Unknown
CVE-2021-33626
CVE ID
AttackerKB requires a CVE ID in order to pull vulnerability data and references from the CVE list and the National Vulnerability Database. If available, please supply below:
Add References:
CVE-2021-33626
MITRE ATT&CK
Collection
Command and Control
Credential Access
Defense Evasion
Discovery
Execution
Exfiltration
Impact
Initial Access
Lateral Movement
Persistence
Privilege Escalation
Topic Tags
Description
A vulnerability exists in SMM (System Management Mode) branch that registers a SWSMI handler that does not sufficiently check or validate the allocated buffer pointer(QWORD values for CommBuffer). This can be used by an attacker to corrupt data in SMRAM memory and even lead to arbitrary code execution.
Add Assessment
No one has assessed this topic. Be the first to add your voice to the community.
CVSS V3 Severity and Metrics
General Information
Products
- insydeh2o,
- ruggedcom apr1808 firmware -,
- simatic field pg m5 firmware -,
- simatic field pg m6 firmware -,
- simatic ipc127e firmware -,
- simatic ipc227g firmware -,
- simatic ipc277g firmware -,
- simatic ipc327g firmware -,
- simatic ipc377g firmware -,
- simatic ipc427e firmware -,
- simatic ipc477e firmware -,
- simatic ipc477e pro firmware -,
- simatic ipc627e firmware -,
- simatic ipc647e firmware -,
- simatic ipc677e firmware -,
- simatic ipc847e firmware -,
- simatic itp1000 firmware -
References
Additional Info
Technical Analysis
Report as Emergent Threat Response
Report as Zero-day Exploit
Report as Exploited in the Wild
CVE ID
AttackerKB requires a CVE ID in order to pull vulnerability data and references from the CVE list and the National Vulnerability Database. If available, please supply below: