Overview
Multiple BIOS implementations permit unsafe System Management Mode (SMM) function calls to memory locations outside of SMRAM.
Description
Multiple BIOS implementations permit unsafe System Management Mode (SMM) function calls to memory locations outside of SMRAM. According to Corey Kallenberg of LegbaCore: System Management Mode (SMM) is the most privileged execution mode on the x86 processor. Non-SMM code can neither read nor write SMRAM (SMM RAM). Hence, even a ring 0 level attacker should be unable to gain access to SMM. |
Impact
A local, authenticated attacker may be able to execute arbitrary code in the context of SMM and bypass Secure Boot. In systems that do not use protected range registers, an attacker may be able to reflash firmware. |
Solution
Please see the Vendor Information section below to determine if your system may be affected. We are continuing to communicate with vendors as they investigate these vulnerabilities. |
Vendor Information
CVSS Metrics
Group | Score | Vector |
---|---|---|
Base | 6 | AV:L/AC:H/Au:S/C:C/I:C/A:C |
Temporal | 5.1 | E:POC/RL:U/RC:UR |
Environmental | 5.3 | CDP:MH/TD:M/CR:ND/IR:H/AR:ND |
References
Acknowledgements
Thanks to Corey Kallenberg of LegbaCore for reporting this vulnerability.
This document was written by Joel Land.
Other Information
CVE IDs: | CVE-2015-0949 |
Date Public: | 2015-03-20 |
Date First Published: | 2015-03-20 |
Date Last Updated: | 2015-07-08 23:16 UTC |
Document Revision: | 25 |