Privilege escalation in Insyde software for mobile platforms



Risk Low
Patch available YES
Number of vulnerabilities 1
CVE-ID CVE-2023-39281
CWE-ID CWE-121
Exploitation vector Local
Public exploit N/A
Vulnerable software
Mehlow
Mobile applications / Mobile firmware & hardware

Mehlow-R(CFL-S)
Mobile applications / Mobile firmware & hardware

Tatlow (RKS)
Mobile applications / Mobile firmware & hardware

Raptor Lake
Mobile applications / Mobile firmware & hardware

Alder Lake N
Mobile applications / Mobile firmware & hardware

Alder Lake
Mobile applications / Mobile firmware & hardware

Phoenix FP7_FP8 / Hawk Point 5.5
Mobile applications / Mobile firmware & hardware

Dragon Range
Mobile applications / Mobile firmware & hardware

Mendocino
Mobile applications / Mobile firmware & hardware

Raphael
Mobile applications / Mobile firmware & hardware

Rembrandt
Mobile applications / Mobile firmware & hardware

VanGogh
Mobile applications / Mobile firmware & hardware

Barcelo
Mobile applications / Mobile firmware & hardware

Cezanne
Mobile applications / Mobile firmware & hardware

Lucienne
Mobile applications / Mobile firmware & hardware

Vendor Insyde Software

Security Bulletin

This security bulletin contains one low risk vulnerability.

1) Stack-based buffer overflow

EUVDB-ID: #VU82610

Risk: Low

CVSSv4.0: 5.7 [CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2023-39281

CWE-ID: CWE-121 - Stack-based buffer overflow

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a boundary error in AsfSecureBootDxe. A local user can trigger a stack-based buffer overflow and execute arbitrary code during DXE phase during DXE phase.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

Mehlow: All versions

Mehlow-R(CFL-S): All versions

Tatlow (RKS): All versions

Raptor Lake: before 05.45.24.0039

Alder Lake N: before 05.44.45.0017

Alder Lake: before 05.44.34.0055

Phoenix FP7_FP8 / Hawk Point 5.5: before 05.53.28.0013

Dragon Range: before 05.53.23.0011

Mendocino: before 05.53.23.0014

Raphael: before 05.53.22.0008

Rembrandt: before 05.44.30.0022

VanGogh: before 05.43.06.0021

Barcelo: before 05.42.37.0031

Cezanne: before 05.42.37.0031

Lucienne: before 05.42.37.0031

CPE2.3 External links

https://www.insyde.com/security-pledge/SA-2023054


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.



###SIDEBAR###