used to configure platform settings over WMI in some Lenovo models may allow an attacker with local access and elevated privileges to read SMM memory.

Action-Not Available
Vendor-Lenovo Group Limited
Product-thinkcentre_m70q_firmwarev330-20icbthinkcentre_e75_t\/sthinkcentre_m720eideacentre_a340-24igmthinksmart_core_device\thinkstation_p350_tiny_firmwarethinkcentre_m70t_gen_3thinkcentre_m90q_gen_2thinkcentre_e96zthinkcentre_m818z_firmwarethinkcentre_m720qideacentre_5_14iab7_firmwarev55t_gen_2_13acnthinkstation_p520yta8900fthinkcentre_m710ev50t-13imbthinkstation_p310ideacentre_5-14are05v530-22icbv330-20icb_firmwareideacentre_510-15ick_firmwareideacentre_gaming_5_17acn7_firmwarethinkcentre_m70c_firmwarev530s-07icb_firmwarev55t_gen_2_13acn_firmwarethinkstation_p340ideacentre_5-14iob6_firmwarethinkcentre_m715t_firmwarethinkcentre_m920tthinkcentre_m710tideacentre_510a-15ickthinkstation_p620thinkstation_p318_firmwarethinkstation_p350thinkcentre_m720tlegion_c530-19icb_firmwarelegion_t530-28icbthinkcentre_m90sthinksmart_core_\&_controller_full_room_kit\ideacentre_5-14are05_firmwareqt_m415_firmwareideacentre_510s-07icb_firmwarethinkcentre_m75s-1stadia_ggp-120thinkcentre_m70q_gen_2_firmwarev50s-07imbthinkcentre_m75s_gen_2thinkstation_p340_firmwareideacentre_5-14acn6_firmwareideacentre_gaming_5-14acn6thinkcentre_m70tthinkcentre_m625q_firmwarethinkstation_p520c_firmwareqt_b415_firmwarethinkcentre_m75t_gen_2_firmwarethinkcentre_m910x_firmwarethinkcentre_m910s_firmwarethinkcentre_m75q-1yangtian_afq150_firmwarev50t-13iob_g2thinkcentre_m900xideacentre_gaming_5-14iob6v520sthinkcentre_neo_50t_gen_3thinkstation_p720_firmwarethinkcentre_m70a_gen_2_firmwareideacentre_g5-14imb05ideacentre_t540-15ama_gthinksmart_core_\&_controller_kit\thinkcentre_m910q_firmwarethinkstation_p350_tinythinkcentre_m720s_firmwarelegion_t530-28aprthinkcentre_m70q_gen_2thinkcentre_m75s_gen_2_firmwareqt_m410_firmwarethinkcentre_m920q_firmwarethinkcentre_m920sideacentre_a340-24igm_firmwareideacentre_510s-07icbthinksystem_st58_firmwarethinkcentre_m710q_firmwarethinkcentre_m818zqt_m415v520thinkstation_p318ideacentre_t540-15ama_g_firmwarethinksmart_core_device_for_polyideacentre_g5-14amr05_firmwarethinkcentre_m75n_firmwarethinkcentre_m910qthinkcentre_m6600t_firmwarethinkcentre_m720sideacentre_720-18apr_firmwarethinkcentre_m715q_firmwarethinksmart_hub_teamsthinkcentre_m920t_firmwarethinkcentre_m810zthinksmart_core_device_for_logitechthinkcentre_m75nthinksmart_hub_zoomthinkcentre_m810z_firmwarelegion_t5-26iob6_firmwarethinkcentre_m710qthinkcentre_m60e_tinythinkcentre_m70t_gen_3_firmwareideacentre_3-07ada05thinkcentre_m710e_firmwarethinkcentre_m900_firmwarev530-15icbthinkcentre_m6600sstadia_ggp-120_firmwarethinkcentre_m60e_tiny_firmwarethinkcentre_m70q_gen_3_firmwarethinkcentre_m75s-1_firmwarelegion_t5-28icb05_firmwarev35s-07ada_firmwarethinksmart_core_device_for_poly_firmwarethinkcentre_m70sv520_firmwareideacentre_720-18aprlegion_t5-28icb05thinkcentre_m70av530s-07icr_firmwareideacentre_510-15ickthinkcentre_m6600qideacentre_3-07ada05_firmwarev55t-15areyoga_a940-27icb_firmwarev530s-07icrthinkcentre_m75q-1_firmwarev50t-13imb_firmwareideacentre_gaming_5_17iab7thinkcentre_m820zideacentre_3-07imb05_firmwarev50t-13iob_g2_firmwareqitian_a815_firmwarethinkcentre_m70q_gen_3ideacentre_t540-15ick_firmwareideacentre_g5-14amr05yta8900f_firmwareideacentre_gaming_5-14iob6_firmwarethinkcentre_m80t_firmwarethinkcentre_m910tthinkcentre_m80s_firmwarev540-24iwlthinkcentre_m920x_firmwarev530-15arr_firmwarethinkcentre_m920qthinksmart_hub_teams_firmwarethinkcentre_m720t_firmwarethinkcentre_m70s_firmwarethinkstation_p320_tinythinkcentre_m800thinkcentre_e75_t\/s_firmwarethinkcentre_m90q_tiny_firmwarethinkcentre_m900ideacentre_3_07iab7_firmwareideacentre_g5-14imb05_firmwarethinkcentre_neo_50s_gen_3thinkcentre_m6600tthinkcentre_m70qthinkstation_p330_tiny_firmwarev35s-07adathinkcentre_m630eideacentre_510a-15arrthinkcentre_m625qthinkcentre_m90a_gen2v530-15arrthinkstation_p310_firmwarethinkcentre_neo_50s_gen_3_firmwarethinkcentre_e96z_firmwareideacentre_5-14iob6v50a-24imb_firmwarev530-15icb_firmwareideacentre_510s-07ick_firmwarelegion_t530-28icb_firmwarethinkcentre_m715qideacentre_510a-15arr_firmwarethinkcentre_m70s_gen_3_firmwarethinkcentre_m70a_firmwarethinkedge_se30_firmwarev530-15icrv530s-07icbv50a-22imbyangtian_afq150v50a-24imbv530-22icb_firmwarethinkstation_p330_tinyideacentre_creator_5-14iob6legion_t530-28apr_firmwarethinkcentre_m70a_gen_2ideacentre_5-14imb05legion_c530-19icbthinkcentre_m80tthinksystem_st50thinkcentre_m90a_firmwarethinkcentre_m920s_firmwareideacentre_510s-07ickthinkstation_p720thinkcentre_m710s_firmwarethinkcentre_m610v55t-15are_firmwarelegion_t5-26iob6thinkstation_p920_firmwarethinkcentre_m90q_tinylegion_t7-34imz5_firmwarethinkcentre_m920xthinkcentre_m70t_firmwarev530-15icr_firmwarethinkstation_p620_firmwarev55t-15api_firmwareqt_m410ideacentre_a340-22igmthinkstation_p340_tinyv30a-24imlthinkstation_p520_firmwarethinksmart_core_device_for_logitech_firmwarethinkcentre_m80sthinkcentre_m910xthinkcentre_m80q_firmwarethinkcentre_m6600s_firmwarethinkcentre_m90s_firmwarethinkcentre_m630e_firmwarethinkstation_p320thinkcentre_m910sv530-24icb_firmwareideacentre_gaming_5_17acn7thinkstation_p320_firmwareideacentre_3_07iab7thinkstation_p348thinkcentre_neo_50t_gen_3_firmwarethinkcentre_m6600q_firmwarethinkcentre_m710t_firmwareideacentre_t540-15ickqitian_a815thinkcentre_m720e_firmwarethinkcentre_m80qthinkedge_se30ideacentre_5_14iab7thinkcentre_m800_firmwarethinkcentre_m725sqt_b415legion_t7-34imz5v30a-24iml_firmwarethinkcentre_m725s_firmwarethinkcentre_m70cthinksystem_st50_firmwarev520s_firmwarethinkcentre_m75q_gen_2thinkcentre_m90athinkstation_p350_firmwarethinkstation_p320_tiny_firmwarethinksystem_st58ideacentre_c5-14imb05thinkcentre_m70s_gen_3v50a-22imb_firmwarethinkcentre_m90q_gen_2_firmwarethinkstation_p920thinkcentre_m900x_firmwarev50s-07imb_firmwarev530-24icbv30a-22imlthinkstation_p340_tiny_firmwarethinkcentre_m90a_gen2_firmwareideacentre_c5-14imb05_firmwareyoga_a940-27icbthinkcentre_m610_firmwarev30a-22iml_firmwarethinkcentre_m820z_firmwarethinksmart_hub_zoom_firmwarev540-24iwl_firmwarethinkcentre_m75q_gen_2_firmwarev55t-15apiideacentre_5-14imb05_firmwarethinkcentre_m715tthinkstation_p348_firmwareideacentre_510a-15ick_firmwarethinkcentre_m910t_firmwarethinkcentre_m710sideacentre_a340-22igm_firmwareideacentre_5-14acn6ideacentre_3-07imb05ideacentre_gaming_5_17iab7_firmwareideacentre_gaming_5-14acn6_firmwarethinkcentre_m75t_gen_2ideacentre_creator_5-14iob6_firmwarethinkcentre_m720q_firmwarethinkstation_p520cBIOS
CWE ID-CWE-125
Out-of-bounds Read
CVE-2022-40134
Matching Score-4
Assigner-Lenovo Group Ltd.
ShareView Details
Matching Score-4
Assigner-Lenovo Group Ltd.
CVSS Score-4.4||MEDIUM
EPSS-0.04% / 12.27%
||
7 Day CHG~0.00%
Published-30 Jan, 2023 | 21:20
Updated-27 Mar, 2025 | 15:26
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An information leak vulnerability in the SMI Set BIOS Password SMI Handler in some Lenovo models may allow an attacker with local access and elevated privileges to read SMM memory.

Action-Not Available
Vendor-Lenovo Group Limited
Product-thinkpad_t14sv330-20icbthinksystem_sr530_firmwarethinkagile_hx5530thinkpad_e490thinkstation_p350_tiny_firmwarethinkcentre_m90q_gen_2v55t_gen_2_13acnthinkpad_p53yta8900fthinkpad_x1_yoga_5th_genthinkpad_p72_firmwarethinkpad_r14_gen_2thinkagile_vx3320_firmwarethinkagile_hx2330thinkagile_vx7820thinkpad_l590thinksystem_sn850thinkpad_p52thinkagile_vx3320ideacentre_5-14are05thinkcentre_m810z_all-in-onethinkagile_hx2320_firmwarethinksystem_hr630x_firmwarethinkagile_vx_2u4nthinkcentre_m70c_firmwarev530s-07icb_firmwarethinksystem_sr630_v2thinkagile_hx7820_firmwarev55t_gen_2_13acn_firmwarethinkpad_t14s_firmwarethinksystem_sn850_firmwarethinkstation_p340thinkagile_vx_4u_firmwareideacentre_5-14iob6_firmwarethinkstation_p318_firmwarethinkserver_ts560_firmwarethinkagile_vx2320_firmwarethinksystem_sr250_v2_firmwarelegion_t530-28icbthinkcentre_m90sthinkserver_rd450_firmwareideacentre_5-14are05_firmwareideacentre_510s-07icb_firmwarethinkserver_sr588_firmwarethinkpad_t15_firmwarethinksystem_sr670_v2_firmwarethinkcentre_m75s_gen_2thinksystem_sr670_v2thinkagile_mx3331-f_firmwarethinkagile_hx2320-e_firmwarethinkcentre_m625q_firmwarethinkagile_hx3331thinkagile_vx5520thinkserver_rd350g_firmwarethinkserver_sd350_firmwarethinkserver_ts150thinkpad_x1_carbon_8th_genthinkagile_hx2321_firmwarethinksystem_sr860_v2_firmwareqt_b415_firmwarethinkcentre_m910x_firmwarethinkcentre_m910s_firmwareyangtian_afq150_firmwareideacentre_g5-14imb05thinkcentre_m70a_gen_2_firmwarethinkagile_mx3530_f_firmwarethinksystem_st258_firmwarethinkagile_hx3376_firmwarethinkpad_p52_firmwarethinkagile_hx7821_firmwarethinkcentre_m90t_firmwarethinkagile_vx_2u4n_firmwarelegion_t530-28aprthinkcentre_m70q_gen_2thinkagile_hx2330_firmwarethinkagile_hx1321thinkagile_mx_certified_node_-_hybrid_firmwarethinksystem_sd650-n_v2_firmwarethinkstation_p318thinksystem_st558_firmwareideacentre_g5-14amr05_firmwarethinkcentre_m75n_firmwarethinkcentre_m6600t_firmwarethinkcentre_m8600s_firmwarethinkcentre_m715q_firmwarethinksmart_hub_teamsthinkagile_hx3520-gthinkpad_x1_extreme_1st_genthinkcentre_m75nthinksystem_sr860legion_t5-26iob6_firmwarethinkcentre_m710qthinkcentre_m60e_tinythinkcentre_m70t_gen_3_firmwarethinkcentre_m710e_firmwarev530-15icbthinkagile_hx5530_firmwarethinkcentre_e75sthinkserver_sd350legion_t5-28icb05_firmwarethinkpad_p15s_gen_2_firmwarethinksystem_sd650_v2thinkcentre_m70sthinksystem_sr650_v2thinkserver_rd350_firmwarev520_firmwarethinkpad_p1_gen_3_firmwarethinkagile_mx3321_h_firmwarelegion_t5-28icb05thinkagile_mx3530_fthinkagile_hx1520-rthinkcentre_m70athinksystem_sd630_v2thinkagile_vx_1se_firmwarethinkcentre_m6600qthinkagile_mx1021ideacentre_3-07ada05_firmwareyoga_a940-27icb_firmwarethinkagile_hx2331thinkagile_hx2320-ethinkagile_vx5530v50t-13iob_g2_firmwarethinkpad_t15_gen_2thinkserver_sr860p_firmwarethinkserver_rd550_firmwarethinkcentre_m70q_gen_3thinkagile_vx1320thinksystem_sr950_firmwarethinkcentre_m80t_firmwarethinkcentre_m90a_gen_2thinkpad_p53s_firmwarethinkagile_hx3376v540-24iwlthinkagile_vx3530-gthinksystem_sd650_dwc_dual_node_traythinkagile_mx3531-fthinkpad_l13_yoga_firmwarethinksystem_sr570_firmwarethinksystem_sr158thinkcentre_m90q_tiny_firmwareideacentre_g5-14imb05_firmwarethinkcentre_m6600tthinkpad_t590thinksystem_st250thinkpad_x1_carbon_9th_gen_firmwarethinksystem_sr850thinkpad_x1_carbon_8th_gen_firmwarethinkagile_hx7530_firmwarethinksmart_hub_500thinkagile_hx5520thinkagile_vx7530_firmwarethinkcentre_m630ethinkpad_r14_gen_2_firmwarev530-15arrthinkstation_p310_firmwarethinkserver_ts450thinkpad_x1_carbon_7th_gen_firmwarethinksystem_sr950thinkcentre_e96z_firmwarethinkpad_l390_yoga_firmwarethinkagile_vx7520_nthinksystem_sr860_firmwarethinksystem_sr650_v2_firmwarethinkagile_mx_certified_node_-_all_flash_firmwarethinkpad_t14_gen_2_firmwarethinkagile_hx3720thinkagile_mx3321_hthinksystem_sd530thinkcentre_m90tthinkcentre_m715qthinksystem_st650_v2thinksystem_sr258_v2thinkcentre_m70s_gen_3_firmwarethinkedge_se30_firmwarethinkagile_hx1021v530-15icrthinksystem_hr610xthinkagile_vx3330thinkagile_mx3330-h_firmwarethinkpad_x1_yoga_6th_gen_firmwarethinkagile_hx3331_firmwarethinkpad_p15s_gen_1_firmwarethinkpad_x1_extreme_2nd_genthinksystem_st250_firmwarev50a-24imbthinksystem_hr610x_firmwarethinkpad_x390_yoga_firmwarethinkpad_p15v_gen_1legion_t530-28apr_firmwarethinkpad_t590_firmwarethinkserver_ts550legion_c530-19icbthinkpad_l490_firmwarethinkcentre_m90a_firmwarethinkagile_hx1331thinkagile_hx2320thinkagile_hx7521thinksystem_sr550thinkcentre_m8600sthinkagile_vx3520-g_firmwarethinkserver_rd650thinkagile_mx3530-hthinkagile_vx_2u_firmwarethinkpad_x13_gen_2thinkserver_rs160thinksystem_st250_v2thinkagile_hx2321ideacentre_510s-07ickthinkagile_mx3330-f_firmwarethinkpad_l15_gen_2_firmwarethinksystem_dx8200d_firmwarethinkagile_hx1320thinkcentre_m710s_firmwarethinkagile_hx1321_firmwarethinkpad_l14_gen_2_firmwarethinkpad_e590thinkpad_t15p_gen_1_legion_t5-26iob6thinkagile_hx1320_firmwarethinksystem_sn550_v2thinkpad_s3_2nd_gen_firmwarethinkagile_hx3521-gthinkcentre_m90q_tinylegion_t7-34imz5_firmwarethinkcentre_m70t_firmwarethinkpad_t15v530-15icr_firmwarethinkpad_x1_extreme_3rd_genthinkserver_ts150_firmwarethinkstation_p620_firmwarethinksystem_st650_v2_firmwarethinkpad_p14s_gen_2_firmwareqt_m410thinkagile_vx2330ideacentre_a340-22igmthinkcentre_m820z_all-in-onethinkpad_p15s_gen_1thinksystem_st550thinkpad_t14s_gen_2thinksystem_hr650x_firmwarethinkserver_td350_firmwarethinksystem_st658_v2_firmwarev30a-24imlthinkserver_rd450thinkcentre_m80sthinksystem_sr250_v2thinkagile_mx3520_hthinkcentre_m630e_firmwarethinkagile_mx3530-h_firmwarethinksystem_st250_v2_firmwarev530-24icb_firmwareideacentre_gaming_5_17acn7thinkstation_p348thinksystem_sr650_firmwarethinkserver_rd650_firmwarethinkcentre_m710t_firmwarethinkpad_p43sqitian_a815thinkagile_hx7530thinksystem_sr530thinkcentre_m720e_firmwarethinkcentre_m80qthinkpad_l390_firmwarethinkpad_t14_gen_2thinkedge_se30thinkagile_mx3520_fn4610_storage_firmwareqt_b415thinkagile_hx7821thinkagile_hx5521_firmwarelegion_t7-34imz5v30a-24iml_firmwarethinkagile_hx1021_firmwarethinkcentre_m70cthinkpad_x13_gen_2_firmwarethinkagile_vx3331v520s_firmwarethinksystem_st258_v2thinkagile_vx7820_firmwarethinkagile_hx5520-c_firmwarethinkcentre_m75q_gen_2thinkcentre_m90athinkstation_p350_firmwarethinksystem_st58thinkpad_l390ideacentre_c5-14imb05thinkpad_t15_gen_2_firmwarethinkcentre_m70s_gen_3thinkagile_mx3331-hv50s-07imb_firmwarethinksystem_sn550_firmwarethinksystem_sr258_firmwaren4610_storagethinkcentre_m8600t_firmwarethinkpad_l14v30a-22iml_firmwarethinkagile_hx1521-rthinkserver_rd350gthinkagile_hx3320thinkserver_ts460thinkpad_p1_gen_1ideacentre_5-14imb05_firmwarethinkpad_t14_gen_1thinkagile_mx3331-fthinkagile_hx7531_firmwarethinksystem_sr670thinkpad_e14_firmwarethinksystem_sr590ideacentre_a340-22igm_firmwareideacentre_5-14acn6thinkagile_vx2330_firmwarethinkagile_vx3530-g_firmwareideacentre_3-07imb05ideacentre_gaming_5-14acn6_firmwarethinkcentre_m75t_gen_2ideacentre_creator_5-14iob6_firmwarethinkpad_p43s_firmwarethinkserver_sr860pthinkcentre_m70q_firmwarethinkpad_x13_yoga_gen_1thinkagile_mx3520_h_firmwarethinkpad_p17_gen_1thinkcentre_m720eideacentre_a340-24igmthinksystem_sr665_firmwarethinkserver_ts550_firmwarethinksystem_sd630_v2_firmwarethinkserver_rs260_firmwarethinkcentre_m70t_gen_3thinkagile_hx3521-g_firmwarethinkagile_mx3531_h_firmwarethinkcentre_e96zthinkcentre_m818z_firmwareideacentre_5_14iab7_firmwarethinkstation_p520thinksystem_sr158_firmwarethinkpad_x12_detachable_gen_1_firmwarethinkagile_vx_1u_firmwarethinkserver_sr590_firmwarethinkcentre_m710ev50t-13imbthinksystem_dn8836_firmwarethinkagile_vx5520_firmwarethinksystem_st550_firmwarethinkstation_p310v530-22icbthinkpad_x1_yoga_6th_genv330-20icb_firmwareideacentre_gaming_5_17acn7_firmwarethinkpad_e15_firmwarethinkagile_hx5520-cthinkpad_x390thinkstation_p620thinkcentre_m710tthinkstation_p350thinkpad_t15g_gen_1thinkserver_sr590legion_c530-19icb_firmwareqt_m415_firmwarethinkagile_mx3321_fthinkagile_hx3330_firmwarethinkpad_t490_firmwarethinkcentre_m70q_gen_2_firmwarestadia_ggp-120thinksystem_sd650-n_v2v50s-07imbthinkagile_hx3321_firmwarethinkstation_p340_firmwaren3310_storagethinkpad_l390_yogaideacentre_5-14acn6_firmwareideacentre_gaming_5-14acn6thinkcentre_m70tthinkcentre_m90a_gen_2_firmwarethinkpad_t15p_gen_1__firmwarethinkstation_p520c_firmwarethinkagile_mx3330-hthinkagile_vx7530thinkpad_x1_extreme_1st_gen_firmwarethinkpad_x13_firmwarethinksystem_se350_firmwarethinkserver_rs160_firmwarethinkagile_hx3721_firmwarethinksystem_dn8836thinksystem_sr850p_firmwarethinkcentre_m75t_gen_2_firmwarev50t-13iob_g2thinksystem_sr258_v2_firmwarethinkagile_hx3320_firmwarethinkpad_e490sideacentre_gaming_5-14iob6v520sthinkpad_x1_extreme_3rd_gen_firmwaren3310_storage_firmwarethinkpad_l13_yogathinkagile_mx3330-fthinksystem_sd650_dwc_dual_node_tray_firmwarethinksystem_st258_v2_firmwarethinkpad_x1_yoga_4th_genthinkpad_t15g_gen_1_firmwarethinkagile_vx7330_firmwarethinkagile_vx7531_firmwarethinksystem_sr850_firmwarethinkagile_vx3330_firmwarethinkcentre_m910q_firmwarethinkagile_hx7531thinkstation_p350_tinythinkagile_vx7531thinkpad_e15qt_m410_firmwarethinkcentre_m75s_gen_2_firmwarethinksystem_sr850_v2_firmwarethinksystem_st558ideacentre_a340-24igm_firmwareideacentre_510s-07icbthinksystem_st58_firmwarethinkagile_mx1021_firmwarethinkcentre_m710q_firmwarethinkpad_x390_yogathinkcentre_m818zthinkagile_hx7520thinkagile_hx3330qt_m415thinkcentre_m8600tv520thinkagile_mx3331-h_firmwarethinkagile_hx1331_firmwarethinkpad_p14s_gen_1thinkagile_hx3321thinkcentre_m910qthinksystem_sr250thinksystem_sr850_v2thinksystem_se350thinkagile_mx1020_firmwarethinkpad_p1_gen_3thinkpad_l14_gen_2thinksmart_hub_zoomthinkpad_x1_titanium_firmwarethinkagile_hx3720_firmwarethinkpad_t14s_gen_2_firmwareideacentre_3-07ada05thinkcentre_m6600sstadia_ggp-120_firmwarethinkcentre_m60e_tiny_firmwarethinkcentre_m70q_gen_3_firmwarethinkagile_vx_2uv35s-07ada_firmwarethinkcentre_m700qthinkpad_x12_detachable_gen_1thinkagile_mx_certified_node_-_all_flashthinkagile_hx5521-cthinkagile_vx_1uthinkpad_l490thinkagile_vx3720_firmwarethinkagile_hx1520-r_firmwarev530s-07icr_firmwarethinkagile_hx5531thinksystem_sr630_firmwarethinkpad_l590_firmwarethinksystem_sr550_firmwarethinkpad_e15_gen_2_firmwarev530s-07icrthinkpad_e15_gen_2thinkcentre_e75tthinkpad_l15v50t-13imb_firmwareideacentre_gaming_5_17iab7ideacentre_3-07imb05_firmwareqitian_a815_firmwareideacentre_g5-14amr05yta8900f_firmwarethinkpad_x1_titaniumthinksystem_sr645ideacentre_gaming_5-14iob6_firmwarethinkpad_x1_nano_gen_1_firmwarethinkcentre_m80s_firmwarethinkcentre_m910tthinkpad_p14s_gen_2thinksystem_sr630_v2_firmwarethinkpad_p15v_gen_1_firmwarethinkserver_ts250thinkcentre_e75t_firmwarethinkpad_p15_gen_1thinkagile_vx5530_firmwarethinksystem_sr258thinkagile_hx5521thinkagile_mx3531-f_firmwarev530-15arr_firmwarethinksmart_hub_teams_firmwarethinkcentre_m820z_all-in-one_firmwarethinksystem_sr645_firmwarethinksystem_sn550thinkagile_hx3375_firmwarethinkagile_hx3721thinkpad_e590_firmwarethinkcentre_m70s_firmwarethinkstation_p320_tinythinkagile_hx3520-g_firmwareideacentre_3_07iab7_firmwarethinkcentre_neo_50s_gen_3thinkpad_t490thinkcentre_m70qthinkpad_p73_firmwarethinkagile_mx_certified_node_-_hybridv35s-07adathinkagile_vx1320_firmwarethinkpad_x1_carbon_9th_genthinkcentre_m625qthinkpad_x1_carbon_7th_genthinksystem_sr630thinkcentre_neo_50s_gen_3_firmwarethinkagile_vx7320_nthinkpad_x390_firmwarethinksystem_st658_v2thinkagile_hx1521-r_firmwarethinkagile_hx7820thinkagile_vx2320ideacentre_5-14iob6thinkagile_hx7520_firmwarev50a-24imb_firmwarev530-15icb_firmwareideacentre_510s-07ick_firmwarelegion_t530-28icb_firmwarethinksystem_sr860_v2thinkpad_x13thinkpad_e14_gen_2thinkagile_hx7521_firmwarethinkcentre_m70a_firmwarethinkcentre_m700q_firmwarethinkagile_hx3375thinksystem_hr650xv530s-07icbthinkagile_hx2720-e_firmwarethinksystem_dx1100uv50a-22imbyangtian_afq150thinkpad_x13_yoga_gen_1_firmwarev530-22icb_firmwarethinkpad_l15_gen_2thinksmart_hub_500_firmwarethinksystem_sr570thinkcentre_m810z_all-in-one_firmwarethinkagile_vx7520ideacentre_creator_5-14iob6thinkcentre_m70a_gen_2thinkagile_vx_4uideacentre_5-14imb05thinkcentre_m80tthinksystem_st50thinkpad_p1_gen_2_firmwarethinkpad_l13_firmwarethinksystem_st258thinkcentre_m610thinksystem_sr850pthinkserver_td350thinkpad_x1_nano_gen_1thinkagile_hx2331_firmwarethinkpad_p15_gen_1_firmwarethinkstation_p340_tinythinkagile_vx3520-gthinkstation_p520_firmwarethinksystem_sr670_firmwarethinkcentre_m910xthinksystem_sr150thinkcentre_m80q_firmwarethinkagile_vx3720thinksystem_dx1100u_firmwarethinkcentre_m6600s_firmwarethinkcentre_m90s_firmwarethinkpad_p53sthinksystem_sd650_v2_firmwarethinkpad_x13_yoga_gen_2thinkcentre_m910sthinkpad_e14ideacentre_3_07iab7thinkagile_hx2720-ethinkcentre_m6600q_firmwarethinksystem_sn550_v2_firmwarethinkpad_x1_yoga_4th_gen_firmwarethinkserver_sr588thinkpad_l14_firmwarethinkpad_t490s_firmwarethinkagile_hx5520_firmwarethinkpad_p14s_gen_1_firmwareideacentre_5_14iab7thinkagile_mx1020thinkserver_ts250_firmwarethinksystem_sr665thinksystem_sr150_firmwarethinkagile_vx7320_n_firmwarethinkpad_e490s_firmwarethinkpad_p1_gen_2thinkpad_x13_yoga_gen_2_firmwarethinkserver_rs260thinksystem_st50_firmwarethinkpad_e490_firmwarethinkagile_mx3321_f_firmwarethinksystem_dx8200dthinksystem_hr630xthinkagile_mx3520_f_firmwarethinkpad_e14_gen_2_firmwarethinksystem_sd530_firmwarethinkpad_p17_gen_1_firmwarethinkagile_vx_1sethinkstation_p320_tiny_firmwarethinkpad_p53_firmwarev50a-22imb_firmwarethinkcentre_m90q_gen_2_firmwarethinkagile_hx5521-c_firmwarethinkagile_vx7330thinkpad_l15_firmwarev530-24icbv30a-22imlthinkserver_rd350thinkstation_p340_tiny_firmwarethinksystem_sr250_firmwarethinkcentre_e75s_firmwareideacentre_c5-14imb05_firmwareyoga_a940-27icbthinkcentre_m610_firmwarethinkserver_ts450_firmwarethinksmart_hub_zoom_firmwarethinkpad_l13thinkpad_t490sv540-24iwl_firmwarethinkagile_vx7520_n_firmwarethinkpad_p73thinkcentre_m75q_gen_2_firmwarethinkpad_x1_extreme_2nd_gen_firmwarethinkstation_p348_firmwarethinkpad_p72thinkcentre_m910t_firmwarethinkpad_s3_2nd_genthinkcentre_m710sthinkpad_t14_gen_1_firmwarethinkagile_vx3331_firmwarethinkagile_vx7520_firmwarethinkpad_p1_gen_1_firmwarethinkserver_ts460_firmwarethinkpad_x1_yoga_5th_gen_firmwarethinkpad_p15s_gen_2ideacentre_gaming_5_17iab7_firmwarethinkserver_ts560thinkagile_hx5531_firmwarethinkagile_mx3531_hthinksystem_sr650thinksystem_sr590_firmwarethinkstation_p520cthinkserver_rd550BIOS
CWE ID-CWE-125
Out-of-bounds Read
CVE-2024-23440
Matching Score-4
Assigner-Fluid Attacks
ShareView Details
Matching Score-4
Assigner-Fluid Attacks
CVSS Score-7.1||HIGH
EPSS-0.03% / 5.04%
||
7 Day CHG+0.01%
Published-13 Feb, 2024 | 15:01
Updated-19 May, 2025 | 19:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Vba32 Antivirus v3.36.0 - Arbitrary Memory Read

Vba32 Antivirus v3.36.0 is vulnerable to an Arbitrary Memory Read vulnerability. The 0x22200B IOCTL code of the Vba32m64.sys driver allows to read up to 0x802 of memory from ar arbitrary user-supplied pointer.

Action-Not Available
Vendor-anti-virusVirusBlokAda
Product-vba32Vba32 Antivirus
CWE ID-CWE-125
Out-of-bounds Read
CVE-2024-22251
Matching Score-4
Assigner-VMware by Broadcom
ShareView Details
Matching Score-4
Assigner-VMware by Broadcom
CVSS Score-5.9||MEDIUM
EPSS-0.06% / 18.93%
||
7 Day CHG~0.00%
Published-27 Feb, 2024 | 17:35
Updated-10 Jun, 2025 | 19:33
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Out-of-bounds read vulnerability

VMware Workstation and Fusion contain an out-of-bounds read vulnerability in the USB CCID (chip card interface device). A malicious actor with local administrative privileges on a virtual machine may trigger an out-of-bounds read leading to information disclosure.

Action-Not Available
Vendor-n/aApple Inc.VMware (Broadcom Inc.)
Product-fusionmacosworkstationVMware WorkstationVMware Fusion
CWE ID-CWE-125
Out-of-bounds Read
CVE-2022-32639
Matching Score-4
Assigner-MediaTek, Inc.
ShareView Details
Matching Score-4
Assigner-MediaTek, Inc.
CVSS Score-4.4||MEDIUM
EPSS-0.02% / 4.36%
||
7 Day CHG~0.00%
Published-03 Jan, 2023 | 00:00
Updated-10 Apr, 2025 | 16:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In watchdog, there is a possible out of bounds read due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07494487; Issue ID: ALPS07494487.

Action-Not Available
Vendor-Google LLCMediaTek Inc.
Product-mt8362amt8532mt8167sandroidmt6833mt8765mt6771mt6877mt6785mt8786mt6739mt8791mt8167mt8385mt6781mt8518smt6873mt6768mt6853MT6739, MT6768, MT6771, MT6781, MT6785, MT6833, MT6853, MT6873, MT6877, MT8167, MT8167S, MT8362A, MT8385, MT8518S, MT8532, MT8765, MT8786, MT8791
CWE ID-CWE-125
Out-of-bounds Read
CVE-2024-20124
Matching Score-4
Assigner-MediaTek, Inc.
ShareView Details
Matching Score-4
Assigner-MediaTek, Inc.
CVSS Score-4.4||MEDIUM
EPSS-0.01% / 0.74%
||
7 Day CHG~0.00%
Published-04 Nov, 2024 | 01:49
Updated-22 Apr, 2025 | 13:54
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In vdec, there is a possible out of bounds read due to improper structure design. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS09008925; Issue ID: MSV-1568.

Action-Not Available
Vendor-MediaTek Inc.Google LLC
Product-mt6765mt6768mt6785mt8789mt6761androidmt6779mt8768mt8766MT6761, MT6765, MT6768, MT6779, MT6785, MT8766, MT8768, MT8789mt8768mt8789androidmt6761mt8766mt6779mt6768mt6785mt6765
CWE ID-CWE-125
Out-of-bounds Read
CVE-2024-20084
Matching Score-4
Assigner-MediaTek, Inc.
ShareView Details
Matching Score-4
Assigner-MediaTek, Inc.
CVSS Score-4.4||MEDIUM
EPSS-0.01% / 1.16%
||
7 Day CHG~0.00%
Published-02 Sep, 2024 | 02:07
Updated-27 Oct, 2024 | 03:35
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In power, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08944210; Issue ID: MSV-1561.

Action-Not Available
Vendor-rdkcentralMediaTek Inc.Google LLCOpenWrtThe Linux Foundation
Product-mt6855mt6990mt6873mt6893mt8675mt6580mt6886mt8395mt6983mt8183mt6765mt6883mt8676mt8390openwrtmt6835mt6739mt6880mt6761mt6889mt6768rdk-bmt8678mt6985mt6890mt8188mt6833mt6885mt8673mt6989yoctomt6877mt6781mt8195mt6853mt6980mt6895mt6789androidmt6779mt6897mt6785mt6879MT6580, MT6739, MT6761, MT6765, MT6768, MT6779, MT6781, MT6785, MT6789, MT6833, MT6835, MT6853, MT6855, MT6873, MT6877, MT6879, MT6880, MT6883, MT6885, MT6886, MT6889, MT6890, MT6893, MT6895, MT6897, MT6980, MT6983, MT6985, MT6989, MT6990, MT8183, MT8188, MT8195, MT8390, MT8395, MT8673, MT8675, MT8676, MT8678
CWE ID-CWE-125
Out-of-bounds Read
CVE-2023-1380
Matching Score-4
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-4
Assigner-Red Hat, Inc.
CVSS Score-7.1||HIGH
EPSS-0.03% / 6.63%
||
7 Day CHG~0.00%
Published-27 Mar, 2023 | 00:00
Updated-02 Aug, 2024 | 05:49
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A slab-out-of-bound read problem was found in brcmf_get_assoc_ies in drivers/net/wireless/broadcom/brcm80211/brcmfmac/cfg80211.c in the Linux Kernel. This issue could occur when assoc_info->req_len data is bigger than the size of the buffer, defined as WL_EXTRA_BUF_MAX, leading to a denial of service.

Action-Not Available
Vendor-n/aCanonical Ltd.Red Hat, Inc.Linux Kernel Organization, IncNetApp, Inc.Debian GNU/Linux
Product-ubuntu_linuxdebian_linuxlinux_kernelh500sh410s_firmwareh700s_firmwareh500s_firmwareenterprise_linuxh410c_firmwareh300s_firmwareh410sh410ch300sh700sKernel
CWE ID-CWE-125
Out-of-bounds Read
CVE-2024-20116
Matching Score-4
Assigner-MediaTek, Inc.
ShareView Details
Matching Score-4
Assigner-MediaTek, Inc.
CVSS Score-4.4||MEDIUM
EPSS-0.01% / 1.22%
||
7 Day CHG-0.00%
Published-02 Dec, 2024 | 03:07
Updated-22 Apr, 2025 | 13:52
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In cmdq, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS09057438; Issue ID: MSV-1696.

Action-Not Available
Vendor-MediaTek Inc.Google LLC
Product-mt8771mt8798mt6768mt6785mt8789mt8765mt8786mt6779mt8768mt6781mt8795tmt6765mt8797androidmt8788mt8791tmt6789mt8781mt8766MT6765, MT6768, MT6779, MT6781, MT6785, MT6789, MT8765, MT8766, MT8768, MT8771, MT8781, MT8786, MT8788, MT8789, MT8791T, MT8795T, MT8797, MT8798mt8765mt8788mt8791tmt6781mt6765mt6789mt8798mt8768mt8789mt8781mt8797mt8795tmt6768mt6779mt6785mt8771mt8786mt8766
CWE ID-CWE-125
Out-of-bounds Read
  • Previous
  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • ...
  • 10
  • 11
  • Next
Details not found