Skip to main content

CVE-2022-35408: n/a in n/a

High
VulnerabilityCVE-2022-35408cvecve-2022-35408
Published: Thu Sep 22 2022 (09/22/2022, 15:35:26 UTC)
Source: CVE Database V5
Vendor/Project: n/a
Product: n/a

Description

An issue was discovered in Insyde InsydeH2O with kernel 5.0 through 5.5. An SMM callout vulnerability in the SMM driver in UsbLegacyControlSmm leads to possible arbitrary code execution in SMM and escalation of privileges. An attacker could overwrite the function pointers in the EFI_BOOT_SERVICES table before the USB SMI handler triggers. (This is not exploitable from code running in the operating system.)

AI-Powered Analysis

AILast updated: 07/06/2025, 03:24:59 UTC

Technical Analysis

CVE-2022-35408 is a high-severity vulnerability affecting InsydeH2O firmware versions with kernel 5.0 through 5.5. The flaw exists in the System Management Mode (SMM) driver component UsbLegacyControlSmm, which handles USB-related System Management Interrupts (SMIs). Specifically, the vulnerability allows an attacker to overwrite function pointers in the EFI_BOOT_SERVICES table prior to the USB SMI handler execution. This manipulation can lead to arbitrary code execution within SMM, a highly privileged execution environment isolated from the operating system. Exploiting this vulnerability enables escalation of privileges at the firmware level, potentially compromising the confidentiality, integrity, and availability of the system. Notably, exploitation is not possible from code running in the operating system, indicating that the attacker requires a lower-level access vector, such as physical access or a compromised pre-boot environment. The vulnerability is classified under CWE-123 (Write-what-where condition), indicating that improper handling of memory pointers allows overwriting critical function pointers. The CVSS v3.1 base score is 8.2, reflecting high impact on confidentiality, integrity, and availability, with attack vector local, low attack complexity, high privileges required, no user interaction, and scope changed due to impact beyond the vulnerable component. No known exploits are currently reported in the wild, and no patches are linked in the provided data, suggesting that mitigation may require firmware updates from device manufacturers or vendors. Given the involvement of InsydeH2O firmware, which is widely used in laptops and embedded devices, this vulnerability poses a significant risk to endpoint security, especially in environments where firmware integrity is critical.

Potential Impact

For European organizations, this vulnerability presents a serious risk primarily to endpoint devices such as laptops and embedded systems utilizing InsydeH2O firmware with the affected kernel versions. Successful exploitation could allow attackers to execute arbitrary code at the firmware level, bypassing operating system security controls and potentially implanting persistent, stealthy malware that survives OS reinstalls. This could lead to full system compromise, data exfiltration, sabotage, or use of compromised devices as footholds within corporate networks. Critical sectors such as finance, government, healthcare, and critical infrastructure in Europe could face severe operational disruptions and data breaches. The requirement for local access or pre-boot compromise somewhat limits remote exploitation but does not eliminate risk, especially in scenarios involving insider threats, supply chain attacks, or physical device theft. The lack of known exploits in the wild currently reduces immediate threat but the high severity and potential impact necessitate proactive mitigation. Additionally, the complexity of firmware updates and the diversity of affected hardware may delay patch deployment, prolonging exposure.

Mitigation Recommendations

European organizations should prioritize the following specific mitigation steps: 1) Inventory and identify all devices using InsydeH2O firmware with kernel versions 5.0 through 5.5, focusing on laptops and embedded systems. 2) Engage with hardware vendors and Insyde to obtain firmware updates or patches addressing CVE-2022-35408; if unavailable, request timelines and interim mitigations. 3) Implement strict physical security controls to prevent unauthorized local access to devices, including secure storage, access logging, and tamper-evident measures. 4) Employ endpoint detection and response (EDR) solutions capable of monitoring for anomalous firmware or boot-level activity. 5) Enforce secure boot and firmware integrity verification mechanisms where supported to detect unauthorized firmware modifications. 6) Educate IT and security teams about the risks of firmware-level attacks and the importance of firmware update management. 7) For high-risk environments, consider device replacement or isolation until patches are available. 8) Monitor threat intelligence sources for emerging exploits targeting this vulnerability to enable rapid response. These targeted actions go beyond generic advice by focusing on firmware-specific controls, vendor engagement, and physical security.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2022-07-08T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6835e152182aa0cae218e4fc

Added to database: 5/27/2025, 3:59:14 PM

Last enriched: 7/6/2025, 3:24:59 AM

Last updated: 8/17/2025, 6:37:00 PM

Views: 11

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats