Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
Vulnerability Details :

CVE-2024-50234

Summary
Assigner-Linux
Assigner Org ID-416baaa9-dc9f-4396-8d5f-8c081fb06d67
Published At-09 Nov, 2024 | 10:14
Updated At-04 May, 2025 | 09:49
Rejected At-
Credits

wifi: iwlegacy: Clear stale interrupts before resuming device

In the Linux kernel, the following vulnerability has been resolved: wifi: iwlegacy: Clear stale interrupts before resuming device iwl4965 fails upon resume from hibernation on my laptop. The reason seems to be a stale interrupt which isn't being cleared out before interrupts are enabled. We end up with a race beween the resume trying to bring things back up, and the restart work (queued form the interrupt handler) trying to bring things down. Eventually the whole thing blows up. Fix the problem by clearing out any stale interrupts before interrupts get enabled during resume. Here's a debug log of the indicent: [ 12.042589] ieee80211 phy0: il_isr ISR inta 0x00000080, enabled 0xaa00008b, fh 0x00000000 [ 12.042625] ieee80211 phy0: il4965_irq_tasklet inta 0x00000080, enabled 0x00000000, fh 0x00000000 [ 12.042651] iwl4965 0000:10:00.0: RF_KILL bit toggled to enable radio. [ 12.042653] iwl4965 0000:10:00.0: On demand firmware reload [ 12.042690] ieee80211 phy0: il4965_irq_tasklet End inta 0x00000000, enabled 0xaa00008b, fh 0x00000000, flags 0x00000282 [ 12.052207] ieee80211 phy0: il4965_mac_start enter [ 12.052212] ieee80211 phy0: il_prep_station Add STA to driver ID 31: ff:ff:ff:ff:ff:ff [ 12.052244] ieee80211 phy0: il4965_set_hw_ready hardware ready [ 12.052324] ieee80211 phy0: il_apm_init Init card's basic functions [ 12.052348] ieee80211 phy0: il_apm_init L1 Enabled; Disabling L0S [ 12.055727] ieee80211 phy0: il4965_load_bsm Begin load bsm [ 12.056140] ieee80211 phy0: il4965_verify_bsm Begin verify bsm [ 12.058642] ieee80211 phy0: il4965_verify_bsm BSM bootstrap uCode image OK [ 12.058721] ieee80211 phy0: il4965_load_bsm BSM write complete, poll 1 iterations [ 12.058734] ieee80211 phy0: __il4965_up iwl4965 is coming up [ 12.058737] ieee80211 phy0: il4965_mac_start Start UP work done. [ 12.058757] ieee80211 phy0: __il4965_down iwl4965 is going down [ 12.058761] ieee80211 phy0: il_scan_cancel_timeout Scan cancel timeout [ 12.058762] ieee80211 phy0: il_do_scan_abort Not performing scan to abort [ 12.058765] ieee80211 phy0: il_clear_ucode_stations Clearing ucode stations in driver [ 12.058767] ieee80211 phy0: il_clear_ucode_stations No active stations found to be cleared [ 12.058819] ieee80211 phy0: _il_apm_stop Stop card, put in low power state [ 12.058827] ieee80211 phy0: _il_apm_stop_master stop master [ 12.058864] ieee80211 phy0: il4965_clear_free_frames 0 frames on pre-allocated heap on clear. [ 12.058869] ieee80211 phy0: Hardware restart was requested [ 16.132299] iwl4965 0000:10:00.0: START_ALIVE timeout after 4000ms. [ 16.132303] ------------[ cut here ]------------ [ 16.132304] Hardware became unavailable upon resume. This could be a software issue prior to suspend or a hardware issue. [ 16.132338] WARNING: CPU: 0 PID: 181 at net/mac80211/util.c:1826 ieee80211_reconfig+0x8f/0x14b0 [mac80211] [ 16.132390] Modules linked in: ctr ccm sch_fq_codel xt_tcpudp xt_multiport xt_state iptable_filter iptable_nat nf_nat nf_conntrack nf_defrag_ipv4 ip_tables x_tables binfmt_misc joydev mousedev btusb btrtl btintel btbcm bluetooth ecdh_generic ecc iTCO_wdt i2c_dev iwl4965 iwlegacy coretemp snd_hda_codec_analog pcspkr psmouse mac80211 snd_hda_codec_generic libarc4 sdhci_pci cqhci sha256_generic sdhci libsha256 firewire_ohci snd_hda_intel snd_intel_dspcfg mmc_core snd_hda_codec snd_hwdep firewire_core led_class iosf_mbi snd_hda_core uhci_hcd lpc_ich crc_itu_t cfg80211 ehci_pci ehci_hcd snd_pcm usbcore mfd_core rfkill snd_timer snd usb_common soundcore video parport_pc parport intel_agp wmi intel_gtt backlight e1000e agpgart evdev [ 16.132456] CPU: 0 UID: 0 PID: 181 Comm: kworker/u8:6 Not tainted 6.11.0-cl+ #143 [ 16.132460] Hardware name: Hewlett-Packard HP Compaq 6910p/30BE, BIOS 68MCU Ver. F.19 07/06/2010 [ 16.132463] Workqueue: async async_run_entry_fn [ 16.132469] RIP: 0010:ieee80211_reconfig+0x8f/0x14b0 [mac80211] [ 16.132501] Code: da 02 00 0 ---truncated---

Vendors
-
Not available
Products
-
Metrics (CVSS)
VersionBase scoreBase severityVector
Weaknesses
Attack Patterns
Solution/Workaround
References
HyperlinkResource Type
EPSS History
Score
Latest Score
-
N/A
No data available for selected date range
Percentile
Latest Percentile
-
N/A
No data available for selected date range
Stakeholder-Specific Vulnerability Categorization (SSVC)
▼Common Vulnerabilities and Exposures (CVE)
cve.org
Assigner:Linux
Assigner Org ID:416baaa9-dc9f-4396-8d5f-8c081fb06d67
Published At:09 Nov, 2024 | 10:14
Updated At:04 May, 2025 | 09:49
Rejected At:
▼CVE Numbering Authority (CNA)
wifi: iwlegacy: Clear stale interrupts before resuming device

In the Linux kernel, the following vulnerability has been resolved: wifi: iwlegacy: Clear stale interrupts before resuming device iwl4965 fails upon resume from hibernation on my laptop. The reason seems to be a stale interrupt which isn't being cleared out before interrupts are enabled. We end up with a race beween the resume trying to bring things back up, and the restart work (queued form the interrupt handler) trying to bring things down. Eventually the whole thing blows up. Fix the problem by clearing out any stale interrupts before interrupts get enabled during resume. Here's a debug log of the indicent: [ 12.042589] ieee80211 phy0: il_isr ISR inta 0x00000080, enabled 0xaa00008b, fh 0x00000000 [ 12.042625] ieee80211 phy0: il4965_irq_tasklet inta 0x00000080, enabled 0x00000000, fh 0x00000000 [ 12.042651] iwl4965 0000:10:00.0: RF_KILL bit toggled to enable radio. [ 12.042653] iwl4965 0000:10:00.0: On demand firmware reload [ 12.042690] ieee80211 phy0: il4965_irq_tasklet End inta 0x00000000, enabled 0xaa00008b, fh 0x00000000, flags 0x00000282 [ 12.052207] ieee80211 phy0: il4965_mac_start enter [ 12.052212] ieee80211 phy0: il_prep_station Add STA to driver ID 31: ff:ff:ff:ff:ff:ff [ 12.052244] ieee80211 phy0: il4965_set_hw_ready hardware ready [ 12.052324] ieee80211 phy0: il_apm_init Init card's basic functions [ 12.052348] ieee80211 phy0: il_apm_init L1 Enabled; Disabling L0S [ 12.055727] ieee80211 phy0: il4965_load_bsm Begin load bsm [ 12.056140] ieee80211 phy0: il4965_verify_bsm Begin verify bsm [ 12.058642] ieee80211 phy0: il4965_verify_bsm BSM bootstrap uCode image OK [ 12.058721] ieee80211 phy0: il4965_load_bsm BSM write complete, poll 1 iterations [ 12.058734] ieee80211 phy0: __il4965_up iwl4965 is coming up [ 12.058737] ieee80211 phy0: il4965_mac_start Start UP work done. [ 12.058757] ieee80211 phy0: __il4965_down iwl4965 is going down [ 12.058761] ieee80211 phy0: il_scan_cancel_timeout Scan cancel timeout [ 12.058762] ieee80211 phy0: il_do_scan_abort Not performing scan to abort [ 12.058765] ieee80211 phy0: il_clear_ucode_stations Clearing ucode stations in driver [ 12.058767] ieee80211 phy0: il_clear_ucode_stations No active stations found to be cleared [ 12.058819] ieee80211 phy0: _il_apm_stop Stop card, put in low power state [ 12.058827] ieee80211 phy0: _il_apm_stop_master stop master [ 12.058864] ieee80211 phy0: il4965_clear_free_frames 0 frames on pre-allocated heap on clear. [ 12.058869] ieee80211 phy0: Hardware restart was requested [ 16.132299] iwl4965 0000:10:00.0: START_ALIVE timeout after 4000ms. [ 16.132303] ------------[ cut here ]------------ [ 16.132304] Hardware became unavailable upon resume. This could be a software issue prior to suspend or a hardware issue. [ 16.132338] WARNING: CPU: 0 PID: 181 at net/mac80211/util.c:1826 ieee80211_reconfig+0x8f/0x14b0 [mac80211] [ 16.132390] Modules linked in: ctr ccm sch_fq_codel xt_tcpudp xt_multiport xt_state iptable_filter iptable_nat nf_nat nf_conntrack nf_defrag_ipv4 ip_tables x_tables binfmt_misc joydev mousedev btusb btrtl btintel btbcm bluetooth ecdh_generic ecc iTCO_wdt i2c_dev iwl4965 iwlegacy coretemp snd_hda_codec_analog pcspkr psmouse mac80211 snd_hda_codec_generic libarc4 sdhci_pci cqhci sha256_generic sdhci libsha256 firewire_ohci snd_hda_intel snd_intel_dspcfg mmc_core snd_hda_codec snd_hwdep firewire_core led_class iosf_mbi snd_hda_core uhci_hcd lpc_ich crc_itu_t cfg80211 ehci_pci ehci_hcd snd_pcm usbcore mfd_core rfkill snd_timer snd usb_common soundcore video parport_pc parport intel_agp wmi intel_gtt backlight e1000e agpgart evdev [ 16.132456] CPU: 0 UID: 0 PID: 181 Comm: kworker/u8:6 Not tainted 6.11.0-cl+ #143 [ 16.132460] Hardware name: Hewlett-Packard HP Compaq 6910p/30BE, BIOS 68MCU Ver. F.19 07/06/2010 [ 16.132463] Workqueue: async async_run_entry_fn [ 16.132469] RIP: 0010:ieee80211_reconfig+0x8f/0x14b0 [mac80211] [ 16.132501] Code: da 02 00 0 ---truncated---

Affected Products
Vendor
Linux Kernel Organization, IncLinux
Product
Linux
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Program Files
  • drivers/net/wireless/intel/iwlegacy/common.c
Default Status
unaffected
Versions
Affected
  • From 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 before 271d282ecc15d7012e71ca82c89a6c0e13a063dd (git)
  • From 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 before 9d89941e51259c2b0b8e9c10c6f1f74200d7444f (git)
  • From 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 before d0231f43df473e2f80372d0ca150eb3619932ef9 (git)
  • From 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 before 8ac22fe1e2b104c37e4fecd97735f64bd6349ebc (git)
  • From 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 before 23f9cef17ee315777dbe88d5c11ff6166e4d0699 (git)
  • From 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 before cedf0f1db8d5f3524339c2c6e35a8505b0f1ab73 (git)
  • From 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 before 8af8294d369a871cdbcdbb4d13b87d2d6e490a1f (git)
  • From 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 before 07c90acb071b9954e1fecb1e4f4f13d12c544b34 (git)
Vendor
Linux Kernel Organization, IncLinux
Product
Linux
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Program Files
  • drivers/net/wireless/intel/iwlegacy/common.c
Default Status
affected
Versions
Unaffected
  • From 4.19.323 through 4.19.* (semver)
  • From 5.4.285 through 5.4.* (semver)
  • From 5.10.229 through 5.10.* (semver)
  • From 5.15.171 through 5.15.* (semver)
  • From 6.1.116 through 6.1.* (semver)
  • From 6.6.60 through 6.6.* (semver)
  • From 6.11.7 through 6.11.* (semver)
  • From 6.12 through * (original_commit_for_fix)
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://git.kernel.org/stable/c/271d282ecc15d7012e71ca82c89a6c0e13a063dd
N/A
https://git.kernel.org/stable/c/9d89941e51259c2b0b8e9c10c6f1f74200d7444f
N/A
https://git.kernel.org/stable/c/d0231f43df473e2f80372d0ca150eb3619932ef9
N/A
https://git.kernel.org/stable/c/8ac22fe1e2b104c37e4fecd97735f64bd6349ebc
N/A
https://git.kernel.org/stable/c/23f9cef17ee315777dbe88d5c11ff6166e4d0699
N/A
https://git.kernel.org/stable/c/cedf0f1db8d5f3524339c2c6e35a8505b0f1ab73
N/A
https://git.kernel.org/stable/c/8af8294d369a871cdbcdbb4d13b87d2d6e490a1f
N/A
https://git.kernel.org/stable/c/07c90acb071b9954e1fecb1e4f4f13d12c544b34
N/A
Hyperlink: https://git.kernel.org/stable/c/271d282ecc15d7012e71ca82c89a6c0e13a063dd
Resource: N/A
Hyperlink: https://git.kernel.org/stable/c/9d89941e51259c2b0b8e9c10c6f1f74200d7444f
Resource: N/A
Hyperlink: https://git.kernel.org/stable/c/d0231f43df473e2f80372d0ca150eb3619932ef9
Resource: N/A
Hyperlink: https://git.kernel.org/stable/c/8ac22fe1e2b104c37e4fecd97735f64bd6349ebc
Resource: N/A
Hyperlink: https://git.kernel.org/stable/c/23f9cef17ee315777dbe88d5c11ff6166e4d0699
Resource: N/A
Hyperlink: https://git.kernel.org/stable/c/cedf0f1db8d5f3524339c2c6e35a8505b0f1ab73
Resource: N/A
Hyperlink: https://git.kernel.org/stable/c/8af8294d369a871cdbcdbb4d13b87d2d6e490a1f
Resource: N/A
Hyperlink: https://git.kernel.org/stable/c/07c90acb071b9954e1fecb1e4f4f13d12c544b34
Resource: N/A
Information is not available yet
▼National Vulnerability Database (NVD)
nvd.nist.gov
Source:416baaa9-dc9f-4396-8d5f-8c081fb06d67
Published At:09 Nov, 2024 | 11:15
Updated At:14 Nov, 2024 | 02:25

In the Linux kernel, the following vulnerability has been resolved: wifi: iwlegacy: Clear stale interrupts before resuming device iwl4965 fails upon resume from hibernation on my laptop. The reason seems to be a stale interrupt which isn't being cleared out before interrupts are enabled. We end up with a race beween the resume trying to bring things back up, and the restart work (queued form the interrupt handler) trying to bring things down. Eventually the whole thing blows up. Fix the problem by clearing out any stale interrupts before interrupts get enabled during resume. Here's a debug log of the indicent: [ 12.042589] ieee80211 phy0: il_isr ISR inta 0x00000080, enabled 0xaa00008b, fh 0x00000000 [ 12.042625] ieee80211 phy0: il4965_irq_tasklet inta 0x00000080, enabled 0x00000000, fh 0x00000000 [ 12.042651] iwl4965 0000:10:00.0: RF_KILL bit toggled to enable radio. [ 12.042653] iwl4965 0000:10:00.0: On demand firmware reload [ 12.042690] ieee80211 phy0: il4965_irq_tasklet End inta 0x00000000, enabled 0xaa00008b, fh 0x00000000, flags 0x00000282 [ 12.052207] ieee80211 phy0: il4965_mac_start enter [ 12.052212] ieee80211 phy0: il_prep_station Add STA to driver ID 31: ff:ff:ff:ff:ff:ff [ 12.052244] ieee80211 phy0: il4965_set_hw_ready hardware ready [ 12.052324] ieee80211 phy0: il_apm_init Init card's basic functions [ 12.052348] ieee80211 phy0: il_apm_init L1 Enabled; Disabling L0S [ 12.055727] ieee80211 phy0: il4965_load_bsm Begin load bsm [ 12.056140] ieee80211 phy0: il4965_verify_bsm Begin verify bsm [ 12.058642] ieee80211 phy0: il4965_verify_bsm BSM bootstrap uCode image OK [ 12.058721] ieee80211 phy0: il4965_load_bsm BSM write complete, poll 1 iterations [ 12.058734] ieee80211 phy0: __il4965_up iwl4965 is coming up [ 12.058737] ieee80211 phy0: il4965_mac_start Start UP work done. [ 12.058757] ieee80211 phy0: __il4965_down iwl4965 is going down [ 12.058761] ieee80211 phy0: il_scan_cancel_timeout Scan cancel timeout [ 12.058762] ieee80211 phy0: il_do_scan_abort Not performing scan to abort [ 12.058765] ieee80211 phy0: il_clear_ucode_stations Clearing ucode stations in driver [ 12.058767] ieee80211 phy0: il_clear_ucode_stations No active stations found to be cleared [ 12.058819] ieee80211 phy0: _il_apm_stop Stop card, put in low power state [ 12.058827] ieee80211 phy0: _il_apm_stop_master stop master [ 12.058864] ieee80211 phy0: il4965_clear_free_frames 0 frames on pre-allocated heap on clear. [ 12.058869] ieee80211 phy0: Hardware restart was requested [ 16.132299] iwl4965 0000:10:00.0: START_ALIVE timeout after 4000ms. [ 16.132303] ------------[ cut here ]------------ [ 16.132304] Hardware became unavailable upon resume. This could be a software issue prior to suspend or a hardware issue. [ 16.132338] WARNING: CPU: 0 PID: 181 at net/mac80211/util.c:1826 ieee80211_reconfig+0x8f/0x14b0 [mac80211] [ 16.132390] Modules linked in: ctr ccm sch_fq_codel xt_tcpudp xt_multiport xt_state iptable_filter iptable_nat nf_nat nf_conntrack nf_defrag_ipv4 ip_tables x_tables binfmt_misc joydev mousedev btusb btrtl btintel btbcm bluetooth ecdh_generic ecc iTCO_wdt i2c_dev iwl4965 iwlegacy coretemp snd_hda_codec_analog pcspkr psmouse mac80211 snd_hda_codec_generic libarc4 sdhci_pci cqhci sha256_generic sdhci libsha256 firewire_ohci snd_hda_intel snd_intel_dspcfg mmc_core snd_hda_codec snd_hwdep firewire_core led_class iosf_mbi snd_hda_core uhci_hcd lpc_ich crc_itu_t cfg80211 ehci_pci ehci_hcd snd_pcm usbcore mfd_core rfkill snd_timer snd usb_common soundcore video parport_pc parport intel_agp wmi intel_gtt backlight e1000e agpgart evdev [ 16.132456] CPU: 0 UID: 0 PID: 181 Comm: kworker/u8:6 Not tainted 6.11.0-cl+ #143 [ 16.132460] Hardware name: Hewlett-Packard HP Compaq 6910p/30BE, BIOS 68MCU Ver. F.19 07/06/2010 [ 16.132463] Workqueue: async async_run_entry_fn [ 16.132469] RIP: 0010:ieee80211_reconfig+0x8f/0x14b0 [mac80211] [ 16.132501] Code: da 02 00 0 ---truncated---

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Date Added: N/A
Due Date: N/A
Vulnerability Name: N/A
Required Action: N/A
Metrics
TypeVersionBase scoreBase severityVector
Primary3.17.0HIGH
CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
Type: Primary
Version: 3.1
Base score: 7.0
Base severity: HIGH
Vector:
CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
CPE Matches

Linux Kernel Organization, Inc
linux
>>linux_kernel>>Versions before 4.19.323(exclusive)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
Linux Kernel Organization, Inc
linux
>>linux_kernel>>Versions from 4.20(inclusive) to 5.4.285(exclusive)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
Linux Kernel Organization, Inc
linux
>>linux_kernel>>Versions from 5.5(inclusive) to 5.10.229(exclusive)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
Linux Kernel Organization, Inc
linux
>>linux_kernel>>Versions from 5.11(inclusive) to 5.15.171(exclusive)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
Linux Kernel Organization, Inc
linux
>>linux_kernel>>Versions from 5.16(inclusive) to 6.1.116(exclusive)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
Linux Kernel Organization, Inc
linux
>>linux_kernel>>Versions from 6.2(inclusive) to 6.6.60(exclusive)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
Linux Kernel Organization, Inc
linux
>>linux_kernel>>Versions from 6.7(inclusive) to 6.11.7(exclusive)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
Linux Kernel Organization, Inc
linux
>>linux_kernel>>6.12
cpe:2.3:o:linux:linux_kernel:6.12:rc1:*:*:*:*:*:*
Linux Kernel Organization, Inc
linux
>>linux_kernel>>6.12
cpe:2.3:o:linux:linux_kernel:6.12:rc2:*:*:*:*:*:*
Linux Kernel Organization, Inc
linux
>>linux_kernel>>6.12
cpe:2.3:o:linux:linux_kernel:6.12:rc3:*:*:*:*:*:*
Linux Kernel Organization, Inc
linux
>>linux_kernel>>6.12
cpe:2.3:o:linux:linux_kernel:6.12:rc4:*:*:*:*:*:*
Linux Kernel Organization, Inc
linux
>>linux_kernel>>6.12
cpe:2.3:o:linux:linux_kernel:6.12:rc5:*:*:*:*:*:*
Weaknesses
CWE IDTypeSource
CWE-367Primarynvd@nist.gov
CWE ID: CWE-367
Type: Primary
Source: nvd@nist.gov
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
https://git.kernel.org/stable/c/07c90acb071b9954e1fecb1e4f4f13d12c544b34416baaa9-dc9f-4396-8d5f-8c081fb06d67
Patch
https://git.kernel.org/stable/c/23f9cef17ee315777dbe88d5c11ff6166e4d0699416baaa9-dc9f-4396-8d5f-8c081fb06d67
Patch
https://git.kernel.org/stable/c/271d282ecc15d7012e71ca82c89a6c0e13a063dd416baaa9-dc9f-4396-8d5f-8c081fb06d67
Patch
https://git.kernel.org/stable/c/8ac22fe1e2b104c37e4fecd97735f64bd6349ebc416baaa9-dc9f-4396-8d5f-8c081fb06d67
Patch
https://git.kernel.org/stable/c/8af8294d369a871cdbcdbb4d13b87d2d6e490a1f416baaa9-dc9f-4396-8d5f-8c081fb06d67
Patch
https://git.kernel.org/stable/c/9d89941e51259c2b0b8e9c10c6f1f74200d7444f416baaa9-dc9f-4396-8d5f-8c081fb06d67
Patch
https://git.kernel.org/stable/c/cedf0f1db8d5f3524339c2c6e35a8505b0f1ab73416baaa9-dc9f-4396-8d5f-8c081fb06d67
Patch
https://git.kernel.org/stable/c/d0231f43df473e2f80372d0ca150eb3619932ef9416baaa9-dc9f-4396-8d5f-8c081fb06d67
Patch
Hyperlink: https://git.kernel.org/stable/c/07c90acb071b9954e1fecb1e4f4f13d12c544b34
Source: 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Resource:
Patch
Hyperlink: https://git.kernel.org/stable/c/23f9cef17ee315777dbe88d5c11ff6166e4d0699
Source: 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Resource:
Patch
Hyperlink: https://git.kernel.org/stable/c/271d282ecc15d7012e71ca82c89a6c0e13a063dd
Source: 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Resource:
Patch
Hyperlink: https://git.kernel.org/stable/c/8ac22fe1e2b104c37e4fecd97735f64bd6349ebc
Source: 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Resource:
Patch
Hyperlink: https://git.kernel.org/stable/c/8af8294d369a871cdbcdbb4d13b87d2d6e490a1f
Source: 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Resource:
Patch
Hyperlink: https://git.kernel.org/stable/c/9d89941e51259c2b0b8e9c10c6f1f74200d7444f
Source: 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Resource:
Patch
Hyperlink: https://git.kernel.org/stable/c/cedf0f1db8d5f3524339c2c6e35a8505b0f1ab73
Source: 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Resource:
Patch
Hyperlink: https://git.kernel.org/stable/c/d0231f43df473e2f80372d0ca150eb3619932ef9
Source: 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Resource:
Patch

Change History

0
Information is not available yet

Similar CVEs

298Records found

CVE-2020-3957
Matching Score-4
Assigner-VMware by Broadcom
ShareView Details
Matching Score-4
Assigner-VMware by Broadcom
CVSS Score-7||HIGH
EPSS-0.06% / 19.95%
||
7 Day CHG~0.00%
Published-29 May, 2020 | 19:37
Updated-04 Aug, 2024 | 07:52
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

VMware Fusion (11.x before 11.5.5), VMware Remote Console for Mac (11.x and prior) and VMware Horizon Client for Mac (5.x and prior) contain a local privilege escalation vulnerability due to a Time-of-check Time-of-use (TOCTOU) issue in the service opener. Successful exploitation of this issue may allow attackers with normal user privileges to escalate their privileges to root on the system where Fusion, VMRC and Horizon Client are installed.

Action-Not Available
Vendor-Apple Inc.VMware (Broadcom Inc.)
Product-remote_consolefusionmacoshorizon_clientVMware Remote Console for MacVMware Horizon Client for MacVMware Fusion
CWE ID-CWE-367
Time-of-check Time-of-use (TOCTOU) Race Condition
CVE-2020-3619
Matching Score-4
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-4
Assigner-Qualcomm, Inc.
CVSS Score-7||HIGH
EPSS-0.03% / 6.37%
||
7 Day CHG~0.00%
Published-08 Sep, 2020 | 09:31
Updated-04 Aug, 2024 | 07:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

u'Non-secure memory is touched multiple times during TrustZone\u2019s execution and can lead to privilege escalation or memory corruption' in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wired Infrastructure and Networking in APQ8009, APQ8017, APQ8053, APQ8098, IPQ8074, Kamorta, MDM9150, MDM9206, MDM9607, MDM9650, MSM8905, MSM8909, MSM8917, MSM8920, MSM8937, MSM8940, MSM8953, MSM8998, QCA8081, QCS404, QCS605, QCS610, QM215, Rennell, SA415M, SC7180, SDA660, SDA845, SDM429, SDM439, SDM450, SDM630, SDM632, SDM636, SDM660, SDM670, SDM710, SDM845, SDM850, SDX24, SM6150, SM7150, SM8150, SXR1130

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-mdm9150_firmwarekamorta_firmwareqcs610sdm632_firmwaresdm845sdm450_firmwaresdm632sdx24sdm439qcs404_firmwaremdm9650sdm429msm8940_firmwaresm7150_firmwaresm6150sm7150apq8009_firmwaremsm8917sdm670qcs605_firmwaremdm9206sdm670_firmwareqcs404sdx24_firmwareipq8074sdm636sda845_firmwaresa415mapq8098mdm9206_firmwareqcs605msm8937_firmwaremdm9650_firmwaresdm429_firmwaremsm8905_firmwaresda660sxr1130_firmwareqca8081_firmwaresxr1130apq8009msm8909_firmwareapq8053_firmwaresda845sdm850_firmwaremsm8920msm8953sdm450sdm636_firmwareapq8098_firmwaremsm8998_firmwaresdm660msm8920_firmwaresdm630mdm9607_firmwaresa415m_firmwareipq8074_firmwaresdm710qm215sc7180_firmwaremdm9607apq8017_firmwaresdm710_firmwareqca8081qcs610_firmwaremsm8937mdm9150msm8905sm8150_firmwaremsm8909sdm439_firmwarerennellsc7180sdm630_firmwaresda660_firmwarerennell_firmwareqm215_firmwaremsm8953_firmwaremsm8940sm6150_firmwareapq8053msm8917_firmwaremsm8998sm8150sdm850kamortaapq8017sdm660_firmwaresdm845_firmwareSnapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wired Infrastructure and Networking
CWE ID-CWE-787
Out-of-bounds Write
CWE ID-CWE-367
Time-of-check Time-of-use (TOCTOU) Race Condition
CVE-2022-31640
Matching Score-4
Assigner-HP Inc.
ShareView Details
Matching Score-4
Assigner-HP Inc.
CVSS Score-7||HIGH
EPSS-0.10% / 29.00%
||
7 Day CHG~0.00%
Published-14 Jun, 2023 | 16:30
Updated-30 Dec, 2024 | 16:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Potential vulnerabilities have been identified in the system BIOS of certain HP PC products, which might allow arbitrary code execution, escalation of privilege, denial of service, and information disclosure.

Action-Not Available
Vendor-HP Inc.
Product-probook_640_g3zbook_studio_g5_firmwareelitedesk_800_g3elitebook_725_g4elitebook_845_g8eliteone_800_g3_healthcare_edition_firmwarezbook_17_g4_firmwareprobook_640_g7z2_tower_g4engage_flex_pro-c_retail_systemzhan_66_pro_14_g2probook_630_g8_firmwareelitebook_x360_830_g5_firmwareelitebook_x360_830_g5elitedesk_805_g6prodesk_400_g5_firmwarez240_towerelite_x2_1013_g3pro_x360_fortis_g10engage_flex_pro-c_retail_system_firmwareprodesk_480_g6elitedesk_800_g4_firmwareproone_440_g9eliteone_800_g3_healthcare_editionprodesk_400_g4probook_445_g6z2_tower_g9pro_tower_400_g9_firmwareelitebook_840_g7_firmwareprobook_445_g7zbook_17_g6eliteone_840_g9_firmwareprobook_650_g8_firmwareeliteone_800_g4zbook_studio_g9elitebook_630_g9_firmwarezbook_fury_17_g7_firmwareprobook_645_g4_firmwarezhan_66_pro_14_g3elitebook_836_g6probook_440_g4zbook_17_g6_firmwareproone_400_g4_firmwarez2_mini_g3elitebook_850_g5_firmwareprodesk_600_g3elitebook_x360_1020_g2elite_tower_600_g9_firmwareelite_slice_g2_firmwareelitebook_x360_1030_g7_firmwarezbook_17_g4elite_tower_880_g9_firmwarezbook_fury_15_g7mt32elitebook_840_g4elitedesk_880_g8zhan_66_pro_15_g3zbook_power_g9mt22_firmwarez2_mini_g5_firmwareelite_x360_830_g9_firmwareelitebook_x360_1040_g8_firmwareproone_480_g3elitedesk_880_g4_firmwareelitedesk_880_g6elitebook_865_g9elitebook_846_g5_healthcare_edition_firmwareelitebook_848_g4probook_455_g4probook_x360_11_g6_eeelitebook_820_g4_firmwareelitebook_840_g5_firmwarepro_tower_480_g9z2_small_form_factor_g8_firmwareproone_440_g4eliteone_800_g6elitebook_835_g8z2_small_form_factor_g9_firmwareprodesk_480_g4prodesk_400_g6elitebook_x360_1030_g8probook_640_g5eliteone_840_g9elitedesk_800_g8elitebook_755_g4elitedesk_805_g8prodesk_600_g5probook_x360_11_g4_ee_firmwareprodesk_400_g4_firmwarez2_small_form_factor_g5zbook_firefly_g9elitebook_830_g6elite_dragonfly_g2z2_mini_g9_firmwareprobook_430_g6_firmwareprobook_650_g5_firmwarepro_mt440_g3_firmwareprobook_x360_435_g7_firmwareprobook_x360_11_g6_ee_firmwareelite_x2_1012_g2_firmwarez2_tower_g9_firmwareproone_400_g6_firmwareelitebook_x360_830_g7probook_445_g7_firmwareelitebook_x360_1040_g8probook_450_g5probook_450_g6_firmwareprodesk_680_g3_firmwareprobook_455_g5probook_430_g5_firmwareelitebook_836_g5_firmwarezbook_17_g5probook_650_g7_firmwarezhan_66_pro_15_g3_firmwareprobook_440_g7elite_tower_880_g9prodesk_480_g4_firmwareengage_one_all-in-one_systemelitebook_846r_g4probook_430_g4probook_470_g4eliteone_800_g4_healthcare_edition_firmwareelitebook_x360_1030_g2elitedesk_800_g4elitebook_865_g9_firmwarepro_x2_612_g2elite_tower_600_g9elitebook_830_g8_firmwarez240_small_form_factor_firmwareprodesk_480_g5_firmwareeliteone_1000_g2_firmwarepro_tower_400_g9elitebook_845_g9zbook_firefly_14_g7mp9_g4_retail_systemeliteone_800_g5probook_445_g8elitebook_855_g7_firmwareprobook_470_g5_firmwareelitebook_x360_830_g8elitebook_860_g9_firmwareelitedesk_800_g8_firmwareprobook_455_g7elite_tower_800_g9_firmwareelitebook_x360_830_g6probook_635_aero_g8_firmwareelitebook_835_g9_firmwarepro_sff_400_g9probook_445_g6_firmwareprobook_445_g9elitebook_645_g9_firmwareproone_440_g5_firmwarezbook_studio_g7elitebook_835_g8_firmwareelitedesk_800_g6proone_480_g3_firmwareelitebook_846_g5_healthcare_editionzbook_fury_15_g7_firmwarezbook_power_g8_firmwareproone_600_g3_firmwarezbook_14u_g5_firmwareprobook_640_g8_firmwaremt45_firmwareproone_440_g6z1_g9_towerz2_mini_g3_firmwareelitedesk_880_g3elite_mini_600_g9elitebook_845_g7_firmwarezhan_66_pro_a_14_g5elitebook_1040_g4probook_x360_11_g3_eeelitebook_735_g5elitebook_1040_g9_firmwareelitebook_735_g5_firmwareelitebook_846_g5_firmwarez1_entry_tower_g5_firmwareeliteone_1000_g2z2_mini_g5zbook_fury_17_g7elite_mini_800_g9elitedesk_880_g5_firmwareprodesk_480_g7_pci_firmwareprobook_fortis_g10elitebook_835_g7elite_x2_g8_zbook_fury_g8_firmwarezbook_14u_g6proone_600_g3elitebook_755_g5zbook_15u_g6_firmwarezbook_15_g4eliteone_800_g8_firmwaremt44_firmwareprobook_440_g8prodesk_480_g5mini_conferencing_firmwareelitebook_735_g6z2_mini_g4_firmwareprobook_455_g9probook_640_g5_firmwareprobook_440_g6probook_450_g6z1_g8_towerprodesk_680_g3probook_630_g8probook_650_g8probook_650_g4_firmwareprobook_450_g9zhan_x_13_g2zbook_studio_g5z2_mini_g4elitebook_860_g9eliteone_870_g9prodesk_405_g6_firmwareprobook_430_g8prodesk_405_g8_firmwareelitebook_x360_1040_g7elitebook_830_g9elite_x2_g4zbook_15_g5probook_455_g8elitebook_830_g8elitebook_840_g9_firmwarezhan_66_pro_a_14_g4elite_x2_g8__firmwareelitebook_x360_830_g8_firmwarezhan_66_pro_a_14_g3_firmwareprobook_445_g8_firmwarezhan_66_pro_14_g4elite_dragonfly_g3z2_small_form_factor_g4eliteone_800_g5_firmwareprobook_455_g5_firmwareengage_one_pro_aio_systemz240_small_form_factorproone_600_g4_firmwareelitebook_830_g7elitebook_640_g9mt31probook_455_g6_firmwareprobook_450_g4mt32_firmwareprobook_440_g6_firmwareelitebook_850_g4elitebook_x360_830_g6_firmwareelitebook_830_g6_firmwareelite_tower_680_g9zhan_66_pro_g1_firmwareelite_x2_g4_firmwarezhan_66_pro_13_g2_firmwareelitebook_x360_830_g7_firmwareengage_go_10_mobile_system_firmwareelite_dragonfly_g3_firmwareelite_dragonfly_g2_firmwareprobook_x360_11_g7_eemt43_firmwareelitebook_x360_1030_g3_firmwareelite_x360_1040_g9_firmwareelite_mini_800_g9_firmwareelitebook_645_g9proone_400_g4elitebook_840_g6_healthcare_editionelite_sff_600_g9prodesk_600_g4zhan_66_pro_15_g2_firmwarezhan_66_pro_14_g4_firmwarezbook_firefly_15_g7mt31_firmwarez2_tower_g4_firmwarezbook_studio_g4eliteone_800_g8z1_entry_tower_g5z238_microtower_firmwareeliteone_800_g5_healthcare_editionzbook_power_g9_firmwaremt43probook_440_g4_firmwareelitebook_845_g8_firmwareprobook_640_g8elitebook_830_g9_firmwarezhan_66_pro_g1rp9_g1_retail_system_firmwareelitebook_840_g7elitebook_1050_g1elitebook_850_g5prodesk_400_g7zbook_power_g7proone_600_g4elite_x360_830_g9eliteone_800_g4_healthcare_editionelite_mini_600_g9_firmwarez238_microtowerelitedesk_880_g6_firmwareelitebook_630_g9elitedesk_705_g4elitebook_x360_1040_g6_firmwarezbook_firefly_g9_firmwareelitebook_x360_1030_g4_firmwareprobook_x360_11_g3_ee_firmwarezhan_66_pro_14_g3_firmwareproone_400_g3probook_430_g4_firmwarezhan_66_pro_a_14_g3zbook_power_g8probook_440_g8_firmwareelitebook_x360_1020_g2_firmwarezbook_15_g6_firmwareelite_sff_800_g9zbook_fury_16_g9zbook_create_g7_firmwareproone_440_g6_firmwareprobook_fortis_g10_firmwareelitebook_840_g5elitebook_850_g4_firmwareprobook_440_g5mt21_firmwareproone_440_g9_firmwarezhan_66_pro_a_14_g4_firmwarezhan_66_pro_g3elitebook_1050_g1_firmwareelitebook_755_g5_firmwareprobook_640_g4probook_455_g9_firmwareprobook_445r_g6_firmwarezhan_66_pro_g3_firmwareproone_400_g5_firmwareprobook_455_g4_firmwarez2_tower_g5z2_tower_g8_firmwaremt46elitedesk_800_g3_firmwareprodesk_600_g6_firmwareproone_600_g6zhan_66_pro_13_g2elite_dragonflyzbook_firefly_g8probook_440_g5_firmwarez2_small_form_factor_g5_firmwareelite_dragonfly_maxzbook_14u_g6_firmwareprobook_445r_g6zbook_15_g6z1_entry_tower_g6elitebook_835_g7_firmwareelitebook_745_g5_firmwareelitebook_850_g6_firmwareelitebook_820_g4z2_tower_g8eliteone_1000_g1eliteone_800_g3_firmwareprobook_430_g8_firmwareelitedesk_880_g4elitedesk_880_g5probook_fortis_g9_firmwareprobook_635_aero_g7eliteone_800_g6_firmwareprobook_470_g5prodesk_400_g3z1_g9_tower_firmwareelitebook_840_g8probook_640_g4_firmwareelitebook_846_g5zbook_fury_g8zbook_studio_g4_firmwareelitebook_828_g4probook_455r_g6_firmwareprodesk_405_g4proone_400_g3_firmwareengage_go_mobile_systemelitebook_755_g4_firmwarezbook_17_g5_firmwareelitebook_830_g5elitedesk_880_g8_firmwareeliteone_800_g4_firmwareelitebook_640_g9_firmwareelitebook_x360_1040_g6proone_600_g6_firmwareelitebook_840_g6_firmwarezhan_66_pro_15_g2prodesk_680_g4_firmwareprodesk_600_g5_firmwareelitebook_735_g6_firmwarez240_tower_firmwareprodesk_480_g7_pcizbook_firefly_14_g7_firmwareelitebook_745_g5mini_conferencingprobook_440_g9probook_x360_11_g2_ee_firmwarepro_x360_fortis_g9_firmwareelitebook_855_g8elitebook_745_g6_firmwareprobook_470_g4_firmwareelite_sff_800_g9_firmwareeliteone_800_g3elitebook_836_g6_firmwareelitebook_x360_1030_g7probook_x360_11_g5_eeeliteone_870_g9_firmwareprobook_440_g9_firmwareelitebook_x360_1040_g7_firmwareprobook_x360_440_g1z1_entry_tower_g6_firmwarez2_small_form_factor_g8elite_tower_800_g9elitebook_x360_1040_g5elitebook_850_g8elitebook_835_g9elite_sff_600_g9_firmwarerp9_g1_retail_systemelitebook_x360_1030_g4zbook_15_g4_firmwareprobook_x360_440_g1_firmwareprodesk_405_g6elitebook_846r_g4_firmwarezbook_15_g5_firmwareproone_440_g5elitebook_840_g5_healthcare_edition_firmwareprobook_455_g8_firmwareprobook_x360_435_g8elitebook_840_g4_firmwareelitedesk_705_g4_firmwareproone_400_g5elitebook_840_g6_healthcare_edition_firmwareprodesk_680_g6_pci_firmwareprobook_655_g3probook_640_g7_firmwareprodesk_600_g4_firmwareelitebook_840_g6engage_flex_mini_retail_system_firmwareprobook_455_g6elitebook_850_g8_firmwareprobook_x360_11_g4_eeprodesk_400_g6_firmwarezbook_studio_g9_firmwareelitedesk_800_g5prodesk_405_g4_firmwaremt44probook_640_g3_firmwareprobook_450_g8pro_x2_612_g2_firmwareelitebook_745_g4_firmwarezbook_studio_g8_firmwareelitebook_840_aero_g8_firmwareelite_x2_1012_g2probook_450_g9_firmwareprobook_445_g9_firmwareelitebook_840_g9zbook_studio_x360_g5zbook_15u_g6zbook_studio_x360_g5_firmwareengage_go_10_mobile_systemzbook_x2_g4_firmwaremt21probook_650_g3pro_x360_fortis_g10_firmwareelite_dragonfly_max_firmwareprobook_x360_435_g8_firmwarezbook_studio_g7_firmwarezbook_firefly_15_g7_firmwareelitedesk_705_g5eliteone_800_g5_healthcare_edition_firmwareelite_x360_1040_g9engage_one_pro_aio_system_firmwarezbook_15u_g5elitedesk_805_g6_firmwareelitebook_840_g5_healthcare_editionelitebook_855_g8_firmwareelite_x2_1013_g3_firmwareprobook_x360_435_g7z2_small_form_factor_g4_firmwareelitebook_828_g4_firmwareelitebook_830_g7_firmwarepro_x360_fortis_g9z2_mini_g9elitebook_850_g6probook_450_g7engage_go_mobile_system_firmwareengage_one_all-in-one_system_firmwareelitebook_848_g4_firmwarezhan_66_pro_a_14_g5_firmwareelitedesk_800_g6_firmwareprobook_450_g7_firmwareelitebook_745_g4pro_mini_400_g9elitebook_725_g4_firmwareelite_tower_680_g9_firmwareprobook_650_g4zbook_fury_16_g9_firmwareprobook_650_g5zbook_create_g7prodesk_400_g3_firmwarezhan_66_pro_14_g2_firmwareeliteone_1000_g1_firmwareproone_440_g4_firmwareelitebook_745_g6elitebook_650_g9_firmwareprobook_430_g6engage_flex_pro_retail_system_firmwareelitebook_1040_g9elitebook_x360_1030_g3proone_600_g5_firmwarezhan_66_pro_g5_firmwarez1_all-in-one_g3_firmwareelitedesk_800_g5_firmwareprodesk_600_g6zhan_x_13_g2_firmwarepro_mini_400_g9_firmwareprobook_455r_g6elitedesk_705_g5_firmwareprobook_430_g7elitebook_650_g9prodesk_600_g3_firmwareprobook_450_g8_firmwarepro_sff_400_g9_firmwareelitebook_836_g5probook_650_g3_firmwareelitebook_855_g7probook_x360_11_g7_ee_firmwareprodesk_400_g7_firmwaremt46_firmwareprobook_650_g7probook_455_g7_firmwareelitebook_x360_1030_g2_firmwareproone_400_g6probook_x360_11_g2_eeelite_dragonfly_firmwareprobook_450_g4_firmwareelitebook_840_g8_firmwarepro_tower_480_g9_firmwareelitebook_850_g7mt22z2_tower_g5_firmwareelitebook_x360_1040_g5_firmwareproone_600_g5probook_430_g5probook_430_g7_firmwarezbook_power_g7_firmwareprobook_x360_11_g5_ee_firmwareelite_slice_g2elitebook_845_g7elitebook_850_g7_firmwareprodesk_400_g5elitebook_655_g9elitebook_1040_g4_firmwareelitedesk_880_g3_firmwareprobook_450_g5_firmwareelitebook_840_aero_g8zbook_firefly_g8_firmwareprobook_645_g3zbook_14u_g5elitebook_x360_1030_g8_firmwaremp9_g4_retail_system_firmwareelitebook_840r_g4probook_645_g4z1_g8_tower_firmwarez2_small_form_factor_g9engage_flex_mini_retail_systemzbook_studio_g8elitebook_845_g9_firmwareprobook_655_g3_firmwareprodesk_680_g4probook_635_aero_g8probook_440_g7_firmwareprodesk_680_g6_pcimt45zbook_15u_g5_firmwareelitebook_655_g9_firmwareengage_flex_pro_retail_systemelitedesk_805_g8_firmwarezbook_x2_g4z1_all-in-one_g3probook_645_g3_firmwareelitebook_830_g5_firmwareprobook_635_aero_g7_firmwareelitebook_840r_g4_firmwarezhan_66_pro_g5prodesk_480_g6_firmwareprodesk_405_g8pro_mt440_g3probook_fortis_g9HP PC BIOS
CWE ID-CWE-367
Time-of-check Time-of-use (TOCTOU) Race Condition
CVE-2025-46328
Matching Score-4
Assigner-GitHub, Inc.
ShareView Details
Matching Score-4
Assigner-GitHub, Inc.
CVSS Score-3.3||LOW
EPSS-0.01% / 0.24%
||
7 Day CHG~0.00%
Published-28 Apr, 2025 | 22:33
Updated-09 May, 2025 | 19:38
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
NodeJS Driver for Snowflake has race condition when checking access to Easy Logging configuration file

snowflake-connector-nodejs is a NodeJS driver for Snowflake. Versions starting from 1.10.0 to before 2.0.4, are vulnerable to a Time-of-Check to Time-of-Use (TOCTOU) race condition. When using the Easy Logging feature on Linux and macOS the Driver reads logging configuration from a user-provided file. On Linux and macOS the Driver verifies that the configuration file can be written to only by its owner. That check was vulnerable to a TOCTOU race condition and failed to verify that the file owner matches the user running the Driver. This could allow a local attacker with write access to the configuration file or the directory containing it to overwrite the configuration and gain control over logging level and output location. This issue has been patched in version 2.0.4.

Action-Not Available
Vendor-snowflakesnowflakedb
Product-snowflake_connectorsnowflake-connector-nodejs
CWE ID-CWE-367
Time-of-check Time-of-use (TOCTOU) Race Condition
CVE-2020-2032
Matching Score-4
Assigner-Palo Alto Networks, Inc.
ShareView Details
Matching Score-4
Assigner-Palo Alto Networks, Inc.
CVSS Score-7||HIGH
EPSS-0.10% / 28.02%
||
7 Day CHG~0.00%
Published-10 Jun, 2020 | 17:29
Updated-17 Sep, 2024 | 02:27
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
GlobalProtect App: File race condition vulnerability leads to local privilege escalation during upgrade

A race condition vulnerability Palo Alto Networks GlobalProtect app on Windows allows a local limited Windows user to execute programs with SYSTEM privileges. This issue can be exploited only while performing a GlobalProtect app upgrade. This issue affects: GlobalProtect app 5.0 versions earlier than GlobalProtect app 5.0.10 on Windows; GlobalProtect app 5.1 versions earlier than GlobalProtect app 5.1.4 on Windows.

Action-Not Available
Vendor-Palo Alto Networks, Inc.
Product-globalprotectGlobalProtect App
CWE ID-CWE-367
Time-of-check Time-of-use (TOCTOU) Race Condition
CVE-2021-3969
Matching Score-4
Assigner-Lenovo Group Ltd.
ShareView Details
Matching Score-4
Assigner-Lenovo Group Ltd.
CVSS Score-7.8||HIGH
EPSS-0.42% / 60.99%
||
7 Day CHG~0.00%
Published-18 May, 2022 | 16:10
Updated-03 Aug, 2024 | 17:09
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A Time of Check Time of Use (TOCTOU) vulnerability was reported in IMController, a software component of Lenovo System Interface Foundation, prior to version 1.1.20.3that could allow a local attacker to elevate privileges.

Action-Not Available
Vendor-Lenovo Group Limited
Product-system_interface_foundationIMController
CWE ID-CWE-367
Time-of-check Time-of-use (TOCTOU) Race Condition
CVE-2020-15702
Matching Score-4
Assigner-Canonical Ltd.
ShareView Details
Matching Score-4
Assigner-Canonical Ltd.
CVSS Score-7||HIGH
EPSS-0.10% / 28.96%
||
7 Day CHG~0.00%
Published-06 Aug, 2020 | 22:50
Updated-16 Sep, 2024 | 17:28
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
TOCTOU in apport

TOCTOU Race Condition vulnerability in apport allows a local attacker to escalate privileges and execute arbitrary code. An attacker may exit the crashed process and exploit PID recycling to spawn a root process with the same PID as the crashed process, which can then be used to escalate privileges. Fixed in 2.20.1-0ubuntu2.24, 2.20.9 versions prior to 2.20.9-0ubuntu7.16 and 2.20.11 versions prior to 2.20.11-0ubuntu27.6. Was ZDI-CAN-11234.

Action-Not Available
Vendor-Canonical Ltd.
Product-apportubuntu_linuxapport
CWE ID-CWE-367
Time-of-check Time-of-use (TOCTOU) Race Condition
CVE-2023-46649
Matching Score-4
Assigner-GitHub, Inc. (Products Only)
ShareView Details
Matching Score-4
Assigner-GitHub, Inc. (Products Only)
CVSS Score-6.3||MEDIUM
EPSS-0.15% / 35.76%
||
7 Day CHG~0.00%
Published-21 Dec, 2023 | 20:45
Updated-02 Aug, 2024 | 20:53
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Race Condition allows Administrative Access on Organization Repositories

A race condition in GitHub Enterprise Server was identified that could allow an attacker administrator access. To exploit this, an organization needs to be converted from a user. This vulnerability affected all versions of GitHub Enterprise Server since 3.7 and was fixed in version 3.7.19, 3.8.12, 3.9.7, 3.10.4, and 3.11.1. 

Action-Not Available
Vendor-GitHub, Inc.
Product-enterprise_serverEnterprise Server
CWE ID-CWE-367
Time-of-check Time-of-use (TOCTOU) Race Condition
CVE-2020-14418
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-7||HIGH
EPSS-0.06% / 19.99%
||
7 Day CHG~0.00%
Published-30 Jan, 2021 | 05:26
Updated-04 Aug, 2024 | 12:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A TOCTOU vulnerability exists in madCodeHook before 2020-07-16 that allows local attackers to elevate their privileges to SYSTEM. This occurs because path redirection can occur via vectors involving directory junctions.

Action-Not Available
Vendor-madshimorphisecn/aCisco Systems, Inc.
Product-advanced_malware_protectionunified_threat_prevention_platformmadcodehookn/a
CWE ID-CWE-367
Time-of-check Time-of-use (TOCTOU) Race Condition
CVE-2020-13162
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-7||HIGH
EPSS-0.35% / 56.56%
||
7 Day CHG~0.00%
Published-16 Jun, 2020 | 19:41
Updated-05 May, 2025 | 17:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A time-of-check time-of-use vulnerability in PulseSecureService.exe in Pulse Secure Client versions prior to 9.1.6 down to 5.3 R70 for Windows (which runs as NT AUTHORITY/SYSTEM) allows unprivileged users to run a Microsoft Installer executable with elevated privileges.

Action-Not Available
Vendor-n/aPulse Secure
Product-pulse_secure_desktop_clientpulse_secure_installer_servicen/a
CWE ID-CWE-367
Time-of-check Time-of-use (TOCTOU) Race Condition
CVE-2023-43741
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-7||HIGH
EPSS-0.01% / 0.90%
||
7 Day CHG~0.00%
Published-22 Dec, 2023 | 00:00
Updated-27 Aug, 2024 | 20:14
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A time-of-check-time-of-use race condition vulnerability in Buildkite Elastic CI for AWS versions prior to 6.7.1 and 5.22.5 allows the buildkite-agent user to bypass a symbolic link check for the PIPELINE_PATH variable in the fix-buildkite-agent-builds-permissions script.

Action-Not Available
Vendor-buildkiten/a
Product-elastic_ci_stackn/a
CWE ID-CWE-367
Time-of-check Time-of-use (TOCTOU) Race Condition
CVE-2020-11233
Matching Score-4
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-4
Assigner-Qualcomm, Inc.
CVSS Score-7||HIGH
EPSS-0.03% / 5.38%
||
7 Day CHG~0.00%
Published-09 Jun, 2021 | 05:00
Updated-04 Aug, 2024 | 11:28
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Time-of-check time-of-use race condition While processing partition entries due to newly created buffer was read again from mmc without validation in Snapdragon Auto, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-qfe3100qca9377_firmwarepm8909qfe1040qfe2550mdm9640_firmwarepm660pmd9607_firmwarepmi8996pmi632qfe1040_firmwareqfe1045mdm9628_firmwareqfe2340_firmwaremdm9650qln1030smb1360_firmwarepmk8001qfe2340mdm9250smb1358_firmwarepmd9635_firmwareapq8009_firmwareqca6174_firmwareqcc1110_firmwareapq8076wtr3905wtr5975_firmwareapq8076_firmwareqca9377pmi632_firmwaresdw2500_firmwarewcd9326_firmwaremdm9628wcn3615_firmwaremdm9206_firmwareqsw8573_firmwarergr7640au_firmwarewtr2955wcn3660bwgr7640_firmwareqln1021aqqcc112qca4020mdm9230_firmwarepm8953_firmwareqca6574au_firmwareqca6584mdm9630qln1031_firmwarewcn3615wcn3680b_firmwaremsm8909wapq8009w_firmwarewcn3610_firmwareapq8053_firmwaresdx20mqca6564au_firmwarewcd9306qca9367_firmwarepm8937pm660_firmwarepm8996qca9367mdm9607_firmwaremdm9655_firmwareqcc1110smb1360sd205wcd9306_firmwareapq8017_firmwarewsa8810_firmwarepm8953qualcomm215_firmwaresmb231pm439_firmwareqca4020_firmwarewcd9326wcd9335qet4200aqqfe1045_firmwaremsm8937qfe3345pm8004_firmwareqca6174a_firmwaremdm9250_firmwaresmb1358pm439pmi8952mdm9655pm8937_firmwareqet4100_firmwaresmb1350qfe2550_firmwarepm8952_firmwaremdm9330_firmwaresd210wcn3620_firmwaresd820sdx20_firmwarewsa8815_firmwarepmi8937wcn3620sdw3100wtr3925_firmwarewtr3925sdw3100_firmwareapq8017qcc112_firmwarecsr6030_firmwareqca6564amdm9630_firmwareqet4100wcn3610mdm9640pmi8952_firmwareqfe3335_firmwaresmb1355wcd9330msm8996au_firmwarewtr2955_firmwarewgr7640csr6030qca6564aupmi8994_firmwarepmm8996au_firmwareqet4101_firmwaremsm8909w_firmwaremsm8996aupmk8001_firmwareqfe1035pmm8996ausmb1355_firmwaresmb1351_firmwarepmd9655_firmwarergr7640aumdm9230qualcomm215pm8996_firmwareqet4200aq_firmwarepm8909_firmwareqca6574amdm9206pm8916_firmwareqca9379_firmwareqca6174aqfe3100_firmwaresmb358s_firmwaresmb358swtr4905wtr5975qca6174wcd9335_firmwareqtc801s_firmwaresd439_firmwarepmd9645pm8956_firmwareqsw8573qfe3335qln1036aq_firmwarewsa8815qca6584_firmwaremsm8937_firmwaremdm9650_firmwarewcn3660b_firmwarewcn3680pmx20pmd9607qca6574a_firmwareapq8009qfe3320_firmwaresmb1351smb1357_firmwarewcd9330_firmwarewtr3905_firmwarepm215_firmwaremdm9626wtr2965_firmwareqfe1035_firmwarewcn3680_firmwaresdx20qln1021aq_firmwarepm8916qln1036aqqtc801spmd9635mdm9626_firmwarepmd9655qca6574auqfe3320mdm9607sd205_firmwareqca6564a_firmwareapq8009wpmd9645_firmwaresdx20m_firmwarewsa8810smb231_firmwarewtr4905_firmwaresd210_firmwareqfe3345_firmwarewcn3680bpm215apq8096auqln1030_firmwaresmb1350_firmwarewtr2965sd820_firmwarepmi8996_firmwarepmx20_firmwarepmi8937_firmwarepm8004sdw2500apq8053apq8096au_firmwaresd439qet4101pm8952pmi8994smb1357mdm9330qca9379pm8956qln1031Snapdragon Auto, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables
CWE ID-CWE-367
Time-of-check Time-of-use (TOCTOU) Race Condition
CVE-2020-11298
Matching Score-4
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-4
Assigner-Qualcomm, Inc.
CVSS Score-7.8||HIGH
EPSS-0.02% / 3.38%
||
7 Day CHG~0.00%
Published-09 Jun, 2021 | 06:20
Updated-04 Aug, 2024 | 11:28
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

While waiting for a response to a callback or listener request, non-secure clients can change permissions to shared memory buffers used by HLOS Invoke Call to secure kernel in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wired Infrastructure and Networking

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-qca9377_firmwarewcn3991_firmwarewsa8830sd678sm6250p_firmwareqcs610qcs2290_firmwareqca8337qca6431_firmwaresd7c_firmwaremdm9628_firmwarewcd9360_firmwarecsra6620qcs4290wcn3950_firmwaresc8180x\+sdx55sd765g_firmwareqca6420_firmwareqca6595au_firmwareqcs2290qca6390_firmwaresd690_5gsd730_firmwarewcd9370csra6620_firmwareqcs605_firmwaresd_675_firmwaresd675_firmwarecsra6640_firmwareqcs6125_firmwareqca6426qca6584au_firmwarewcn3990_firmwareqca9984_firmwareqca9377sa415mwcn3998sd_8cx_firmwarewcd9371_firmwaresdxr2_5g_firmwarewcd9385_firmwaresm4125mdm9628sd720gmdm9206_firmwarewcd9326_firmwarewcn3950whs9410sd662sd710_firmwaresd460_firmwaresa8155qca6574au_firmwaresdx55_firmwareqca6595auwcd9375_firmwarewcn3998_firmwarewcn3999_firmwaresm7250p_firmwareqca6420qca6436_firmwarewcd9360qca6564au_firmwareqca6584ausa6155p_firmwareqca9367_firmwarewcd9306whs9410_firmwarewcn3999sa515m_firmwaresdxr2_5gqca9367qcs6125sa8155_firmwareqca4004_firmwaresd662_firmwaresa415m_firmwareqcs405qca6430wcn3988_firmwareqca6421sd712_firmwaresm6250wcd9306_firmwaresa8195psdm830_firmwarewcd9340wsa8810_firmwaresd765gsd765_firmwareqca6436wcd9326wcd9335sa6155pwcn6851qcs603_firmwareqcs4290_firmwarewcd9385wcd9341qca6431qca6696_firmwarewcd9371sd750gsd870_firmwarear8035qca6390sd_8cxaqt1000sd750g_firmwarewcd9375sc8180x\+sdx55_firmwaresm6250_firmwarewcn3910_firmwareqca4004wsa8830_firmwaresd855_firmwaresd865_5g_firmwaresd712sd888_5g_firmwarewcn3988wcn6850_firmwarewsa8815_firmwarewsa8835_firmwaresa8195p_firmwareqca6564awcn6750_firmwareqcm6125_firmwareqcm2290_firmwarewcn3991qca8337_firmwarewcd9380_firmwarewcn3990sd_675wcd9330sd865_5gqca6595qca6564ausdx24sdx55m_firmwaresd670_firmwarewsa8835sd665_firmwarewcd9380sd888_5gsm6250pqcs410qca6574asd690_5g_firmwaresdx50m_firmwaremdm9206sdx24_firmwareqca6430_firmwarewcd9335_firmwarewcn3980wcn6750mdm9205sa515mqcs605wcd9340_firmwaresd855sm4125_firmwarewcn6850sd665sd7cwcn3910wsa8815sd_8c_firmwaresd765qca6426_firmwareqca6574a_firmwareqca9984sd768g_firmwarewcn3980_firmwaresd460qca6391sd730sdx55msdxr1_firmwarewcd9330_firmwareqca6421_firmwareaqt1000_firmwaresd678_firmwarear8031_firmwareqcm4290sdx50msd480_firmwareqcs603wcn6851_firmwareqca6574ausa8155p_firmwaresd710sd670qca6564a_firmwarewcd9341_firmwareqcm6125qcm4290_firmwaresd480sd870wsa8810qcs610_firmwareqsm8250sd_8csdxr1sd768gar8031qca6595_firmwareqcs405_firmwareqca6696mdm9205_firmwareqca6391_firmwarewcd9370_firmwaresdx55sa8155pcsra6640sd675sm7250psdm830sd720g_firmwareqcs410_firmwarear8035_firmwareqcm2290qsm8250_firmwareSnapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wired Infrastructure and Networking
CWE ID-CWE-367
Time-of-check Time-of-use (TOCTOU) Race Condition
CVE-2025-27076
Matching Score-4
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-4
Assigner-Qualcomm, Inc.
CVSS Score-7.8||HIGH
EPSS-0.01% / 1.07%
||
7 Day CHG~0.00%
Published-06 Aug, 2025 | 07:26
Updated-19 Aug, 2025 | 13:08
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Time-of-check Time-of-use (TOCTOU) Race Condition in Display

Memory corruption while processing simultaneous requests via escape path.

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-qcm6490_firmwaresnapdragon_8cx_gen_3_compute_platform_\(sc8280xp-bb\)aqt1000snapdragon_8cx_gen_3_compute_platform_\(sc8280xp-ab\)_firmwaresnapdragon_7c\+_gen_3_compute_firmwaresm6250snapdragon_7c_compute_platform_\(sc7180-ac\)wsa8835qca6391snapdragon_8cx_gen_2_5g_compute_platform_\(sc8180xp-aa\)snapdragon_8cx_gen_3_compute_platform_\(sc8280xp-ab\)fastconnect_7800_firmwarewsa8845_firmwaresc8180x\+sdx55_firmwarewsa8830snapdragon_8cx_gen_2_5g_compute_platform_\(sc8180x-ac\)_firmwarewsa8845h_firmwaresnapdragon_8c_compute_platform_\(sc8180xp-ad\)snapdragon_8cx_gen_2_5g_compute_platform_\(sc8180xp-ab\)_firmwareqca6430qcs6490_firmwaresnapdragon_8cx_compute_platform_\(sc8180x-aa\)wsa8815_firmwarevideo_collaboration_vc3_platform_firmwarewsa8810qca6420snapdragon_8cx_gen_2_5g_compute_platform_\(sc8180x-ac\)wcd9370_firmwaresnapdragon_8c_compute_platform_\(sc8180x-ad\)fastconnect_6800snapdragon_8cx_compute_platform_\(sc8180x-ab\)_firmwarefastconnect_6200_firmwarewsa8840_firmwarewsa8810_firmwarewcd9380_firmwarewsa8835_firmwaresnapdragon_7c_gen_2_compute_platform_\(sc7180-ad\)_\"rennell_pro\"_firmwarewcd9341snapdragon_8cx_compute_platform_\(sc8180xp-ac\)_firmwarewcd9370sm6250_firmwareaqt1000_firmwareqcm5430_firmwaresnapdragon_8cx_compute_platform_\(sc8180xp-af\)wcd9385snapdragon_8cx_gen_3_compute_platform_\(sc8280xp-bb\)_firmwarefastconnect_6800_firmwaresnapdragon_7c\+_gen_3_computewsa8840wcd9375_firmwaresc8180x\+sdx55wcd9385_firmwarewsa8815wcd9341_firmwaresnapdragon_8cx_compute_platform_\(sc8180xp-ac\)fastconnect_6700_firmwarefastconnect_7800snapdragon_8cx_gen_2_5g_compute_platform_\(sc8180xp-ab\)qcs5430snapdragon_8c_compute_platform_\(sc8180xp-ad\)_firmwarewsa8845hsc8380xpwcd9340qcm6490qcs5430_firmwarefastconnect_6900_firmwaresnapdragon_7c_gen_2_compute_platform_\(sc7180-ad\)_\"rennell_pro\"snapdragon_8cx_gen_2_5g_compute_platform_\(sc8180x-af\)_firmwarefastconnect_6700qca6430_firmwaresnapdragon_8c_compute_platform_\(sc8180x-ad\)_firmwarewsa8845fastconnect_6900qcs6490wcd9375video_collaboration_vc3_platformsnapdragon_8cx_compute_platform_\(sc8180xp-af\)_firmwaresc8380xp_firmwaresnapdragon_8cx_gen_2_5g_compute_platform_\(sc8180x-af\)wcd9340_firmwareqcm5430snapdragon_8cx_compute_platform_\(sc8180x-aa\)_firmwaresnapdragon_8cx_compute_platform_\(sc8180x-ab\)qca6391_firmwarewsa8830_firmwarewcd9380snapdragon_7c_compute_platform_\(sc7180-ac\)_firmwarefastconnect_6200qca6420_firmwaresnapdragon_8cx_gen_2_5g_compute_platform_\(sc8180xp-aa\)_firmwareSnapdragon
CWE ID-CWE-367
Time-of-check Time-of-use (TOCTOU) Race Condition
CVE-2020-0238
Matching Score-4
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
ShareView Details
Matching Score-4
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
CVSS Score-7||HIGH
EPSS-0.01% / 0.30%
||
7 Day CHG~0.00%
Published-11 Aug, 2020 | 19:26
Updated-04 Aug, 2024 | 05:55
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In updatePreferenceIntents of AccountTypePreferenceLoader, there is a possible confused deputy attack due to a race condition. This could lead to local escalation of privilege and launching privileged activities with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-8.1 Android-9 Android-10 Android-8.0Android ID: A-150946634

Action-Not Available
Vendor-n/aGoogle LLC
Product-androidAndroid
CWE ID-CWE-367
Time-of-check Time-of-use (TOCTOU) Race Condition
CVE-2025-23279
Matching Score-4
Assigner-NVIDIA Corporation
ShareView Details
Matching Score-4
Assigner-NVIDIA Corporation
CVSS Score-7||HIGH
EPSS-0.01% / 1.41%
||
7 Day CHG~0.00%
Published-02 Aug, 2025 | 22:06
Updated-05 Aug, 2025 | 03:56
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

NVIDIA .run Installer for Linux and Solaris contains a vulnerability where an attacker could use a race condition to escalate privileges. A successful exploit of this vulnerability might lead to code execution, escalation of privileges, information disclosure, denial of service, or data tampering.

Action-Not Available
Vendor-NVIDIA Corporation
Product-GPU Display Drivers
CWE ID-CWE-367
Time-of-check Time-of-use (TOCTOU) Race Condition
CVE-2025-22394
Matching Score-4
Assigner-Dell
ShareView Details
Matching Score-4
Assigner-Dell
CVSS Score-6.7||MEDIUM
EPSS-0.01% / 1.76%
||
7 Day CHG~0.00%
Published-15 Jan, 2025 | 04:41
Updated-04 Feb, 2025 | 15:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Dell Display Manager, versions prior to 2.3.2.18, contain a Time-of-check Time-of-use (TOCTOU) Race Condition vulnerability. A low privileged attacker with local access could potentially exploit this vulnerability, leading to code execution and possibly privilege escalation.

Action-Not Available
Vendor-Dell Inc.
Product-display_managerDell Display Manager
CWE ID-CWE-367
Time-of-check Time-of-use (TOCTOU) Race Condition
CVE-2022-48191
Matching Score-4
Assigner-Trend Micro, Inc.
ShareView Details
Matching Score-4
Assigner-Trend Micro, Inc.
CVSS Score-7||HIGH
EPSS-0.05% / 16.46%
||
7 Day CHG~0.00%
Published-18 Jan, 2023 | 23:07
Updated-03 Apr, 2025 | 20:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A vulnerability exists in Trend Micro Maximum Security 2022 (17.7) wherein a low-privileged user can write a known malicious executable to a specific location and in the process of removal and restoral an attacker could replace an original folder with a mount point to an arbitrary location, allowing a escalation of privileges on an affected system.

Action-Not Available
Vendor-Microsoft CorporationTrend Micro Incorporated
Product-maximum_security_2022windowsTrend Micro Maxium Security (Consumer)
CWE ID-CWE-367
Time-of-check Time-of-use (TOCTOU) Race Condition
CVE-2025-21191
Matching Score-4
Assigner-Microsoft Corporation
ShareView Details
Matching Score-4
Assigner-Microsoft Corporation
CVSS Score-7||HIGH
EPSS-0.06% / 17.84%
||
7 Day CHG~0.00%
Published-08 Apr, 2025 | 17:23
Updated-07 Jul, 2025 | 18:57
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Windows Local Security Authority (LSA) Elevation of Privilege Vulnerability

Time-of-check time-of-use (toctou) race condition in Windows Local Security Authority (LSA) allows an authorized attacker to elevate privileges locally.

Action-Not Available
Vendor-Microsoft Corporation
Product-windows_11_24h2windows_server_2012windows_server_2025windows_11_23h2windows_10_21h2windows_server_2022windows_10_1607windows_server_2019windows_10_1507windows_server_2008windows_11_22h2windows_server_2016windows_server_2022_23h2windows_10_22h2windows_10_1809Windows 10 Version 1809Windows 11 Version 23H2Windows 11 Version 24H2Windows Server 2016 (Server Core installation)Windows Server 2019 (Server Core installation)Windows Server 2008 Service Pack 2Windows Server 2008 R2 Service Pack 1 (Server Core installation)Windows 10 Version 21H2Windows 11 version 22H2Windows 10 Version 22H2Windows 11 version 22H3Windows 10 Version 1507Windows Server 2012 (Server Core installation)Windows 10 Version 1607Windows Server 2016Windows Server 2025Windows Server 2012 R2Windows Server 2022Windows Server 2008 R2 Service Pack 1Windows Server 2012Windows Server 2025 (Server Core installation)Windows Server 2008 Service Pack 2Windows Server 2008 Service Pack 2 (Server Core installation)Windows Server 2022, 23H2 Edition (Server Core installation)Windows Server 2012 R2 (Server Core installation)Windows Server 2019
CWE ID-CWE-367
Time-of-check Time-of-use (TOCTOU) Race Condition
CVE-2023-37250
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-7||HIGH
EPSS-0.14% / 35.45%
||
7 Day CHG~0.00%
Published-20 Aug, 2023 | 00:00
Updated-08 Oct, 2024 | 14:24
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Unity Parsec has a TOCTOU race condition that permits local attackers to escalate privileges to SYSTEM if Parsec was installed in "Per User" mode. The application intentionally launches DLLs from a user-owned directory but intended to always perform integrity verification of those DLLs. This affects Parsec Loader versions through 8. Parsec Loader 9 is a fixed version.

Action-Not Available
Vendor-unityn/a
Product-parsecn/a
CWE ID-CWE-367
Time-of-check Time-of-use (TOCTOU) Race Condition
CVE-2023-35378
Matching Score-4
Assigner-Microsoft Corporation
ShareView Details
Matching Score-4
Assigner-Microsoft Corporation
CVSS Score-7||HIGH
EPSS-0.08% / 23.35%
||
7 Day CHG~0.00%
Published-08 Aug, 2023 | 17:08
Updated-01 Jan, 2025 | 01:58
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Windows Projected File System Elevation of Privilege Vulnerability

Windows Projected File System Elevation of Privilege Vulnerability

Action-Not Available
Vendor-Microsoft Corporation
Product-windows_10_21h2windows_10_1809windows_11_22h2windows_11_21h2windows_10_22h2windows_server_2022windows_server_2019Windows Server 2022Windows 10 Version 21H2Windows 11 version 22H2Windows Server 2019 (Server Core installation)Windows 10 Version 1809Windows 11 version 21H2Windows Server 2019Windows 10 Version 22H2
CWE ID-CWE-367
Time-of-check Time-of-use (TOCTOU) Race Condition
CWE ID-CWE-362
Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')
CVE-2023-32555
Matching Score-4
Assigner-Trend Micro, Inc.
ShareView Details
Matching Score-4
Assigner-Trend Micro, Inc.
CVSS Score-7||HIGH
EPSS-0.04% / 11.05%
||
7 Day CHG~0.00%
Published-26 Jun, 2023 | 21:56
Updated-04 Dec, 2024 | 21:24
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A Time-of-Check Time-Of-Use vulnerability in the Trend Micro Apex One and Apex One as a Service agent could allow a local attacker to escalate privileges on affected installations. Please note: a local attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. This is similar to, but not identical to CVE-2023-32554.

Action-Not Available
Vendor-Microsoft CorporationTrend Micro Incorporated
Product-apex_onewindowsTrend Micro Apex Onetrend_micro_apex_one
CWE ID-CWE-367
Time-of-check Time-of-use (TOCTOU) Race Condition
CVE-2023-33119
Matching Score-4
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-4
Assigner-Qualcomm, Inc.
CVSS Score-8.4||HIGH
EPSS-0.03% / 8.58%
||
7 Day CHG~0.00%
Published-06 May, 2024 | 14:32
Updated-11 Aug, 2025 | 15:06
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Time-of-check Time-of-use (TOCTOU) Race Condition in Hypervisor

Memory corruption while loading a VM from a signed VM image that is not coherent in the processor cache.

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-qdx1010_firmwareqcm8550_firmwarerobotics_rb3sd865_5gqca6595wcd9335wcd9370qca8081_firmwaresnapdragon_670_mobileqca6696wcd9340_firmwarewcd9341_firmwarewcd9395_firmwareqcc710_firmwareqca6426fastconnect_6700snapdragon_x50_5g_modem-rf_firmwarewsa8832_firmwareqca8337qdu1110qca6426_firmwarewcd9395sc8180xp-aaabqca6574au_firmwaresnapdragon_x72_5g_modem-rfqam8295pwcd9341qca6574auwcd9390snapdragon_888\+_5g_mobile_firmwaresa8620p_firmwarewsa8810_firmwarewsa8845h_firmwaresa9000p_firmwaresc8180xp-acafsrv1hsnapdragon_850_mobile_computefastconnect_6800_firmwareqcs5430sd835_firmwareqcm5430qcm5430_firmwaresa8770psnapdragon_678_mobile_firmwaressg2115pqcc710snapdragon_xr2_5g_firmwaresa8540pqsm8350_firmwarefastconnect_6900qru1032_firmwareqep8111sa7255pqfw7114wcd9385_firmwareqca6421qca6310qam8255p_firmwaresa8155_firmwareqca6335snapdragon_x65_5g_modem-rfwsa8845sa6155pqca6421_firmwaresc8180x-adqca6564au_firmwarewsa8810qam8650psnapdragon_835_mobilesa9000pqdu1000_firmwaresrv1h_firmwaresnapdragon_888_5g_mobile_firmwareqca6595ausnapdragon_888_5g_mobilesxr2250p_firmwareqdu1010wcd9326_firmwaresa6155p_firmwaresnapdragon_845_mobile_firmwarewsa8840srv1m_firmwareqcs8550_firmwaresnapdragon_x35_5g_modem-rf_firmwaresd835qdu1210_firmwaresnapdragon_8_gen_2_mobile_firmwaresnapdragon_x55_5g_modem-rfqfw7124_firmwareqca6436_firmwaresnapdragon_x55_5g_modem-rf_firmwaresnapdragon_8_gen_2_mobileqca6420wcd9370_firmwareqdu1110_firmwaresnapdragon_835_mobile_firmwareqdu1000sa7255p_firmwareqca6574asnapdragon_x72_5g_modem-rf_firmwaresnapdragon_8\+_gen_2_mobileqca6174awcd9340qdu1210snapdragon_auto_5g_modem-rf_gen_2qca6335_firmwareqcm6490sa8540p_firmwaresm8550p_firmwaresxr2250pqcm8550snapdragon_765_5g_mobile_firmwarevision_intelligence_300_firmwaresa8775pqca6574sxr2230p_firmwaresd675_firmwaresnapdragon_855_mobile_firmwareqca6430_firmwaresa8775p_firmwareqamsrv1hsdx57mwsa8845hwcd9326sa8155p_firmwareqca6564asa8155psnapdragon_765g_5g_mobile_firmwarewsa8830sm8550psa6145psnapdragon_768g_5g_mobile_firmwaresa8255p_firmwarear8035qamsrv1m_firmwaresa6155sa8650p_firmwareqcn6224snapdragon_865\+_5g_mobile_firmwareqca6698aqwcn3950_firmwaressg2125p_firmwarefastconnect_6200sd670sc8180x-acaf_firmwareqdx1011sa8150p_firmwarefastconnect_6700_firmwarevideo_collaboration_vc3_platform_firmwarewcn3990robotics_rb3_firmwaresnapdragon_x75_5g_modem-rf_firmwaresd670_firmwaresnapdragon_8_gen_3_mobilesnapdragon_855_mobileqcs6490sc8180xp-acaf_firmwarefastconnect_6200_firmwarewsa8830_firmwareqcn6224_firmwareqca6431qca6678aq_firmwarewsa8845_firmwarewsa8832sdx57m_firmwaresxr2130_firmwaresrv1mqca6678aqsnapdragon_860_mobile_firmwaresnapdragon_x35_5g_modem-rfar8035_firmwaresc8180xp-aaab_firmwaresc8380xpqca6320qca6564ausc8180xp-adsc8280xp-abbbwsa8815_firmwareqca8337_firmwaresg8275p_firmwareqca9377_firmwareqcm6490_firmwaresm7250p_firmwareqru1032vision_intelligence_400_firmwarewcn3950snapdragon_870_5g_mobile_firmwareqca6797aq_firmwaresnapdragon_auto_5g_modem-rf_gen_2_firmwaresa8295p_firmwaresnapdragon_870_5g_mobilesd_675_firmwaresnapdragon_678_mobilesm7250psc8180x-acafsa8155sd_8cx_firmwaresc8180x-ad_firmwareqca6584auqca6320_firmwareqcn6274_firmwareqru1062_firmwaresnapdragon_850_mobile_compute_firmwaresnapdragon_675_mobile_firmwaresnapdragon_768g_5g_mobilesc8380xp_firmwareqru1062qca6310_firmwaresnapdragon_845_mobilesnapdragon_8_gen_3_mobile_firmwarefastconnect_6800qfw7114_firmwareqca6595_firmwarefastconnect_7800_firmwaresnapdragon_675_mobilesnapdragon_865_5g_mobile_firmwarefastconnect_6900_firmwarewcd9380sa6145p_firmwareqam8255psa6155_firmwaresxr2230psnapdragon_xr2_5gsa8150psnapdragon_x24_lte_modemsc8180x-aaabsxr1230psc8180x-aaab_firmwarevideo_collaboration_vc3_platformaqt1000qam8295p_firmwaresd855qca6431_firmwarewcn3990_firmwareqca6698aq_firmwareqca6564a_firmwarewcd9385snapdragon_888\+_5g_mobileqsm8350snapdragon_8_gen_1_mobilesa8255psxr1230p_firmwarewcd9390_firmwaresnapdragon_865\+_5g_mobileqep8111_firmwareqca6430snapdragon_855\+_mobilesg8275psnapdragon_765_5g_mobileqdx1011_firmwaresnapdragon_860_mobilesc8180xp-ad_firmwaresdx55_firmwaressg2125pqru1052sxr2130snapdragon_x65_5g_modem-rf_firmwareqamsrv1mqca6174a_firmwaresnapdragon_x50_5g_modem-rfqam8650p_firmwaresnapdragon_670_mobile_firmwareqca6420_firmwareaqt1000_firmwareqcs6490_firmwarewcn3980_firmwarewcd9335_firmwaresd855_firmwareqca6436qca6584au_firmwareqcn6274snapdragon_x24_lte_modem_firmwarewsa8835qca6391_firmwarewsa8840_firmwareqfw7124qca6595au_firmwareqdu1010_firmwareqca6696_firmwarewcd9380_firmwareqca6574_firmwareqca8081wsa8815sd_8_gen1_5gqam8775pqca9377snapdragon_ar2_gen_1_firmwareqca6797aqsnapdragon_x75_5g_modem-rfsa8620pqca6574a_firmwaresdx55snapdragon_865_5g_mobilesnapdragon_855\+_mobile_firmwaresd675sd_8_gen1_5g_firmwarewcd9375_firmwareqca6391qcs5430_firmwareqru1052_firmwaresa8770p_firmwaresa8295pqcs8550sc8280xp-abbb_firmwarefastconnect_7800sa8650pqam8775p_firmwaresd865_5g_firmwaresnapdragon_8\+_gen_2_mobile_firmwarewcd9375vision_intelligence_300snapdragon_ar2_gen_1snapdragon_765g_5g_mobileqamsrv1h_firmwaresd_675sd_8cxvision_intelligence_400ssg2115p_firmwarewsa8835_firmwarewcn3980qdx1010snapdragon_8_gen_1_mobile_firmwareSnapdragonqam8255p_firmwareqca9377_firmwareqca8337_firmwareqca6431_firmwareqdu1010_firmwareqcn6224_firmwareqdu1110_firmwaresa8150p_firmwareqca6420_firmwareqca6595au_firmwareqcm5430_firmwareqca6584au_firmwareqep8111_firmwareqca6310_firmwareqca6430_firmwareqfw7114_firmwarequalcomm_video_collaboration_vc3_platform_firmwareqca6335_firmwareqamsrv1h_firmwareqca6574_firmwareqsm8350_firmwareqru1032_firmwareqam8295p_firmwareqca6426_firmwareqca6320_firmwarefastconnect_6200_firmwareqca6574a_firmwareqca6574au_firmwareqca8081_firmwaresa6155_firmwareqca6436_firmwareqca6421_firmwareaqt1000_firmwareqca6564au_firmwaresa6155p_firmwareqcm8550_firmwareqca6678aq_firmwareqcn6274_firmwareqcm6490_firmwarefastconnect_6900_firmwaresa8155_firmwarerobotics_rb3_platform_firmwareqcs8550_firmwareqca6797aq_firmwareqru1062_firmwaresa6145p_firmwareqdx1011_firmwarefastconnect_6700_firmwareqca6564a_firmwaresa7255p_firmwarefastconnect_7800_firmwareqdx1010_firmwareqdu1000_firmwareqamsrv1m_firmwareqca6698aq_firmwareqca6174a_firmwareqam8650p_firmwareqam8775p_firmwareqca6696_firmwareqca6595_firmwareqcs6490_firmwareqcs5430_firmwareqca6391_firmwareqru1052_firmwareqcc710_firmwarefastconnect_6800_firmwareqfw7124_firmwareqdu1210_firmwarear8035_firmware
CWE ID-CWE-367
Time-of-check Time-of-use (TOCTOU) Race Condition
CVE-2023-33046
Matching Score-4
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-4
Assigner-Qualcomm, Inc.
CVSS Score-7.8||HIGH
EPSS-0.02% / 2.89%
||
7 Day CHG~0.00%
Published-06 Feb, 2024 | 05:46
Updated-11 Aug, 2025 | 15:06
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Time-of-check Time-of-use (TOCTOU) Race Condition in Trusted Execution Environment

Memory corruption in Trusted Execution Environment while deinitializing an object used for license validation.

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-qcm8550_firmwarewsa8845_firmwarewsa8832wsa8840qam8295p_firmwareqca6595qcs8550_firmwareqca8081_firmwarear8035_firmwareqca6696qrb5165mqca6698aq_firmwarewcd9385qcn9012wcd9395_firmwareqcn6024snapdragon_8_gen_2_mobile_platformqcs7230_firmwaresxr1230p_firmwarewcd9390_firmwaresg8275pwsa8832_firmwareqca8337_firmwaresnapdragon_x70_modem-rf_system_firmwareqca8337wcd9395ssg2125psg8275p_firmwareqca6574au_firmwaresnapdragon_8cx_gen_3_compute_platform_firmwareqam8295pqcs8250_firmwareqca6574auwcd9390sa8540p_firmwareflight_rb5_5g_platformvideo_collaboration_vc5_platformwsa8845h_firmwaresm8550p_firmwareqcm8550sa9000p_firmwaresnapdragon_x65_5g_modem-rf_systemqcn9024snapdragon_x65_5g_modem-rf_system_firmwareqrb5165n_firmwarewsa8835wsa8840_firmwaresxr2230p_firmwareqca6391_firmwareqcn9011snapdragon_ar2_gen_1_platformsa8295p_firmwareqca6696_firmwareqcn9024_firmwaresnapdragon_8cx_gen_3_compute_platformqcn6024_firmwarewsa8845hwcd9380_firmwareqca8081wsa8830sm8550pssg2115pqcn9011_firmwareflight_rb5_5g_platform_firmwarear8035sa8540pqrb5165m_firmwareqca6595_firmwareqcs7230fastconnect_6900fastconnect_7800_firmwarerobotics_rb5_platformqca6391snapdragon_x70_modem-rf_systemqcn9012_firmwareqca6698aqssg2125p_firmwarewcd9385_firmwareqrb5165nfastconnect_6900_firmwaresa8295psnapdragon_8_gen_2_mobile_platform_firmwarerobotics_rb5_platform_firmwarewcd9380qcs8550sxr2230pfastconnect_7800snapdragon_ar2_gen_1_platform_firmwaresnapdragon_8\+_gen_2_mobile_platform_firmwarewsa8845wsa8835_firmwaresxr1230pssg2115p_firmwarevideo_collaboration_vc5_platform_firmwareqcs8250sa9000psnapdragon_8\+_gen_2_mobile_platformwsa8830_firmwareSnapdragon
CWE ID-CWE-367
Time-of-check Time-of-use (TOCTOU) Race Condition
CWE ID-CWE-787
Out-of-bounds Write
CVE-2023-32554
Matching Score-4
Assigner-Trend Micro, Inc.
ShareView Details
Matching Score-4
Assigner-Trend Micro, Inc.
CVSS Score-7||HIGH
EPSS-0.04% / 11.05%
||
7 Day CHG~0.00%
Published-26 Jun, 2023 | 21:56
Updated-04 Dec, 2024 | 21:25
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A Time-of-Check Time-Of-Use vulnerability in the Trend Micro Apex One and Apex One as a Service agent could allow a local attacker to escalate privileges on affected installations. Please note: a local attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. This is similar to, but not identical to CVE-2023-32555.

Action-Not Available
Vendor-Microsoft CorporationTrend Micro Incorporated
Product-apex_onewindowsTrend Micro Apex Onetrend_micro_apex_one
CWE ID-CWE-367
Time-of-check Time-of-use (TOCTOU) Race Condition
CVE-2023-28576
Matching Score-4
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-4
Assigner-Qualcomm, Inc.
CVSS Score-6.4||MEDIUM
EPSS-0.02% / 4.71%
||
7 Day CHG~0.00%
Published-08 Aug, 2023 | 09:15
Updated-02 Aug, 2024 | 13:43
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Time-of-check Time-of-use (TOCTOU) Race Condition in Camera Kernel Driver

The buffer obtained from kernel APIs such as cam_mem_get_cpu_buf() may be readable/writable in userspace after kernel accesses it. In other words, user mode may race and modify the packet header (e.g. header.count), causing checks (e.g. size checks) in kernel code to be invalid. This may lead to out-of-bounds read/write issues.

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-fastconnect_7800snapdragon_865_5gwcd9380_firmwarewsa8830qcs610sw5100psd865_5gfastconnect_6900fastconnect_6800fastconnect_6900_firmwaresnapdragon_8_gen_1_firmwarewcn3988_firmwareqcn9074snapdragon_870_5gwsa8835wcn3950_firmwaresnapdragon_8_gen_1wsa8810_firmwarewcd9380wcd9341_firmwarefastconnect_7800_firmwaresw5100wsa8810qca6436qcs410snapdragon_865\+_5gsnapdragon_x55_5gqcs610_firmwaresw5100p_firmwaresxr2130wcd9370snapdragon_865\+_5g_firmwarewcn3680bqca6426sxr2130_firmwarewcd9341wcn3980qca6391_firmwarewcn3950snapdragon_xr2_5g_firmwarewcd9370_firmwarewcn3660bwsa8815snapdragon_870_5g_firmwarewsa8830_firmwaresd865_5g_firmwareqca6426_firmwarewcn3660b_firmwarewcn3988wsa8815_firmwaresnapdragon_x55_5g_firmwarewcn3680b_firmwarewsa8835_firmwaresw5100_firmwareqcn9074_firmwarefastconnect_6800_firmwareqcs410_firmwaresnapdragon_865_5g_firmwareqca6391wcn3980_firmwareqca6436_firmwaresnapdragon_xr2_5gSnapdragon
CWE ID-CWE-367
Time-of-check Time-of-use (TOCTOU) Race Condition
CVE-2023-26299
Matching Score-4
Assigner-HP Inc.
ShareView Details
Matching Score-4
Assigner-HP Inc.
CVSS Score-7||HIGH
EPSS-0.15% / 36.67%
||
7 Day CHG~0.00%
Published-30 Jun, 2023 | 15:40
Updated-04 Dec, 2024 | 16:06
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A potential Time-of-Check to Time-of-Use (TOCTOU) vulnerability has been identified in certain HP PC products using AMI UEFI Firmware (system BIOS), which might allow arbitrary code execution. AMI has released updates to mitigate the potential vulnerability.

Action-Not Available
Vendor-HP Inc.
Product-pro_tower_290_g9_desktop_firmware280_pro_g5_small_form_factor_firmware205_g4_22_all-in-one290_g1t430_firmware200_pro_g4_22_all-in-one_firmwarezhan_86_pro_g2_microtower_firmwareproone_240_g10_firmwaredesktop_pro_g1_microtower_firmware260_g4_desktop_mini_firmware280_g3_firmware280_g6_firmware470_g10desktop_pro_g1_microtowerpro_small_form_factor_280_g9_desktop_firmware240_g10_firmware282_pro_g4_microtower_firmware290_g3349_g7247_g8_firmwarepro_tower_290_g9_desktop280_g5_firmware282_g5_firmwareproone_490_g3280_g5_small_form_factor_firmware470_g9280_g4_microtower_firmwareproone_240_g10280_g4_microtowerproone_440_g3pro_small_form_factor_zhan_66_g9_desktop280_g8_microtower280_pro_g3t430250_g10_firmware255_g10_firmware290_g2280_pro_g4_microtower_firmware290_g2_firmware245_g6_firmware290_g2_microtowerproone_496_g3288_g5_firmwareproone_440_g3_firmware280_g4_firmwarepro_tower_280_g9_desktop290_g2_microtower_firmwarepro_tower_zhan_99_g9_desktop245_g6200_g3205_pro_g4_22_all-in-onepro_tower_200_g9_desktop245_g8_firmwarezhan_99_g4z_vr_backpack_g1_workstation_firmwarezhan_99_pro_g1_microtower_firmware280_pro_g5_small_form_factor288_g6zhan_99_g4_firmware247_g8288_pro_g4_microtower_firmwarez_vr_backpack_g1_workstationt628280_g4288_g6_firmware255_g10proone_496_g3_firmwarezhan_99_g2_firmwareproone_240_g9_firmwarepro_small_form_factor_290_g9_desktop_firmware280_g3200_g4_22_all-in-onepro_tower_200_g9_desktop_firmwarezhan_86_pro_g2_microtower250_g10282_pro_g4_microtowerpro_tower_zhan_99_g9_desktop_firmware282_g6240_g10zhan_99_g2290_g4proone_490_g3_firmware280_g5260_g4_desktop_mini290_g4_firmware280_g5_small_form_factor280_pro_g4_microtower282_g6_firmware290_g1_firmware290_g3_small_form_factorpro_small_form_factor_zhan_66_g9_desktop_firmwarezhan_99_pro_g1_microtower200_g3_firmwarepro_small_form_factor_280_g9_desktoppro_small_form_factor_290_g9_desktop349_g7_firmware280_g8_microtower_firmwareproone_240_g9t628_firmware245_g7470_g10_firmware282_g5288_pro_g4_microtower280_pro_g3_firmwarevr_backpack_g2_firmware280_g6200_g4_22_all-in-one_firmware205_g4_22_all-in-one_firmwarepro_tower_280_g9_desktop_firmwarevr_backpack_g2470_g9_firmware245_g7_firmware200_pro_g4_22_all-in-one290_g3_small_form_factor_firmware288_g5290_g3_firmware205_pro_g4_22_all-in-one_firmware245_g8HP PC products using AMI UEFI Firmware
CWE ID-CWE-367
Time-of-check Time-of-use (TOCTOU) Race Condition
CVE-2022-48618
Matching Score-4
Assigner-Apple Inc.
ShareView Details
Matching Score-4
Assigner-Apple Inc.
CVSS Score-7||HIGH
EPSS-0.18% / 39.86%
||
7 Day CHG~0.00%
Published-09 Jan, 2024 | 17:58
Updated-30 Jul, 2025 | 01:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Known KEV||Action Due Date - 2024-02-21||Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.

The issue was addressed with improved checks. This issue is fixed in macOS Ventura 13.1, watchOS 9.2, iOS 16.2 and iPadOS 16.2, tvOS 16.2. An attacker with arbitrary read and write capability may be able to bypass Pointer Authentication. Apple is aware of a report that this issue may have been exploited against versions of iOS released before iOS 15.7.1.

Action-Not Available
Vendor-Apple Inc.
Product-ipadoswatchostvosiphone_osmacostvOSwatchOSiOS and iPadOSmacOSwatchosiphone_osmacosipadostvosMultiple Products
CWE ID-CWE-367
Time-of-check Time-of-use (TOCTOU) Race Condition
CVE-2022-44651
Matching Score-4
Assigner-Trend Micro, Inc.
ShareView Details
Matching Score-4
Assigner-Trend Micro, Inc.
CVSS Score-7||HIGH
EPSS-0.06% / 18.22%
||
7 Day CHG~0.00%
Published-21 Nov, 2022 | 17:57
Updated-28 Apr, 2025 | 19:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A Time-of-Check Time-Of-Use vulnerability in the Trend Micro Apex One and Apex One as a Service agent could allow a local attacker to escalate privileges on affected installations. Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.

Action-Not Available
Vendor-Trend Micro Incorporated
Product-apex_oneTrend Micro Apex One
CWE ID-CWE-367
Time-of-check Time-of-use (TOCTOU) Race Condition
CVE-2024-53032
Matching Score-4
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-4
Assigner-Qualcomm, Inc.
CVSS Score-7.8||HIGH
EPSS-0.01% / 1.77%
||
7 Day CHG~0.00%
Published-03 Mar, 2025 | 10:07
Updated-07 Mar, 2025 | 11:47
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Time-of-check Time-of-use (TOCTOU) Race Condition in Automotive OS Platform

Memory corruption may occur in keyboard virtual device due to guest VM interaction.

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-sa9000pqca6595au_firmwaresa8650p_firmwareqam8775psa8255pqamsrv1m_firmwareqca6595qca6688aq_firmwaresa8770psa8775psrv1h_firmwaresa8620p_firmwareqam8650p_firmwareqca6595_firmwaresrv1mqam8620psa8775p_firmwareqamsrv1msa9000p_firmwaresrv1hqca6574ausa7255psrv1m_firmwaresa8620psa7775psa8650pqam8620p_firmwaresa8540p_firmwaresa7255p_firmwareqam8775p_firmwareqam8295p_firmwareqam8255pqca6688aqqca6698aqsa7775p_firmwaresa8255p_firmwaresa8770p_firmwaresa8295p_firmwareqca6696_firmwareqam8295pqamsrv1hsrv1l_firmwareqca6574au_firmwareqamsrv1h_firmwareqca6595auqam8255p_firmwaresa8295psrv1lqca6698aq_firmwareqam8650pqca6696sa8540pSnapdragon
CWE ID-CWE-367
Time-of-check Time-of-use (TOCTOU) Race Condition
CVE-2024-53289
Matching Score-4
Assigner-Dell
ShareView Details
Matching Score-4
Assigner-Dell
CVSS Score-7.8||HIGH
EPSS-0.02% / 2.80%
||
7 Day CHG~0.00%
Published-11 Dec, 2024 | 07:40
Updated-04 Feb, 2025 | 16:13
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Dell ThinOS version 2408 contains a Time-of-check Time-of-use (TOCTOU) Race Condition vulnerability. A low privileged attacker with local access could potentially exploit this vulnerability, leading to Elevation of Privileges.

Action-Not Available
Vendor-Dell Inc.
Product-thinosWyse Proprietary OS (Modern ThinOS)
CWE ID-CWE-367
Time-of-check Time-of-use (TOCTOU) Race Condition
CVE-2024-50592
Matching Score-4
Assigner-SEC Consult Vulnerability Lab
ShareView Details
Matching Score-4
Assigner-SEC Consult Vulnerability Lab
CVSS Score-7||HIGH
EPSS-0.02% / 4.60%
||
7 Day CHG~0.00%
Published-08 Nov, 2024 | 12:15
Updated-08 Nov, 2024 | 19:01
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Local Privilege Escalation via Race Condition

An attacker with local access the to medical office computer can escalate his Windows user privileges to "NT AUTHORITY\SYSTEM" by exploiting a race condition in the Elefant Update Service during the repair or update process. When using the repair function, the service queries the server for a list of files and their hashes. In addition, instructions to execute binaries to finalize the repair process are included. The executables are executed as "NT AUTHORITY\SYSTEM" after they are copied over to the user writable installation folder (C:\Elefant1). This means that a user can overwrite either "PostESUUpdate.exe" or "Update_OpenJava.exe" in the time frame after the copy and before the execution of the final repair step. The overwritten executable is then executed as "NT AUTHORITY\SYSTEM".

Action-Not Available
Vendor-HASOMEDhasomed
Product-Elefant Software Updaterelefant_software_updater
CWE ID-CWE-367
Time-of-check Time-of-use (TOCTOU) Race Condition
CVE-2024-45565
Matching Score-4
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-4
Assigner-Qualcomm, Inc.
CVSS Score-7.8||HIGH
EPSS-0.01% / 1.49%
||
7 Day CHG~0.00%
Published-06 May, 2025 | 08:31
Updated-09 May, 2025 | 19:17
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Time-of-check Time-of-use (TOCTOU) Race Condition in Camera Driver

Memory corruption when blob structure is modified by user-space after kernel verification.

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-snapdragon_429_mobile_firmwarewcn3620_firmwaresdm429wwcn3620sdm429w_firmwarewcn3660b_firmwaresnapdragon_429_mobilewcn3660bSnapdragon
CWE ID-CWE-367
Time-of-check Time-of-use (TOCTOU) Race Condition
CVE-2024-45560
Matching Score-4
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-4
Assigner-Qualcomm, Inc.
CVSS Score-7.8||HIGH
EPSS-0.02% / 2.33%
||
7 Day CHG~0.00%
Published-03 Feb, 2025 | 16:51
Updated-12 Feb, 2025 | 20:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Time-of-check Time-of-use (TOCTOU) Race Condition in Camera

Memory corruption while taking a snapshot with hardware encoder due to unvalidated userspace buffer.

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-fastconnect_7800_firmwarewsa8840qcm6490_firmwaresdm429wsc8380xp_firmwareqcs5430wsa8845h_firmwareqca6420wcn3620_firmwarewsa8845qcm6490wcd9380_firmwareqca6391_firmwaresc8180x-ad_firmwareqca6391qcs5430_firmwarewcn3660bsdm429w_firmwareqca6430wsa8845_firmwarevideo_collaboration_vc3_platform_firmwareqcm5430wcd9370wcd9340_firmwaresc8180x-acafsnapdragon_429_mobile_firmwarewsa8835wsa8845haqt1000_firmwarefastconnect_7800wcd9341_firmwarewcd9340wcd9341sc8280xp-abbbsc8180x-aaab_firmwarefastconnect_6900qcm5430_firmwarefastconnect_6800snapdragon_7c\+_gen_3_computesnapdragon_429_mobilefastconnect_6700wcd9375_firmwaresnapdragon_7c\+_gen_3_compute_firmwarewsa8810_firmwarewcd9385_firmwarewsa8810fastconnect_6700_firmwaresc8180x-adwcd9375sc8280xp-abbb_firmwaresc8180x-aaabqca6420_firmwarewsa8815fastconnect_6200_firmwareqca6430_firmwarewcd9380video_collaboration_vc3_platformwsa8830wsa8815_firmwarefastconnect_6200wsa8830_firmwarewcn3620fastconnect_6900_firmwareqcs6490qcs6490_firmwaresc8180x-acaf_firmwaresc8380xpaqt1000fastconnect_6800_firmwarewcd9385wsa8840_firmwarewcn3660b_firmwarewsa8835_firmwarewcd9370_firmwareSnapdragon
CWE ID-CWE-367
Time-of-check Time-of-use (TOCTOU) Race Condition
CVE-2022-43779
Matching Score-4
Assigner-HP Inc.
ShareView Details
Matching Score-4
Assigner-HP Inc.
CVSS Score-7||HIGH
EPSS-0.14% / 35.25%
||
7 Day CHG~0.00%
Published-03 Feb, 2023 | 16:42
Updated-25 Mar, 2025 | 21:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A potential Time-of-Check to Time-of-Use (TOCTOU) vulnerability has been identified in certain HP PC products using AMI UEFI Firmware (system BIOS) which might allow arbitrary code execution, denial of service, and information disclosure. AMI has released updates to mitigate the potential vulnerability.

Action-Not Available
Vendor-HP Inc.
Product-desktop_pro_a_g2_microtower_firmwarezhan_66_pro_a_g1_r_microtowerdesktop_pro_a_g2_firmwaredesktop_pro_g3rp2_retail_system_2000218_pro_g5_mt280_g3_microtower_pczhan_66_pro_g1_r_microtower280_g3_microtower_pc_firmwarerp2_retail_system_2020zhan_66_pro_g1_r_microtower_firmware260_g2_desktop_mini260_g4_desktop_mini_firmware260_g3_desktop_minidesktop_pro_a_300_g3desktop_pro_g3_microtower_firmware260_g4_desktop_minizhan_66_pro_a_g1_microtower_firmwaredesktop_pro_g3_microtowerdesktop_pro_300_g3_firmware218_pro_g5_mt_firmwaredesktop_pro_a_300_g3_firmwaredesktop_pro_a_g3_firmwaredesktop_pro_a_g2_microtower288_pro_g3_microtower_pc290_g1_microtower_firmware260_g2_desktop_mini_firmwarezhan_66_pro_a_g1_microtowerdesktop_pro_a_g3rp2_retail_system_2020_firmware290_g1_microtower288_pro_g3_microtower_pc_firmwaredesktop_pro_microtower_firmwarezhan_86_pro_g1_microtower_firmwaredesktop_pro_300_g3348_g4desktop_pro_a_g3_microtowerdesktop_pro_microtowerzhan_66_pro_a_g1_r_microtower_firmware280_g3_pci_microtower_pcdesktop_pro_a_g2zhan_86_pro_g1_microtowerrp2_retail_system_2000_firmwarerp2_retail_system_2030_firmware280_g3_pci_microtower_pc_firmware348_g4_firmwarerp2_retail_system_2030260_g3_desktop_mini_firmwaredesktop_pro_a_g3_microtower_firmwaredesktop_pro_g3_firmwareHP PC products using AMI UEFI Firmware
CWE ID-CWE-367
Time-of-check Time-of-use (TOCTOU) Race Condition
CVE-2024-39425
Matching Score-4
Assigner-Adobe Systems Incorporated
ShareView Details
Matching Score-4
Assigner-Adobe Systems Incorporated
CVSS Score-7||HIGH
EPSS-0.04% / 9.59%
||
7 Day CHG~0.00%
Published-14 Aug, 2024 | 15:07
Updated-15 Aug, 2024 | 17:17
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Security vulnerability in AdobeARMHelper

Acrobat Reader versions 20.005.30636, 24.002.20965, 24.002.20964, 24.001.30123 and earlier are affected by a Time-of-check Time-of-use (TOCTOU) Race Condition vulnerability that could lead to privilege escalation. Exploitation of this issue require local low-privilege access to the affected system and attack complexity is high.

Action-Not Available
Vendor-Apple Inc.Microsoft CorporationAdobe Inc.
Product-acrobat_dcacrobat_readeracrobatacrobat_reader_dcwindowsmacosAcrobat Readeracrobat_dcacrobat_readeracrobat_reader_dcacrobat
CWE ID-CWE-367
Time-of-check Time-of-use (TOCTOU) Race Condition
CVE-2024-38406
Matching Score-4
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-4
Assigner-Qualcomm, Inc.
CVSS Score-7.8||HIGH
EPSS-0.02% / 3.32%
||
7 Day CHG~0.00%
Published-04 Nov, 2024 | 10:04
Updated-16 Nov, 2024 | 04:55
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Time-of-check Time-of-use (TOCTOU) Race Condition in Camera

Memory corruption while handling IOCTL calls in JPEG Encoder driver.

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-wsa8830wcd9380_firmwaresnapdragon_8c_compute_platform_\(sc8180x-ad\)_\"poipu_lite\"sdm429wsnapdragon_8cx_gen_2_5g_compute_platform_\(sc8180xp-aa\,_ab\)_firmwaresnapdragon_8cx_compute_platform_\(sc8180x-aa\,_ab\)snapdragon_7c_gen_2_compute_platform_\(sc7180-ad\)_\"rennell_pro\"_firmwarefastconnect_6800snapdragon_8cx_compute_platform_\(sc8180xp-ac\,_af\)_\"poipu_pro\"wsa8840wsa8835sdm429w_firmwaresnapdragon_7c\+_gen_3_computesc8180x\+sdx55wcd9380qca6420_firmwarefastconnect_6700video_collaboration_vc3_platformwcd9370snapdragon_8c_compute_platform_\(sc8180xp-ad\)_\"poipu_lite\"qcm5430_firmwarevideo_collaboration_vc3_platform_firmwaresnapdragon_8cx_gen_2_5g_compute_platform_\(sc8180x-ac\,_af\)_\"poipu_pro\"_firmwareqca6430_firmwaresnapdragon_8cx_compute_platform_\(sc8180x-aa\,_ab\)_firmwarewcd9385_firmwarewsa8845snapdragon_8cx_gen_3_compute_platform_\(sc8280xp-ab\,_bb\)fastconnect_6200wcd9340_firmwarewcn3660bwsa8815wsa8845_firmwaresnapdragon_8cx_gen_2_5g_compute_platform_\(sc8180x-ac\,_af\)_\"poipu_pro\"wcn3660b_firmwaresnapdragon_429_mobile_platform_firmwaresc8380xpfastconnect_6200_firmwarewsa8845h_firmwarewcd9375_firmwareqca6391qca6420snapdragon_429_mobile_platformfastconnect_7800snapdragon_7c_compute_platform_firmwareaqt1000_firmwareqcs6490qcm6490_firmwarewsa8840_firmwaresnapdragon_8cx_gen_2_5g_compute_platform_\(sc8180xp-aa\,_ab\)fastconnect_6900fastconnect_6900_firmwaresc8380xp_firmwaresnapdragon_8cx_compute_platform_\(sc8180xp-ac\,_af\)_\"poipu_pro\"_firmwareqca6430sm6250wcd9340fastconnect_6700_firmwarewsa8810_firmwarewcd9341_firmwarefastconnect_7800_firmwarewsa8810wsa8845hqcm5430qcs5430wcd9385wcd9341snapdragon_8c_compute_platform_\(sc8180x-ad\)_\"poipu_lite\"_firmwaresnapdragon_7c_gen_2_compute_platform_\(sc7180-ad\)_\"rennell_pro\"qcs6490_firmwareqcs5430_firmwareqca6391_firmwarewcd9375wcd9370_firmwareaqt1000snapdragon_8c_compute_platform_\(sc8180xp-ad\)_\"poipu_lite\"_firmwaresm6250_firmwaresc8180x\+sdx55_firmwarewsa8830_firmwarewcn3620_firmwaresnapdragon_7c\+_gen_3_compute_firmwarewsa8815_firmwareqcm6490wsa8835_firmwarewcn3620snapdragon_8cx_gen_3_compute_platform_\(sc8280xp-ab\,_bb\)_firmwarefastconnect_6800_firmwaresnapdragon_7c_compute_platformSnapdragonaqt1000_firmwarewcd9380_firmwareqcm6490_firmwarewsa8840_firmwarefastconnect_6900_firmwaresc8380xp_firmwaresdm429w_firmwarefastconnect_6700_firmwarewsa8810_firmwarewcd9341_firmwarefastconnect_7800_firmwareqca6420_firmwareqcm5430_firmwareqca6430_firmwareqcs6490_firmwareqcs5430_firmwarequalcomm_video_collaboration_vc3_platform_firmwareqca6391_firmwarewcd9385_firmwarewcd9370_firmwarewcd9340_firmwaresm6250_firmwarewsa8830_firmwarewsa8845_firmwarewcn3620_firmwarewsa8815_firmwarewcn3660b_firmwarewsa8835_firmwaresnapdragon_429_mobile_platform_firmwarefastconnect_6200_firmwarewcd9375_firmwarewsa8845h_firmwarefastconnect_6800_firmware
CWE ID-CWE-367
Time-of-check Time-of-use (TOCTOU) Race Condition
CVE-2022-41744
Matching Score-4
Assigner-Trend Micro, Inc.
ShareView Details
Matching Score-4
Assigner-Trend Micro, Inc.
CVSS Score-7||HIGH
EPSS-0.05% / 14.09%
||
7 Day CHG~0.00%
Published-10 Oct, 2022 | 00:00
Updated-03 Aug, 2024 | 12:49
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A Time-of-Check Time-Of-Use vulnerability in the Trend Micro Apex One Vulnerability Protection integrated component could allow a local attacker to escalate privileges and turn a specific working directory into a mount point on affected installations. Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.

Action-Not Available
Vendor-Microsoft CorporationTrend Micro Incorporated
Product-apex_onewindowsTrend Micro Apex One
CWE ID-CWE-367
Time-of-check Time-of-use (TOCTOU) Race Condition
CVE-2024-35265
Matching Score-4
Assigner-Microsoft Corporation
ShareView Details
Matching Score-4
Assigner-Microsoft Corporation
CVSS Score-7||HIGH
EPSS-0.31% / 53.97%
||
7 Day CHG~0.00%
Published-11 Jun, 2024 | 17:00
Updated-16 Jul, 2025 | 00:42
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Windows Perception Service Elevation of Privilege Vulnerability

Windows Perception Service Elevation of Privilege Vulnerability

Action-Not Available
Vendor-Microsoft Corporation
Product-windows_10_21h2windows_10_1809windows_11_21h2windows_10_22h2windows_11_22h2windows_server_2019windows_11_23h2Windows 11 version 21H2Windows 11 Version 23H2Windows 11 version 22H3Windows Server 2019 (Server Core installation)Windows Server 2019Windows 11 version 22H2Windows 10 Version 22H2Windows 10 Version 21H2Windows 10 Version 1809
CWE ID-CWE-367
Time-of-check Time-of-use (TOCTOU) Race Condition
CVE-2024-36304
Matching Score-4
Assigner-Trend Micro, Inc.
ShareView Details
Matching Score-4
Assigner-Trend Micro, Inc.
CVSS Score-7.8||HIGH
EPSS-0.04% / 11.17%
||
7 Day CHG~0.00%
Published-10 Jun, 2024 | 21:21
Updated-16 Jun, 2025 | 20:39
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A Time-of-Check Time-Of-Use vulnerability in the Trend Micro Apex One and Apex One as a Service agent could allow a local attacker to escalate privileges on affected installations. Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.

Action-Not Available
Vendor-Trend Micro Incorporated
Product-apex_oneTrend Micro Apex OneTrend Micro Apex One as a Service
CWE ID-CWE-367
Time-of-check Time-of-use (TOCTOU) Race Condition
CVE-2022-33983
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-7||HIGH
EPSS-0.05% / 15.79%
||
7 Day CHG~0.00%
Published-14 Nov, 2022 | 00:00
Updated-30 Apr, 2025 | 21:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

DMA transactions which are targeted at input buffers used for the NvmExpressLegacy software SMI handler could cause SMRAM corruption through a TOCTOU attack. DMA transactions which are targeted at input buffers used for the software SMI handler used by the NvmExpressLegacy driver could cause SMRAM corruption through a TOCTOU attack. This issue was discovered by Insyde engineering based on the general description provided by Intel's iSTARE group. This issue was fixed in kernel 5.2: 05.27.25, kernel 5.3: 05.36.25, kernel 5.4: 05.44.25, kernel 5.5: 05.52.25 https://www.insyde.com/security-pledge/SA-2022053

Action-Not Available
Vendor-n/aInsyde Software Corp. (ISC)
Product-kerneln/a
CWE ID-CWE-367
Time-of-check Time-of-use (TOCTOU) Race Condition
CVE-2022-33984
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-7||HIGH
EPSS-0.05% / 14.62%
||
7 Day CHG~0.00%
Published-14 Nov, 2022 | 00:00
Updated-30 Apr, 2025 | 20:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

DMA transactions which are targeted at input buffers used for the SdMmcDevice software SMI handler could cause SMRAM corruption through a TOCTOU attack. DMA transactions which are targeted at input buffers used for the software SMI handler used by the SdMmcDevice driver could cause SMRAM corruption through a TOCTOU attack. This issue was discovered by Insyde engineering based on the general description provided by Intel's iSTARE group. This was fixed in kernel 5.2: 05.27.25, kernel 5.3: 05.36.25, kernel 5.4: 05.44.25, kernel 5.5: 05.52.25 https://www.insyde.com/security-pledge/SA-2022054

Action-Not Available
Vendor-n/aInsyde Software Corp. (ISC)
Product-kerneln/a
CWE ID-CWE-367
Time-of-check Time-of-use (TOCTOU) Race Condition
CVE-2022-34398
Matching Score-4
Assigner-Dell
ShareView Details
Matching Score-4
Assigner-Dell
CVSS Score-7.5||HIGH
EPSS-0.04% / 10.13%
||
7 Day CHG~0.00%
Published-01 Feb, 2023 | 05:28
Updated-26 Mar, 2025 | 18:53
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Dell BIOS contains a Time-of-check Time-of-use vulnerability. A local authenticated malicious user could\u00a0potentially exploit this vulnerability by using a specifically timed DMA transaction during an SMI to gain arbitrary code execution on the system.

Action-Not Available
Vendor-Dell Inc.
Product-optiplex_7760_all-in-one_firmwarelatitude_5401optiplex_7770_all-in-oneinspiron_3470latitude_e7270precision_3541_firmwarealienware_m15_r1alienware_x15_r2vostro_3669inspiron_5680vostro_3881_firmwarelatitude_7200_2-in-1inspiron_5477_firmwarelatitude_5511_firmwarelatitude_7380_firmwareprecision_3550vostro_3888inspiron_5490_all-in-one_firmwaredell_g3_15_3590inspiron_5570latitude_7370vostro_3888_firmwarelatitude_7370_firmwareoptiplex_5070_firmwarealienware_aurora_r13precision_7540latitude_3390_2-in-1latitude_3310_2-in-1wyse_5070latitude_5490alienware_area_51m_r1_firmwarelatitude_5590optiplex_5080latitude_5511latitude_7390_2-in-1latitude_7214_rugged_extreme_firmwareprecision_5530_2-in-1alienware_m17_r2vostro_3070_firmwarelatitude_3190_2-in-1optiplex_7071alienware_x14_firmwarealienware_m15_r1_firmwaredell_g5_5000_firmwareinspiron_3583alienware_m17_r3_firmwarelatitude_5300precision_7720edge_gateway_5000vostro_3481alienware_x14latitude_9410_firmwarevostro_7590precision_5530_firmwarelatitude_e7270_firmwarelatitude_5280_firmwarelatitude_3180latitude_5300_2-in-1latitude_7424_rugged_extreme_firmwareoptiplex_5050optiplex_3070_firmwarealienware_aurora_r11latitude_7410_firmwarevostro_3667latitude_7300alienware_x15_r2_firmwarelatitude_e7470_firmwareprecision_3620_toweroptiplex_5260_all-in-oneprecision_7720_firmwarelatitude_5310_2-in-1precision_3431_toweroptiplex_3060_firmwareinspiron_3780inspiron_3782latitude_3590_firmwarelatitude_7490_firmwarealienware_m15_r2latitude_7390_firmwarelatitude_5500_firmwareprecision_7710latitude_5410_firmwareprecision_5520vostro_5090_firmwarelatitude_5310_2-in-1_firmwarexps_8950latitude_7400latitude_5591optiplex_5270_all-in-one_firmwareinspiron_3502_firmwareprecision_3520dell_g3_3579inspiron_3471inspiron_3880_firmwareoptiplex_5050_firmwareprecision_7520_firmwareoptiplex_7071_firmwareoptiplex_3050precision_7820_tower_firmwareoptiplex_5080_firmwareoptiplex_7460_all-in-onevostro_3471optiplex_5070dell_latitude_3480_firmwareinspiron_3480_firmwarealienware_m15_r3optiplex_5060_firmwareoptiplex_3050_all-in-one_firmwarexps_15_9575_2-in-1optiplex_3090_firmwarevostro_3581_firmwareprecision_7530_firmwarealienware_m17_r4_firmwarealienware_x17_r1vostro_3581latitude_9410inspiron_7777optiplex_7070optiplex_7080_firmwarevostro_3583_firmwarelatitude_5420_rugged_firmwareinspiron_3521latitude_3190_firmwarelatitude_5310aurora_r14_firmwareinspiron_5490_all-in-oneoptiplex_7460_all-in-one_firmwareinspiron_5401_all-in-one_firmwaredell_g3_3779_firmwarelatitude_5420_ruggedvostro_3268_firmwarealienware_aurora_r8latitude_7220_rugged_extreme_tabletlatitude_5500alienware_x15_r1precision_7550_firmwarelatitude_7390_2-in-1_firmwareinspiron_5400latitude_7480_firmwareinspiron_5477chengming_3991latitude_5288_firmwarevostro_5090inspiron_5480latitude_3190inspiron_3510_firmwarelatitude_7220ex_rugged_extreme_tablet_firmwarealienware_aurora_r8_firmwarexps_8950_firmwareinspiron_3881_firmwarelatitude_5488latitude_5290_2-in-1_firmwareinspiron_3471_firmwarevostro_3669_firmwarelatitude_7380optiplex_5480_all-in-one_firmwareprecision_3540alienware_aurora_r11_firmwarealienware_x17_r2_firmwarelatitude_5501latitude_7400_firmwareprecision_7710_firmwareinspiron_3580_firmwarelatitude_3590inspiron_3781_firmwarewyse_5070_firmwareprecision_5720_all-in-onechengming_3990vostro_3670_firmwarelatitude_7214_rugged_extremeinspiron_3510inspiron_3280_firmwarelatitude_3310latitude_7414_rugged_extreme_firmwarelatitude_5290_2-in-1precision_7520vostro_3583alienware_x17_r2wyse_5470_all-in-one_firmwarelatitude_5491_firmwarevostro_5880_firmwareprecision_7820_toweroptiplex_3090latitude_7290latitude_7212_rugged_extreme_tablet_firmwarealienware_area_51m_r1precision_7540_firmwarelatitude_13_3380_firmwareinspiron_3582latitude_7480latitude_7285_2-in-1_firmwareoptiplex_3060vostro_3881wyse_5470_firmwareoptiplex_5060latitude_5285_2-in-1edge_gateway_5000_firmwarechengming_3988_firmwareinspiron_3584inspiron_5770alienware_m17_r2_firmwarewyse_5470_all-in-onelatitude_3580precision_5820_tower_firmwareprecision_3530_firmwarelatitude_3190_2-in-1_firmwarelatitude_5580_firmwareinspiron_5480_firmwareinspiron_5481_2-in-1latitude_7210_2-in-1latitude_3189optiplex_xe3_firmwareinspiron_7590xps_15_9575_2-in-1_firmwarevostro_5880vostro_3580latitude_13_3380vostro_3268precision_7750optiplex_7070_firmwarevostro_3584optiplex_5270_all-in-oneoptiplex_xe3embedded_box_pc_5000dell_g5_15_5590embedded_box_pc_3000_firmwarevostro_3481_firmwareinspiron_3502latitude_5491inspiron_3580vostro_3267_firmwarevostro_3470_firmwareoptiplex_7080alienware_aurora_r12optiplex_5480_all-in-onealienware_aurora_r9dell_g7_15_7590_firmwarelatitude_7280alienware_area_51m_r2_firmwarelatitude_5400alienware_m15_r4_firmwarealienware_aurora_r13_firmwarelatitude_5410latitude_5480precision_3541xps_8940optiplex_7050_firmwareprecision_7730_firmwareprecision_3551latitude_5401_firmwarealienware_m17_r3precision_5820_towerprecision_7730latitude_5414_rugged_firmwareprecision_3640_tower_firmwarelatitude_5424_rugged_firmwarelatitude_7275_2-in-1_firmwarelatitude_7300_firmwarealienware_x15_r1_firmwareembedded_box_pc_3000latitude_5510dell_g3_3779optiplex_7770_all-in-one_firmwarelatitude_5400_firmwarewyse_5470alienware_m17_r4optiplex_7780_all-in-one_firmwareinspiron_7700_all-in-onevostro_3671_firmwareprecision_3440precision_7510_firmwareprecision_3440_firmwareprecision_5530_2-in-1_firmwarealienware_x17_r1_firmwarexps_8930optiplex_7470_all-in-onelatitude_3310_2-in-1_firmwareoptiplex_5250_firmwareinspiron_5680_firmwarealienware_m15_r3_firmwareinspiron_3671_firmwareprecision_3550_firmwarevostro_3668_firmwarelatitude_7410latitude_3310_firmwarelatitude_5501_firmwaredell_g3_15_3590_firmwareinspiron_3781optiplex_3280_all-in-one_firmwarelatitude_5411optiplex_3050_firmwarealienware_aurora_r10_firmwareoptiplex_7450_firmwareoptiplex_7450inspiron_7590_firmwareinspiron_3521_firmwareprecision_7740_firmwaredell_g5_5090_firmwarelatitude_7285_2-in-1latitude_3189_firmwarealienware_m15_r2_firmwarelatitude_7389vostro_3681inspiron_7591_firmwaredell_g5_15_5590_firmwareinspiron_5570_firmwareprecision_7920_towerlatitude_5290latitude_7400_2-in-1_firmwarelatitude_5289_firmwarechengming_3980_firmwareinspiron_3481inspiron_3780_firmwareprecision_3530inspiron_3582_firmwarelatitude_5411_firmwarelatitude_3120_firmwareinspiron_3470_firmwareaurora_r14latitude_5590_firmwareoptiplex_7070_ultraprecision_7740vostro_3267inspiron_3671inspiron_3481_firmwareprecision_5530latitude_7275_2-in-1latitude_7310_firmwareprecision_5540optiplex_3050_all-in-onedell_latitude_3580_firmwareinspiron_3584_firmwarelatitude_9510optiplex_3280_all-in-onewyse_7040_thininspiron_3480inspiron_3583_firmwareinspiron_5770_firmwarelatitude_3490precision_3930_rack_firmwareinspiron_3670latitude_3180_firmwarevostro_3681_firmwarealienware_m17_r1_firmwarevostro_3580_firmwareinspiron_3581_firmwarelatitude_9510_firmwareprecision_3430_tower_firmwarelatitude_3300_firmwarelatitude_7400_2-in-1precision_3640_towerdell_g5_5090latitude_3490_firmwarelatitude_5300_2-in-1_firmwarevostro_3668latitude_7210_2-in-1_firmwareoptiplex_7760_all-in-onelatitude_7280_firmwarelatitude_5510_firmwarevostro_3670edge_gateway_3000latitude_5280inspiron_3670_firmwarelatitude_7212_rugged_extreme_tabletoptiplex_7780_all-in-onelatitude_7220_rugged_extreme_tablet_firmwareprecision_3540_firmwarelatitude_5300_firmwareinspiron_7777_firmwareinspiron_3482_firmwareinspiron_3880latitude_5289inspiron_5481_2-in-1_firmwarelatitude_5480_firmwareprecision_3431_tower_firmwarevostro_3471_firmwareoptiplex_3080_firmwareprecision_3930_rackprecision_7550precision_3420_towerinspiron_7700_all-in-one_firmwareinspiron_3881inspiron_3482dell_g3_3579_firmwarexps_13_9380latitude_7220ex_rugged_extreme_tabletlatitude_7414_rugged_extremeprecision_3420_tower_firmwareoptiplex_3080alienware_m17_r1alienware_area_51m_r2dell_g5_5000dell_g7_17_7790_firmwarelatitude_3480latitude_5490_firmwarelatitude_5591_firmwarelatitude_5310_firmwareinspiron_3782_firmwarevostro_3070alienware_m15_r4precision_3430_towervostro_3671precision_5520_firmwareinspiron_7591latitude_7310inspiron_5401_all-in-oneinspiron_7790wyse_7040_thin_firmwarechengming_3988inspiron_7790_firmwarexps_15_7590latitude_3300latitude_5580precision_3620_tower_firmwareedge_gateway_3000_firmwareprecision_5540_firmwarevostro_3584_firmwarelatitude_3390_2-in-1_firmwareoptiplex_7480_all-in-onechengming_3990_firmwarexps_8940_firmwaredell_g7_15_7590latitude_3120vostro_3480precision_3520_firmwarechengming_3980precision_3551_firmwareoptiplex_7070_ultra_firmwareoptiplex_5260_all-in-one_firmwareoptiplex_7060latitude_7200_2-in-1_firmwarelatitude_5290_firmwarelatitude_7424_rugged_extremevostro_3582_firmwareprecision_3630_towervostro_3470latitude_5414_ruggedoptiplex_7480_all-in-one_firmwarealienware_aurora_r9_firmwareoptiplex_3070inspiron_3280latitude_7390latitude_7290_firmwareprecision_7530xps_8930_firmwaredell_g7_17_7790precision_3240_compactprecision_7750_firmwareprecision_5720_all-in-one_firmwarealienware_aurora_r12_firmwarelatitude_5285_2-in-1_firmwareprecision_7510vostro_3480_firmwarechengming_3991_firmwarevostro_7590_firmwarexps_15_7590_firmwareembedded_box_pc_5000_firmwarealienware_aurora_r10optiplex_7050precision_3510_firmwareprecision_3510xps_13_9380_firmwarelatitude_7490latitude_5288latitude_7389_firmwareoptiplex_7060_firmwareprecision_3240_compact_firmwareoptiplex_7470_all-in-one_firmwarelatitude_e7470precision_3630_tower_firmwareoptiplex_5250inspiron_3581vostro_3582vostro_3667_firmwareprecision_7920_tower_firmwareinspiron_5400_firmwarelatitude_5424_ruggedlatitude_5488_firmwareCPG BIOS
CWE ID-CWE-367
Time-of-check Time-of-use (TOCTOU) Race Condition
CVE-2022-33909
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-7||HIGH
EPSS-0.05% / 15.79%
||
7 Day CHG~0.00%
Published-14 Nov, 2022 | 00:00
Updated-30 Apr, 2025 | 19:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

DMA transactions which are targeted at input buffers used for the HddPassword software SMI handler could cause SMRAM corruption through a TOCTOU attack. DMA transactions which are targeted at input buffers used for the software SMI handler used by the HddPassword driver could cause SMRAM corruption through a TOCTOU attack..This issue was discovered by Insyde engineering based on the general description provided by Intel's iSTARE group. Fixed in kernel Kernel 5.2: 05.27.23, Kernel 5.3: 05.36.23, Kernel 5.4: 05.44.23, Kernel 5.5: 05.52.23 https://www.insyde.com/security-pledge/SA-2022051

Action-Not Available
Vendor-n/aInsyde Software Corp. (ISC)
Product-kerneln/a
CWE ID-CWE-367
Time-of-check Time-of-use (TOCTOU) Race Condition
CVE-2022-33985
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-7||HIGH
EPSS-0.05% / 15.79%
||
7 Day CHG~0.00%
Published-14 Nov, 2022 | 00:00
Updated-30 Apr, 2025 | 20:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

DMA transactions which are targeted at input buffers used for the NvmExpressDxe software SMI handler could cause SMRAM corruption through a TOCTOU attack. DMA transactions which are targeted at input buffers used for the software SMI handler used by the NvmExpressDxe driver could cause SMRAM corruption through a TOCTOU attack. This issue was discovered by Insyde engineering based on the general description provided by Intel's iSTARE group. This issue was fixed in kernel 5.2: 05.27.25, kernel 5.3: 05.36.25, kernel 5.4: 05.44.25, kernel 5.5: 05.52.25 https://www.insyde.com/security-pledge/SA-2022055

Action-Not Available
Vendor-n/aInsyde Software Corp. (ISC)
Product-kerneln/a
CWE ID-CWE-367
Time-of-check Time-of-use (TOCTOU) Race Condition
CVE-2022-33908
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-7||HIGH
EPSS-0.05% / 13.49%
||
7 Day CHG~0.00%
Published-14 Nov, 2022 | 00:00
Updated-30 Apr, 2025 | 19:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

DMA transactions which are targeted at input buffers used for the SdHostDriver software SMI handler could cause SMRAM corruption through a TOCTOU attack. DMA transactions which are targeted at input buffers used for the software SMI handler used by the SdHostDriver driver could cause SMRAM corruption through a TOCTOU attack. This issue was discovered by Insyde engineering based on the general description provided by Intel's iSTARE group. Fixed in kernel 5.2: 05.27.25, kernel 5.3: 05.36.25, kernel 5.4: 05.44.25, kernel 5.5: 05.52.25 https://www.insyde.com/security-pledge/SA-2022050

Action-Not Available
Vendor-n/aInsyde Software Corp. (ISC)
Product-kerneln/a
CWE ID-CWE-367
Time-of-check Time-of-use (TOCTOU) Race Condition
CVE-2022-32477
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-7||HIGH
EPSS-0.05% / 14.15%
||
7 Day CHG~0.00%
Published-15 Feb, 2023 | 00:00
Updated-05 May, 2025 | 17:18
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An issue was discovered in Insyde InsydeH2O with kernel 5.0 through 5.5. DMA attacks on the FvbServicesRuntimeDxe shared buffer used by SMM and non-SMM code could cause TOCTOU race-condition issues that could lead to corruption of SMRAM and escalation of privileges. This attack can be mitigated using IOMMU protection for the ACPI runtime memory used for the command buffer. This attack can be mitigated by copying the firmware block services data to SMRAM before checking it.

Action-Not Available
Vendor-n/aInsyde Software Corp. (ISC)
Product-insydeh2on/a
CWE ID-CWE-367
Time-of-check Time-of-use (TOCTOU) Race Condition
CVE-2022-32474
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-7||HIGH
EPSS-0.05% / 14.15%
||
7 Day CHG~0.00%
Published-15 Feb, 2023 | 00:00
Updated-20 Mar, 2025 | 14:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An issue was discovered in Insyde InsydeH2O with kernel 5.0 through 5.5. DMA attacks on the StorageSecurityCommandDxe shared buffer used by SMM and non-SMM code could cause TOCTOU race-condition issues that could lead to corruption of SMRAM and escalation of privileges. This attack can be mitigated using IOMMU protection for the ACPI runtime memory used for the command buffer. This attack can be mitigated by copying the firmware block services data to SMRAM before checking it.

Action-Not Available
Vendor-n/aInsyde Software Corp. (ISC)
Product-insydeh2on/a
CWE ID-CWE-367
Time-of-check Time-of-use (TOCTOU) Race Condition
CVE-2022-33257
Matching Score-4
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-4
Assigner-Qualcomm, Inc.
CVSS Score-9.3||CRITICAL
EPSS-0.04% / 11.96%
||
7 Day CHG~0.00%
Published-07 Mar, 2023 | 04:43
Updated-03 Aug, 2024 | 08:01
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Time-of-check time-of-use race condition in Core

Memory corruption in Core due to time-of-check time-of-use race condition during dump collection in trust zone.

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-qca9377_firmwaresd_8cx_gen3_firmwareqca8337qca6431_firmwaresdx65wcn3950_firmwaresa8150p_firmwareqcs2290qca6595au_firmwaresa6155qca6335csra6620_firmwareqcs605_firmwaresd_675_firmwarecsra6640_firmwarewcn3998qam8295psd_8cx_gen2_firmwareqcn6024_firmwaresm4125wcn3950sd_8_gen1_5g_firmwareqsm8350_firmwareqsm8350sd460_firmwaresm7315_firmwarewcn7850qca6574au_firmwarewcd9375_firmwareqca8081_firmwaresa6155_firmwarewcn3998_firmwareqca6420sd680_firmwarewcn3999sd_8cx_gen2qrb5165_firmwareqrb5165m_firmwareqca6698aqsa8155_firmwareqca4004_firmwaresd662_firmwareqcs405qca6430wcd9306_firmwarewcd9340sd765gsw5100qca6436sd680wcn6851sa6155pqcs603_firmwarewcn7851_firmwareqca6698aq_firmwarewcd9341qca6431qca6696_firmwaresd750gsd870_firmwarewcn3910_firmwaresxr2150p_firmwaresd_8cxsa8150pqca4004wsa8830_firmwaresd855_firmwaresd865_5g_firmwaresnapdragon_4_gen_1wcn3988wcn7850_firmwaresm8475qcn7606_firmwaresa8295p_firmwarewcn6750_firmwarewcn3991qca8337_firmwarewcd9380_firmwaressg2125psw5100pqca6564ausdx55m_firmwarewcn6856_firmwaresd670_firmwareqca6574wcd9380sd690_5g_firmwaresdx50m_firmwaresxr1230psdx24_firmwareqca6430_firmwareqcn9012_firmwarewcd9335_firmwarewcn3980qca6335_firmwareqcm4325_firmwareqcs605wcd9340_firmwarewsa8815wcn6850wcn3910qca6426_firmwareqca9984sd695qcn9024wcn3980_firmwaresdx55mqcc5100_firmwareqca6421_firmwaresa8295pwcn6740_firmwaresd678_firmwarear8031_firmwareqrb5165wcn6851_firmwareqcs603sd670qca6564a_firmwareqcn9024_firmwaresdx57mqcm4290_firmwaresd480sd870wcn6855wsa8832sa8540psw5100p_firmwareqsm8250sa6145psd695_firmwarear8031qca6595_firmwareqcs405_firmwaremdm9205_firmwareqca6391_firmwaresd780g_firmwarewcd9370_firmwaresdx55sd888_firmwaresa8155pcsra6640sd675sdx70mssg2115p_firmwaresxr2150par8035_firmwareqsm8250_firmwareqcm2290qcn7606wcn3991_firmwarewsa8830sd678qcs2290_firmwaresnapdragon_4_gen_1_firmwarecsra6620qcs4290sd765g_firmwareqca6420_firmwareqca6390_firmwaresd690_5gwcd9370sd675_firmwaressg2115pqca6426wcn3990_firmwareqrb5165n_firmwareqca9984_firmwareqca9377sd_8cx_firmwarewcd9385_firmwaresdxr2_5g_firmwarewcd9326_firmwaresd662qam8295p_firmwareqcn9011_firmwaresa8155sa9000p_firmwaresdx55_firmwareqca6595auwcn3999_firmwaresm7250p_firmwareqca6436_firmwareqrb5165nqca6564au_firmwaresd778gsa6155p_firmwareqca6310wcd9306wcn7851qcs6490sdxr2_5gwcn3988_firmwaresa6145p_firmwareqca6421sd778g_firmwarewsa8810_firmwaresd765_firmwarewcd9326wcd9335sg4150pqca8081qca6174a_firmwareqcs4290_firmwarewcd9385qcs6490_firmwaresd_8cx_gen3sdx70m_firmwarear8035qca6390sd750g_firmwareaqt1000wcd9375qcm6490sd888_5g_firmwarewcn6850_firmwarewsa8815_firmwarewsa8835_firmwareqca6564asg4150p_firmwareqcm4325qcm2290_firmwarewcn3990sd_675sd780gsd865_5gqca6595qcc5100sdx24qcn9012sd888wsa8835sxr1230p_firmwaresd665_firmwaresa8540p_firmwaresd888_5gssg2125p_firmwareqca6574awcn6855_firmwareqca6174asm7325pqca6310_firmwarewcn6750mdm9205sa9000pqca6574_firmwaresd855sm4125_firmwaresm7325p_firmwaresd665sdx57m_firmwaresd765qca6574a_firmwaresd768g_firmwareqrb5165msd850_firmwaresm7315sd460qca6391aqt1000_firmwaresdx65_firmwareqcm4290qcm6490_firmwaresdx50mwsa8832_firmwaresd480_firmwareqcn9011qca6574ausa8155p_firmwarewcd9341_firmwarewsa8810wcn6856sd768gwcn6740qca6696sd845_firmwareqcn6024sd845sm7250psw5100_firmwaresd850Snapdragonqca9377_firmwaresd_8cx_gen3_firmwarewcn3991_firmwareqcs2290_firmwareqca6431_firmwaresnapdragon_4_gen_1_firmwarewcn3950_firmwaresa8150p_firmwaresd765g_firmwareqca6420_firmwareqca6595au_firmwareqca6390_firmwarecsra6620_firmwareqcs605_firmwaresd_675_firmwaresd675_firmwarecsra6640_firmwarewcn3990_firmwareqrb5165n_firmwareqca9984_firmwaresd_8cx_firmwarewcd9385_firmwaresdxr2_5g_firmwaresd_8cx_gen2_firmwareqcn6024_firmwarewcd9326_firmwaresd_8_gen1_5g_firmwareqsm8350_firmwaresd460_firmwareqam8295p_firmwareqcn9011_firmwaresa9000p_firmwaresm7315_firmwareqca6574au_firmwaresdx55_firmwarewcd9375_firmwareqca8081_firmwaresa6155_firmwarewcn3998_firmwaresm7250p_firmwarewcn3999_firmwareqca6436_firmwareqca6564au_firmwaresd680_firmwaresa6155p_firmwareqrb5165_firmwareqrb5165m_firmwaresa8155_firmwareqca4004_firmwaresd662_firmwarewcn3988_firmwaresa6145p_firmwarewcd9306_firmwaresd778g_firmwarewsa8810_firmwaresd765_firmwareqcs603_firmwarewcn7851_firmwareqca6698aq_firmwareqca6174a_firmwareqcs4290_firmwareqca6696_firmwareqcs6490_firmwaresd870_firmwaresdx70m_firmwarewcn3910_firmwaresxr2150p_firmwaresd750g_firmwarewsa8830_firmwaresd855_firmwaresd865_5g_firmwarewsa8815_firmwaresd888_5g_firmwarewcn6850_firmwarewcn7850_firmwarewsa8835_firmwaresa8295p_firmwareqcn7606_firmwarewcn6750_firmwaresg4150p_firmwareqcm2290_firmwareqca8337_firmwarewcd9380_firmwaresdx55m_firmwarewcn6856_firmwaresd670_firmwaresxr1230p_firmwaresd665_firmwaresa8540p_firmwaressg2125p_firmwaresd690_5g_firmwaresdx50m_firmwarewcn6855_firmwaresdx24_firmwareqca6310_firmwareqca6430_firmwareqcn9012_firmwarewcd9335_firmwareqca6335_firmwareqcm4325_firmwareqca6574_firmwarewcd9340_firmwaresm4125_firmwaresm7325p_firmwaresdx57m_firmwareqca6426_firmwareqca6574a_firmwaresd768g_firmwaresd850_firmwarewcn3980_firmwareqcc5100_firmwareqca6421_firmwareaqt1000_firmwarewcn6740_firmwaresdx65_firmwaresd678_firmwarear8031_firmwareqcm6490_firmwarewsa8832_firmwaresd480_firmwarewcn6851_firmwaresa8155p_firmwareqca6564a_firmwareqcn9024_firmwarewcd9341_firmwareqcm4290_firmwaresw5100p_firmwaresd695_firmwareqca6595_firmwareqcs405_firmwaremdm9205_firmwareqca6391_firmwaresd845_firmwaresd780g_firmwarewcd9370_firmwaresd888_firmwaressg2115p_firmwaresw5100_firmwarear8035_firmwareqsm8250_firmware
CWE ID-CWE-367
Time-of-check Time-of-use (TOCTOU) Race Condition
CVE-2022-32476
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-7||HIGH
EPSS-0.05% / 14.15%
||
7 Day CHG~0.00%
Published-15 Feb, 2023 | 00:00
Updated-20 Mar, 2025 | 14:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An issue was discovered in Insyde InsydeH2O with kernel 5.0 through 5.5. DMA attacks on the AhciBusDxe shared buffer used by SMM and non-SMM code could cause TOCTOU race-condition issues that could lead to corruption of SMRAM and escalation of privileges. This attack can be mitigated using IOMMU protection for the ACPI runtime memory used for the command buffer. This attack can be mitigated by copying the firmware block services data to SMRAM before checking it.

Action-Not Available
Vendor-n/aInsyde Software Corp. (ISC)
Product-insydeh2on/a
CWE ID-CWE-367
Time-of-check Time-of-use (TOCTOU) Race Condition
  • Previous
  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • Next
Details not found