intel nuc_m15_laptop_kit_lapbc510_firmware 跨界内存写

CVE编号

CVE-2022-2154

利用情况

暂无

补丁情况

N/A

披露时间

2022-09-21
漏洞描述
An attacker with physical access can exploit this vulnerability to execute arbitrary code during DXE phase. A malicious code installed as a result of vulnerability exploitation in DXE driver could survive across an operating system (OS) boot process and runtime This issue affects: Module name: AMITSE SHA256: 288769fcb374d9280735e259c579e2dc209491f4da43b085d6aabc2d6e6ee57d Module GUID: b1da0adf-4f77-4070-a88e-bffe1c60529a This issue affects: AMI Aptio 5.x.
解决建议
建议您更新当前系统或软件至最新版,完成漏洞的修复。
参考链接
受影响软件情况
# 类型 厂商 产品 版本 影响面
1
运行在以下环境
系统 alibaba_cloud_linux_2.1903 java-11-openjdk * Up to
(excluding)
11.0.16.0.8-1.1.al7
运行在以下环境
系统 alibaba_cloud_linux_3 java-11-openjdk * Up to
(excluding)
11.0.16.0.8-1.al8
运行在以下环境
系统 alma_linux_8 java-11-openjdk * Up to
(excluding)
11.0.16.0.8-1.el8_6
运行在以下环境
系统 alma_linux_9 mysql * Up to
(excluding)
8.0.30-3.el9_0
运行在以下环境
系统 amazon_2 java-11-openjdk * Up to
(excluding)
11.0.16.0.8-1.amzn2.0.1
运行在以下环境
系统 amazon_2022 java-11-amazon-corretto * Up to
(excluding)
11.0.16+8-1.amzn2022
运行在以下环境
系统 amazon_AMI java-1.8.0-openjdk * Up to
(excluding)
1.8.0.342.b07-0.68.amzn1
运行在以下环境
系统 ami aptio_v 5.0 -
运行在以下环境
系统 anolis_os_7 java-11-openjdk * Up to
(excluding)
11.0.16.0.8-1
运行在以下环境
系统 anolis_os_8 java-17-openjdk * Up to
(excluding)
17.0.4.0.8-2
运行在以下环境
系统 centos_7 java-11-openjdk * Up to
(excluding)
11.0.16.0.8-1.el7_9
运行在以下环境
系统 fedora_35 java-11-openjdk * Up to
(excluding)
11.0.16.0.8-1.fc35
运行在以下环境
系统 fedora_36 java-17-openjdk * Up to
(excluding)
17.0.4.0.8-1.fc36
运行在以下环境
系统 intel nuc_m15_laptop_kit_lapbc510_firmware 0072 -
运行在以下环境
系统 intel nuc_m15_laptop_kit_lapbc710_firmware 0072 -
运行在以下环境
系统 kylinos_aarch64_V10 java-11-openjdk * Up to
(excluding)
11.0.17.8-1.ky10
运行在以下环境
系统 kylinos_aarch64_V10HPC java-1.8.0-openjdk * Up to
(excluding)
1.8.0.392.b08-2.p01.ky10h
运行在以下环境
系统 kylinos_aarch64_V10SP1 java-11-openjdk * Up to
(excluding)
11.0.17.8-1.ky10
运行在以下环境
系统 kylinos_aarch64_V10SP2 java-11-openjdk * Up to
(excluding)
11.0.17.8-1.ky10
运行在以下环境
系统 kylinos_aarch64_V10SP3 java-11-openjdk * Up to
(excluding)
11.0.17.8-1.ky10
运行在以下环境
系统 kylinos_aarch64_V10SP32309a java-1.8.0-openjdk * Up to
(excluding)
1.8.0.392.b08-2.p01.ky10h
运行在以下环境
系统 kylinos_aarch64_V10SP32309b java-1.8.0-openjdk * Up to
(excluding)
1.8.0.392.b08-2.p01.ky10
运行在以下环境
系统 kylinos_x86_64_V10 java-11-openjdk * Up to
(excluding)
11.0.17.8-1.ky10
运行在以下环境
系统 kylinos_x86_64_V10HPC java-1.8.0-openjdk * Up to
(excluding)
1.8.0.392.b08-2.p01.ky10h
运行在以下环境
系统 kylinos_x86_64_V10SP1 java-11-openjdk * Up to
(excluding)
11.0.17.8-1.ky10
运行在以下环境
系统 kylinos_x86_64_V10SP2 java-11-openjdk * Up to
(excluding)
11.0.17.8-1.ky10
运行在以下环境
系统 kylinos_x86_64_V10SP3 java-11-openjdk * Up to
(excluding)
11.0.17.8-1.ky10
运行在以下环境
系统 opensuse_Leap_15.3 java-1_8_0-ibm * Up to
(excluding)
1.8.0_sr7.11-150000.3.62.1
运行在以下环境
系统 opensuse_Leap_15.4 java-1_8_0-ibm * Up to
(excluding)
1.8.0_sr7.11-150000.3.62.1
运行在以下环境
系统 oracle_6 kernel * Up to
(excluding)
4.1.12-124.66.3.el6uek
运行在以下环境
系统 oracle_7 kernel * Up to
(excluding)
5.4.17-2136.311.6.el7
运行在以下环境
系统 oracle_8 kernel * Up to
(excluding)
5.15.0-2.52.3.el8
运行在以下环境
系统 oracle_9 mysql * Up to
(excluding)
8.0.30-3.el9_0
运行在以下环境
系统 redhat_7 java-11-openjdk * Up to
(excluding)
11.0.16.0.8-1.el7_9
运行在以下环境
系统 redhat_8 java-11-openjdk * Up to
(excluding)
11.0.16.0.8-1.el8_6
运行在以下环境
系统 redhat_9 mysql * Up to
(excluding)
8.0.30-3.el9_0
运行在以下环境
系统 rocky_linux_8 java-11-openjdk * Up to
(excluding)
11.0.16.0.8-1.el8_6
运行在以下环境
系统 rocky_linux_9 mysql * Up to
(excluding)
8.0.30-3.el9_0
运行在以下环境
系统 suse_12_SP5 java-1_8_0-ibm * Up to
(excluding)
1.8.0_sr7.11-30.93.1
运行在以下环境
硬件 intel nuc_m15_laptop_kit_lapbc510 - -
运行在以下环境
硬件 intel nuc_m15_laptop_kit_lapbc710 - -
CVSS3评分
7.2
  • 攻击路径
    物理
  • 攻击复杂度
  • 权限要求
  • 影响范围
    已更改
  • 用户交互
  • 可用性
  • 保密性
  • 完整性
CWE-ID 漏洞类型
CWE-787 跨界内存写
阿里云安全产品覆盖情况