CVE-2022-29277 (GCVE-0-2022-29277)
Vulnerability from cvelistv5
Published
2022-11-15 00:00
Modified
2025-04-30 14:56
CWE
  • n/a
Summary
Incorrect pointer checks within the the FwBlockServiceSmm driver can allow arbitrary RAM modifications During review of the FwBlockServiceSmm driver, certain instances of SpiAccessLib could be tricked into writing 0xff to arbitrary system and SMRAM addresses. Fixed in: INTEL Purley-R: 05.21.51.0048 Whitley: 05.42.23.0066 Cedar Island: 05.42.11.0021 Eagle Stream: 05.44.25.0052 Greenlow/Greenlow-R(skylake/kabylake): Trunk Mehlow/Mehlow-R (CoffeeLake-S): Trunk Tatlow (RKL-S): Trunk Denverton: 05.10.12.0042 Snow Ridge: Trunk Graneville DE: 05.05.15.0038 Grangeville DE NS: 05.27.26.0023 Bakerville: 05.21.51.0026 Idaville: 05.44.27.0030 Whiskey Lake: Trunk Comet Lake-S: Trunk Tiger Lake H/UP3: 05.43.12.0052 Alder Lake: 05.44.23.0047 Gemini Lake: Not Affected Apollo Lake: Not Affected Elkhart Lake: 05.44.30.0018 AMD ROME: trunk MILAN: 05.36.10.0017 GENOA: 05.52.25.0006 Snowy Owl: Trunk R1000: 05.32.50.0018 R2000: 05.44.30.0005 V2000: Trunk V3000: 05.44.30.0007 Ryzen 5000: 05.44.30.0004 Embedded ROME: Trunk Embedded MILAN: Trunk Hygon Hygon #1/#2: 05.36.26.0016 Hygon #3: 05.44.26.0007 https://www.insyde.com/security-pledge/SA-2022060
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-03T06:17:54.724Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://www.insyde.com/security-pledge"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://www.insyde.com/security-pledge/SA-2022060"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "metrics": [
          {
            "cvssV3_1": {
              "attackComplexity": "LOW",
              "attackVector": "LOCAL",
              "availabilityImpact": "HIGH",
              "baseScore": 8.8,
              "baseSeverity": "HIGH",
              "confidentialityImpact": "HIGH",
              "integrityImpact": "HIGH",
              "privilegesRequired": "LOW",
              "scope": "CHANGED",
              "userInteraction": "NONE",
              "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H",
              "version": "3.1"
            }
          },
          {
            "other": {
              "content": {
                "id": "CVE-2022-29277",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-04-30T14:55:15.301726Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "problemTypes": [
          {
            "descriptions": [
              {
                "cweId": "CWE-787",
                "description": "CWE-787 Out-of-bounds Write",
                "lang": "en",
                "type": "CWE"
              }
            ]
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-04-30T14:56:19.558Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Incorrect pointer checks within the the FwBlockServiceSmm driver can allow arbitrary RAM modifications During review of the FwBlockServiceSmm driver, certain instances of SpiAccessLib could be tricked into writing 0xff to arbitrary system and SMRAM addresses. Fixed in: INTEL Purley-R: 05.21.51.0048 Whitley: 05.42.23.0066 Cedar Island: 05.42.11.0021 Eagle Stream: 05.44.25.0052 Greenlow/Greenlow-R(skylake/kabylake): Trunk Mehlow/Mehlow-R (CoffeeLake-S): Trunk Tatlow (RKL-S): Trunk Denverton: 05.10.12.0042 Snow Ridge: Trunk Graneville DE: 05.05.15.0038 Grangeville DE NS: 05.27.26.0023 Bakerville: 05.21.51.0026 Idaville: 05.44.27.0030 Whiskey Lake: Trunk Comet Lake-S: Trunk Tiger Lake H/UP3: 05.43.12.0052 Alder Lake: 05.44.23.0047 Gemini Lake: Not Affected Apollo Lake: Not Affected Elkhart Lake: 05.44.30.0018 AMD ROME: trunk MILAN: 05.36.10.0017 GENOA: 05.52.25.0006 Snowy Owl: Trunk R1000: 05.32.50.0018 R2000: 05.44.30.0005 V2000: Trunk V3000: 05.44.30.0007 Ryzen 5000: 05.44.30.0004 Embedded ROME: Trunk Embedded MILAN: Trunk Hygon Hygon #1/#2: 05.36.26.0016 Hygon #3: 05.44.26.0007 https://www.insyde.com/security-pledge/SA-2022060"
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2022-11-15T00:00:00.000Z",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "url": "https://www.insyde.com/security-pledge"
        },
        {
          "url": "https://www.insyde.com/security-pledge/SA-2022060"
        }
      ],
      "source": {
        "discovery": "INTERNAL"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2022-29277",
    "datePublished": "2022-11-15T00:00:00.000Z",
    "dateReserved": "2022-04-15T00:00:00.000Z",
    "dateUpdated": "2025-04-30T14:56:19.558Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1",
  "vulnerability-lookup:meta": {
    "nvd": "{\"cve\":{\"id\":\"CVE-2022-29277\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2022-11-15T22:15:10.933\",\"lastModified\":\"2025-04-30T15:15:52.540\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Incorrect pointer checks within the the FwBlockServiceSmm driver can allow arbitrary RAM modifications During review of the FwBlockServiceSmm driver, certain instances of SpiAccessLib could be tricked into writing 0xff to arbitrary system and SMRAM addresses. Fixed in: INTEL Purley-R: 05.21.51.0048 Whitley: 05.42.23.0066 Cedar Island: 05.42.11.0021 Eagle Stream: 05.44.25.0052 Greenlow/Greenlow-R(skylake/kabylake): Trunk Mehlow/Mehlow-R (CoffeeLake-S): Trunk Tatlow (RKL-S): Trunk Denverton: 05.10.12.0042 Snow Ridge: Trunk Graneville DE: 05.05.15.0038 Grangeville DE NS: 05.27.26.0023 Bakerville: 05.21.51.0026 Idaville: 05.44.27.0030 Whiskey Lake: Trunk Comet Lake-S: Trunk Tiger Lake H/UP3: 05.43.12.0052 Alder Lake: 05.44.23.0047 Gemini Lake: Not Affected Apollo Lake: Not Affected Elkhart Lake: 05.44.30.0018 AMD ROME: trunk MILAN: 05.36.10.0017 GENOA: 05.52.25.0006 Snowy Owl: Trunk R1000: 05.32.50.0018 R2000: 05.44.30.0005 V2000: Trunk V3000: 05.44.30.0007 Ryzen 5000: 05.44.30.0004 Embedded ROME: Trunk Embedded MILAN: Trunk Hygon Hygon #1/#2: 05.36.26.0016 Hygon #3: 05.44.26.0007 https://www.insyde.com/security-pledge/SA-2022060\"},{\"lang\":\"es\",\"value\":\"Las comprobaciones incorrectas del puntero dentro del controlador FwBlockServiceSmm pueden permitir modificaciones arbitrarias de la RAM. Durante la revisi\u00f3n del controlador FwBlockServiceSmm, se podr\u00eda enga\u00f1ar a ciertas instancias de SpiAccessLib para que escriban 0xff en direcciones SMRAM y del sistema arbitrarias. Solucionado en: \\nINTEL Purley-R: 05.21.51.0048 \\nWhitley: 05.42.23.0066 \\nCedar Island: 05.42.11.0021 \\nEagle Stream: 05.44.25.0052 \\nGreenlow/Greenlow-R(skylake/kabylake): Trunk \\nMehlow/Mehlow-R (CoffeeLake-S) : Trunk \\nTatlow (RKL-S): Trunk \\nDenverton: 05.10.12.0042 \\nSnow Ridge: Trunk \\nGraneville DE: 05.05.15.0038 \\nGrangeville DE NS: 05.27.26.0023 \\nBakerville: 05.21.51.0026 \\nIdaville: 05.44.27.0030 \\nWhiskey Lake: Trunk \\nComet Lake-S : Trunk \\nTiger Lake H/UP3: 05.43.12.0052 \\nAlder Lake: 05.44.23.0047 \\nGemini Lake: No afectado \\nApollo Lake: No afectado \\nElkhart Lake: 05.44.30.0018 \\nAMD ROMA: Trunk \\nMILAN: 05.36.10.0017 \\nG\u00c9NOVA: 05.52.25.0006 \\nNival: Trunk \\nR1000: 05.32.50.0018 \\nR2000: 05.44.30.0005 \\nV2000: Trunk \\nV3000: 05.44.30.0007 \\nRyzen 5000: 05.44.30.0004 Embedded \\nROME: Trunk Embedded \\nMILAN: Trunk \\nHygon Hygon #1/#2: 05.36.2 6.0016 \\nHygon #3: 05.44. 26.0007 \\nhttps://www.insyde.com/security-pledge/SA-2022060\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H\",\"baseScore\":8.8,\"baseSeverity\":\"HIGH\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"CHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":2.0,\"impactScore\":6.0},{\"source\":\"134c704f-9b21-4f2e-91b3-4a467353bcc0\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H\",\"baseScore\":8.8,\"baseSeverity\":\"HIGH\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"CHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":2.0,\"impactScore\":6.0}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-787\"}]},{\"source\":\"134c704f-9b21-4f2e-91b3-4a467353bcc0\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-787\"}]}],\"configurations\":[{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:genoa_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"05.52.25.0006\",\"matchCriteriaId\":\"FCC60EFA-7174-4E91-A33F-794935B12334\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:genoa:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"90592BBD-A547-41D5-9696-D93392467417\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:hygon_1_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"05.36.26.0016\",\"matchCriteriaId\":\"05922CE9-07BA-43C8-9B7E-344F9AACEC8E\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:hygon_1:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B1E855A2-4673-41C3-8966-8BE1225B4117\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:hygon_2_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"05.36.26.0016\",\"matchCriteriaId\":\"B9BFD1DF-1C4A-44D6-8E34-AA357AD99C0C\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:hygon_2:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"ED45EDED-9C4E-4D94-9101-AC52AAC3DA88\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:hygon_3_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"05.44.26.0007\",\"matchCriteriaId\":\"A4879580-095C-4503-8D81-5CCE09B6CEB4\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:hygon_3:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B569C92C-0C16-4F5E-92F4-CF6502131A3A\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:milan_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"05.36.10.0017\",\"matchCriteriaId\":\"B638FCDF-0ADD-4815-BD0A-3157D212A130\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:milan:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"89C2BBB6-469A-48A4-85EB-A6BBD21AA27F\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:milan_firmware:*:*:*:*:embedded:*:*:*\",\"versionEndExcluding\":\"05.36.26.0016\",\"matchCriteriaId\":\"29F98F52-0086-4F25-8CBB-909DD79A2D71\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:milan:-:*:*:*:embedded:*:*:*\",\"matchCriteriaId\":\"59B0388D-7B0E-439F-896B-A4E08F657606\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:rome_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"05.36.10.0017\",\"matchCriteriaId\":\"E55655FF-21B7-4602-9C4D-3CC0320CEF99\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:rome:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"39415311-BEFC-4507-8964-75C393381633\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:rome_firmware:*:*:*:*:embedded:*:*:*\",\"versionEndExcluding\":\"05.36.26.0016\",\"matchCriteriaId\":\"2F29A768-8EF1-4F50-A78D-56BC9BE41484\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:rome:-:*:*:*:embedded:*:*:*\",\"matchCriteriaId\":\"95D58B14-392D-4F65-8FF0-199867D3D2BB\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:ryzen_5300g_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"05.44.30.0004\",\"matchCriteriaId\":\"96C827CD-61BA-4FA8-886C-08815FA83D4A\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_5300g:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3D857EFE-B24E-4228-BB1E-34F9BC763A11\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:ryzen_5300ge_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"05.44.30.0004\",\"matchCriteriaId\":\"C252F160-6CBE-42EC-A6AC-82F932348A55\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_5300ge:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F6CC472B-1502-402D-B2AC-8A63A69F2A27\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:ryzen_5600g_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"05.44.30.0004\",\"matchCriteriaId\":\"73443456-6425-46B1-A602-A326B410FE7A\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_5600g:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8937FABB-B60E-4780-BB6D-B1B99DD69219\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:ryzen_5600ge_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"05.44.30.0004\",\"matchCriteriaId\":\"4D29447B-3FF9-4B29-AA00-5179E54A2991\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_5600ge:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3B83F1F6-64B1-40D3-817A-E27CEB2E93EC\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:ryzen_5600x_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"05.44.30.0004\",\"matchCriteriaId\":\"07E151CD-DED7-4900-8346-7CC60447A3D5\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_5600x:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A6CE435D-B9E9-43D6-AFBC-74E258DC4DFA\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:ryzen_5700g_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"05.44.30.0004\",\"matchCriteriaId\":\"C14D153C-8CC3-40B2-B694-08C4FBB67A8C\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_5700g:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"20F5FCF8-FDDA-43F6-AFFD-1874DB2BB806\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:ryzen_5700ge_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"05.44.30.0004\",\"matchCriteriaId\":\"47E4A102-1306-481F-96D5-3F677FE54152\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_5700ge:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CA1A9BEC-27AB-40AD-BBED-4420451D3793\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:ryzen_5800x_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"05.44.30.0004\",\"matchCriteriaId\":\"D1FF208E-2271-440D-9398-2807CBF87233\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_5800x:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"48F6B331-4C0F-49FF-A39F-381B9ADE3483\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:ryzen_5800x3d_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"05.44.30.0004\",\"matchCriteriaId\":\"CA8CD6DB-42C5-4584-8E22-090614949DF3\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_5800x3d:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"238EA54F-4809-4D8F-9F18-71135FED9D05\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:ryzen_5900x_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"05.44.30.0004\",\"matchCriteriaId\":\"7872EB6C-5C3D-4804-9934-53BD91A0B88E\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_5900x:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"050C802C-D8C7-4D58-BA6E-AC48EEF25215\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:ryzen_5950x_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"05.44.30.0004\",\"matchCriteriaId\":\"48018BD4-08DF-4D87-A6AD-251236FD673E\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_5950x:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BD9478CC-DF88-4833-BBB2-2D82D9BBFA63\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:snowy_owl_r1000_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"05.32.50.0018\",\"matchCriteriaId\":\"5E840A2C-A5BA-4054-A932-07B1AED61C3E\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:snowy_owl_r1000:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7AA109B5-E052-4944-AA5C-96B6E8842902\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:snowy_owl_r2000_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"05.44.30.0005\",\"matchCriteriaId\":\"2CFD31CB-623F-46E9-B181-AC5D96349A47\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:snowy_owl_r2000:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1963FD6B-57F6-4CDC-A92B-20079526ACB0\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:snowy_owl_v2000_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"05.44.30.0007\",\"matchCriteriaId\":\"4A998C25-E37C-4987-AFBE-91AA6F324A0E\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:snowy_owl_v2000:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5EACEBA7-F35C-4FCD-B146-4E1A274B8E3B\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:snowy_owl_v3000_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"05.44.30.0007\",\"matchCriteriaId\":\"669E1226-DA98-4A6B-BF79-602258AAFC80\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:snowy_owl_v3000:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"61FA4046-4CD6-4592-B972-1C2ADD4978D1\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:alder_lake_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"05.44.23.0047\",\"matchCriteriaId\":\"5A94F47D-AC22-44FF-A9F9-B3709D5A0897\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:alder_lake:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E39D7884-8579-4B0C-BC50-66DFE48583A5\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:bakerville_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"05.21.51.0026\",\"matchCriteriaId\":\"9238729D-BE76-4DDE-B3BC-04AA0E96EDF7\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:bakerville:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6DBB308D-E36F-4ECD-8DFF-3784FCECDBEC\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:cedar_island_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"05.42.11.0021\",\"matchCriteriaId\":\"C9165049-02FB-436E-84CD-0F1C9376CF5D\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:cedar_island:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3EEA11CC-5BB3-41FF-AAC5-2A74C3E862F2\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:idaville_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"05.43.12.0052\",\"matchCriteriaId\":\"01F0F8C2-28B8-4670-A47F-999B98A2F6CB\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:idaville:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"25C6C611-A06F-4855-B224-C05CD6EBA88F\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:comet_lake-s_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"05.43.12.0052\",\"matchCriteriaId\":\"CB35619B-30AB-4F2F-BBE9-B382AB2A20A2\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:comet_lake-s:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"20A2F526-3B6E-433A-9CCC-471686292193\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:tiger_lake_h\\\\/up3_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"05.43.12.0052\",\"matchCriteriaId\":\"5984089E-3004-476E-A0EA-8B745EDB5D8C\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:tiger_lake_h\\\\/up3:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D856B7FC-16F1-490E-AB0C-14FFB14718A7\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:whiskey_lake_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"05.43.12.0052\",\"matchCriteriaId\":\"489E0210-427F-4D52-B184-B908EC13325F\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:whiskey_lake:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"66A81E2D-E1A6-4B0F-B7F3-C76927598E1C\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:denverton_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"05.10.12.0042\",\"matchCriteriaId\":\"E1978C90-172F-49AE-8F2C-C5FEDAFF9F30\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:denverton:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A70CCE3F-ED5E-4186-84C7-69B58839E386\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:eagle_stream_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"05.44.25.0052\",\"matchCriteriaId\":\"B2FB3A30-921A-45AF-AE16-9C3BCECB1125\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:eagle_stream:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9F85CBD5-5CE0-4A52-8996-4674CF17D5CC\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:grangeville_de_ns_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"05.27.26.0023\",\"matchCriteriaId\":\"C665AF80-C500-4A94-BD6C-8A4ECB8FB64E\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:grangeville_de_ns:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"64D791A1-0735-4C4C-A0BB-D2D96790C3F9\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:granville_de_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"05.05.15.0038\",\"matchCriteriaId\":\"EF2F487C-0A2C-4828-88D1-04C5C98AD56A\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:granville_de:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F4270D4E-9FC2-475B-93BD-A5CB6D565B28\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:greenlow_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"05.10.12.0042\",\"matchCriteriaId\":\"17DFAFE0-1E3E-408C-9FD6-7174C07CF909\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:greenlow:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"44431D1A-D10F-414D-A400-0C5C4F06F99C\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:greenlow-r_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"05.10.12.0042\",\"matchCriteriaId\":\"C5B3B4F7-A7D4-4BC1-9A18-B71298FF4C52\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:greenlow-r:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"401E968C-3B59-4200-953F-0050DBA90E46\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:mehlow_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"05.10.12.0042\",\"matchCriteriaId\":\"7B7BD8DE-932E-4EA7-A010-E1B18AA8E982\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:mehlow:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9DBE1F12-551F-4AEF-81A1-E6A588C1C45F\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:mehlow-r_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"05.10.12.0042\",\"matchCriteriaId\":\"41AFCB8E-A4D9-4A0C-9088-57BA643E05A5\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:mehlow-r:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C701B92D-AF94-459B-BC6A-612111555231\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:tatlow_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"05.10.12.0042\",\"matchCriteriaId\":\"97883F64-02E6-46C8-A70B-A01E120A0FF3\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:tatlow:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"84719A8D-75B1-42F7-A568-F7FD501F8B1F\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:purley-r_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"05.21.51.0048\",\"matchCriteriaId\":\"7EDB05C1-3989-4E5F-A560-0E3A8449124D\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:purley-r:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"43D86D5A-334F-418F-88BE-2A24B06E80A6\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:whitley_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"05.42.23.0066\",\"matchCriteriaId\":\"354D107D-B11F-4A10-A50B-8C22E5B93C16\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:whitley:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F449054E-C729-485F-B5FA-AA49FF0D0294\"}]}]}],\"references\":[{\"url\":\"https://www.insyde.com/security-pledge\",\"source\":\"cve@mitre.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://www.insyde.com/security-pledge/SA-2022060\",\"source\":\"cve@mitre.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://www.insyde.com/security-pledge\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://www.insyde.com/security-pledge/SA-2022060\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]}]}}",
    "vulnrichment": {
      "containers": "{\"adp\": [{\"title\": \"CVE Program Container\", \"references\": [{\"url\": \"https://www.insyde.com/security-pledge\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://www.insyde.com/security-pledge/SA-2022060\", \"tags\": [\"x_transferred\"]}], \"providerMetadata\": {\"orgId\": \"af854a3a-2127-422b-91ae-364da2661108\", \"shortName\": \"CVE\", \"dateUpdated\": \"2024-08-03T06:17:54.724Z\"}}, {\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"cvssV3_1\": {\"scope\": \"CHANGED\", \"version\": \"3.1\", \"baseScore\": 8.8, \"attackVector\": \"LOCAL\", \"baseSeverity\": \"HIGH\", \"vectorString\": \"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H\", \"integrityImpact\": \"HIGH\", \"userInteraction\": \"NONE\", \"attackComplexity\": \"LOW\", \"availabilityImpact\": \"HIGH\", \"privilegesRequired\": \"LOW\", \"confidentialityImpact\": \"HIGH\"}}, {\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2022-29277\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"total\"}], \"version\": \"2.0.3\", \"timestamp\": \"2025-04-30T14:55:15.301726Z\"}}}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-787\", \"description\": \"CWE-787 Out-of-bounds Write\"}]}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2025-04-30T14:56:01.324Z\"}}], \"cna\": {\"source\": {\"discovery\": \"INTERNAL\"}, \"affected\": [{\"vendor\": \"n/a\", \"product\": \"n/a\", \"versions\": [{\"status\": \"affected\", \"version\": \"n/a\"}]}], \"references\": [{\"url\": \"https://www.insyde.com/security-pledge\"}, {\"url\": \"https://www.insyde.com/security-pledge/SA-2022060\"}], \"descriptions\": [{\"lang\": \"en\", \"value\": \"Incorrect pointer checks within the the FwBlockServiceSmm driver can allow arbitrary RAM modifications During review of the FwBlockServiceSmm driver, certain instances of SpiAccessLib could be tricked into writing 0xff to arbitrary system and SMRAM addresses. Fixed in: INTEL Purley-R: 05.21.51.0048 Whitley: 05.42.23.0066 Cedar Island: 05.42.11.0021 Eagle Stream: 05.44.25.0052 Greenlow/Greenlow-R(skylake/kabylake): Trunk Mehlow/Mehlow-R (CoffeeLake-S): Trunk Tatlow (RKL-S): Trunk Denverton: 05.10.12.0042 Snow Ridge: Trunk Graneville DE: 05.05.15.0038 Grangeville DE NS: 05.27.26.0023 Bakerville: 05.21.51.0026 Idaville: 05.44.27.0030 Whiskey Lake: Trunk Comet Lake-S: Trunk Tiger Lake H/UP3: 05.43.12.0052 Alder Lake: 05.44.23.0047 Gemini Lake: Not Affected Apollo Lake: Not Affected Elkhart Lake: 05.44.30.0018 AMD ROME: trunk MILAN: 05.36.10.0017 GENOA: 05.52.25.0006 Snowy Owl: Trunk R1000: 05.32.50.0018 R2000: 05.44.30.0005 V2000: Trunk V3000: 05.44.30.0007 Ryzen 5000: 05.44.30.0004 Embedded ROME: Trunk Embedded MILAN: Trunk Hygon Hygon #1/#2: 05.36.26.0016 Hygon #3: 05.44.26.0007 https://www.insyde.com/security-pledge/SA-2022060\"}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"text\", \"description\": \"n/a\"}]}], \"providerMetadata\": {\"orgId\": \"8254265b-2729-46b6-b9e3-3dfca2d5bfca\", \"shortName\": \"mitre\", \"dateUpdated\": \"2022-11-15T00:00:00.000Z\"}}}",
      "cveMetadata": "{\"cveId\": \"CVE-2022-29277\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2025-04-30T14:56:19.558Z\", \"dateReserved\": \"2022-04-15T00:00:00.000Z\", \"assignerOrgId\": \"8254265b-2729-46b6-b9e3-3dfca2d5bfca\", \"datePublished\": \"2022-11-15T00:00:00.000Z\", \"assignerShortName\": \"mitre\"}",
      "dataType": "CVE_RECORD",
      "dataVersion": "5.1"
    }
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.


Loading…

Loading…