An issue was discovered in PnpSmm in Insyde InsydeH2O with kernel 5.0 through 5.6. There is a possible out-of-bounds access in the SMM communication buffer, leading to tampering. The PNP-related SMI sub-functions do not verify data size before getting it from the communication buffer, which could lead to possible circumstances where the data immediately following the command buffer could be destroyed with a fixed value. This is fixed in kernel 5.2 v05.28.45, kernel 5.3 v05.37.45, kernel 5.4 v05.45.45, kernel 5.5 v05.53.45, and kernel 5.6 v05.60.45.
Metrics
Affected Vendors & Products
References
Link | Providers |
---|---|
https://www.insyde.com/security-pledge/SA-2023067 |
![]() ![]() |
History
Tue, 29 Jul 2025 23:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Insyde kernel
|
|
CPEs | cpe:2.3:o:insyde:kernel:*:*:*:*:*:*:*:* | |
Vendors & Products |
Insyde kernel
|
Wed, 20 Nov 2024 16:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Weaknesses | CWE-787 | |
Metrics |
cvssV3_1
|

Status: PUBLISHED
Assigner: mitre
Published: 2024-04-26T00:00:00
Updated: 2024-11-20T15:50:18.349Z
Reserved: 2023-11-05T00:00:00
Link: CVE-2023-47252

Updated: 2024-08-02T21:09:35.794Z

Status : Analyzed
Published: 2024-04-26T03:15:06.617
Modified: 2025-07-29T23:30:00.790
Link: CVE-2023-47252

No data.