Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2022-29275: n/a in n/a

0
High
VulnerabilityCVE-2022-29275cvecve-2022-29275
Published: Tue Nov 15 2022 (11/15/2022, 00:00:00 UTC)
Source: CVE
Vendor/Project: n/a
Product: n/a

Description

In UsbCoreDxe, untrusted input may allow SMRAM or OS memory tampering Use of untrusted pointers could allow OS or SMRAM memory tampering leading to escalation of privileges. This issue was discovered by Insyde during security review. It was fixed in: Kernel 5.0: version 05.09.21 Kernel 5.1: version 05.17.21 Kernel 5.2: version 05.27.21 Kernel 5.3: version 05.36.21 Kernel 5.4: version 05.44.21 Kernel 5.5: version 05.52.21 https://www.insyde.com/security-pledge/SA-2022058

AI-Powered Analysis

AILast updated: 07/02/2025, 04:28:13 UTC

Technical Analysis

CVE-2022-29275 is a high-severity vulnerability identified in the UsbCoreDxe component, which is part of the UEFI firmware environment. The vulnerability arises from the use of untrusted pointers that can lead to memory tampering in either the System Management RAM (SMRAM) or the operating system's memory. SMRAM is a protected memory region used by the System Management Mode (SMM) of the CPU, which operates at a higher privilege level than the OS kernel. Exploiting this vulnerability could allow an attacker with some level of existing privileges (high privileges required) to escalate their privileges further by corrupting or manipulating memory in SMRAM or OS memory. This could lead to complete compromise of system integrity, confidentiality, and availability. The vulnerability is classified under CWE-119, indicating a classic buffer or memory corruption issue. The CVSS v3.1 score is 8.2 (high), with vector AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H, meaning the attack requires local access with low complexity, high privileges, no user interaction, and results in high impact on confidentiality, integrity, and availability with scope change. The issue was discovered by Insyde during a security review and has been addressed in various kernel versions starting from 5.0 through 5.5 with specific patch versions listed. Although the exact product or vendor is not specified, the involvement of UsbCoreDxe and kernel patch versions suggests this vulnerability affects firmware components integrated with certain hardware platforms and their corresponding OS kernels. No known exploits are currently reported in the wild, but the potential impact is significant due to the ability to tamper with SMRAM and OS memory.

Potential Impact

For European organizations, this vulnerability poses a serious risk especially to enterprises relying on hardware platforms and firmware implementations that include the vulnerable UsbCoreDxe component. Successful exploitation could allow attackers to gain kernel-level or even SMM-level control, bypassing OS security mechanisms and potentially implanting persistent malware or rootkits that are extremely difficult to detect or remove. This could lead to data breaches, intellectual property theft, disruption of critical services, and compromise of sensitive infrastructure. Sectors such as finance, healthcare, government, and critical infrastructure in Europe, which often require strict security and compliance standards, could be severely impacted. The requirement for local access and high privileges limits the attack surface somewhat, but insider threats or attackers who have already compromised user accounts could leverage this vulnerability to escalate privileges and gain full system control. The scope change in the CVSS vector indicates that the vulnerability affects components beyond the initially compromised security boundary, increasing the severity of impact. Given the widespread use of UEFI firmware and the critical role of SMRAM in system security, the vulnerability could affect a broad range of devices across European organizations.

Mitigation Recommendations

European organizations should prioritize applying the firmware and kernel patches released by vendors and maintainers as listed (kernel versions 5.0 to 5.5 with respective patch versions). Since the vulnerability involves firmware components, coordination with hardware vendors to ensure updated firmware images are deployed is critical. Organizations should implement strict access controls to limit local administrative privileges and monitor for unusual activities indicative of privilege escalation attempts. Employing hardware-based security features such as TPM and enabling Secure Boot can help reduce the risk of unauthorized firmware tampering. Regular firmware integrity checks and system audits should be conducted to detect any unauthorized modifications. Additionally, organizations should ensure endpoint detection and response (EDR) tools are configured to detect suspicious kernel or SMM-level activities. Training and awareness programs for IT staff and system administrators about the risks of local privilege escalation and the importance of patch management are essential. Finally, network segmentation and limiting physical access to critical systems can reduce the likelihood of exploitation.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2022-04-15T00:00:00.000Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d983bc4522896dcbee00b

Added to database: 5/21/2025, 9:09:15 AM

Last enriched: 7/2/2025, 4:28:13 AM

Last updated: 2/7/2026, 6:46:26 PM

Views: 36

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats