Time-of-check Time-of-use (TOCTOU) Race Condition in Siemens products - CVE-2022-31243
Published: February 20, 2023 / Updated: February 22, 2023
RUGGEDCOM APE1808 ADM
RUGGEDCOM APE1808 ADM CC
RUGGEDCOM APE1808 CKP
RUGGEDCOM APE1808 CKP CC
RUGGEDCOM APE1808 CLOUDCONNECT
RUGGEDCOM APE1808 CLOUDCONNECT CC
RUGGEDCOM APE1808 ELAN
RUGGEDCOM APE1808 ELAN CC
RUGGEDCOM APE1808 SAM-L
RUGGEDCOM APE1808 SAM-L CC
RUGGEDCOM APE1808CLA-P
RUGGEDCOM APE1808CLA-P CC
RUGGEDCOM APE1808CLA-S1
RUGGEDCOM APE1808CLA-S1 CC
RUGGEDCOM APE1808CLA-S3
RUGGEDCOM APE1808CLA-S3 CC
RUGGEDCOM APE1808CLA-S5
RUGGEDCOM APE1808CLA-S5 CC
RUGGEDCOM APE1808LNX
RUGGEDCOM APE1808LNX CC
RUGGEDCOM APE1808W10
RUGGEDCOM APE1808W10 CC
Siemens
Description
The vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a time-of-check-time-of-use (TOCTOU) race condition within the DMA transactions which are targeted at input buffers used for the software SMI handler used by the FvbServicesRuntimeDxe driver. A local administrator can gain elevated privileges on the target system.