This security bulletin contains one high risk vulnerability.
Exploit availability: NoDescription
The vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to the SMM (System Management Mode) branch that registers a SWSMI handler does not sufficiently check or validate the allocated table variables EFI_BOOT_SERVICES and EFI_RUNTIME_SERVICES. A remote attacker can overwrite address location of the LocateHandleBuffer function and execute arbitrary code on the system.Mitigation
Install updates from vendor's website.Vulnerable software versions
AhciBusDxe: before 5.5: 05.51.29, 5.4: 05.43.29, 5.3: 05.35.29, 5.2: 05.26.29, 5.1: 05.16.29, 5.0: 05.08.29
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.