Time-of-check Time-of-use (TOCTOU) Race Condition in Siemens products - CVE-2022-33982
Published: February 20, 2023 / Updated: February 22, 2023
RUGGEDCOM APE1808 ADM
RUGGEDCOM APE1808 ADM CC
RUGGEDCOM APE1808 CKP
RUGGEDCOM APE1808 CKP CC
RUGGEDCOM APE1808 CLOUDCONNECT
RUGGEDCOM APE1808 CLOUDCONNECT CC
RUGGEDCOM APE1808 ELAN
RUGGEDCOM APE1808 ELAN CC
RUGGEDCOM APE1808 SAM-L
RUGGEDCOM APE1808 SAM-L CC
RUGGEDCOM APE1808CLA-P
RUGGEDCOM APE1808CLA-P CC
RUGGEDCOM APE1808CLA-S1
RUGGEDCOM APE1808CLA-S1 CC
RUGGEDCOM APE1808CLA-S3
RUGGEDCOM APE1808CLA-S3 CC
RUGGEDCOM APE1808CLA-S5
RUGGEDCOM APE1808CLA-S5 CC
RUGGEDCOM APE1808LNX
RUGGEDCOM APE1808LNX CC
RUGGEDCOM APE1808W10
RUGGEDCOM APE1808W10 CC
Siemens
Description
The vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a time-of-check-time-of-use (TOCTOU) race condition within the DMA attacks on the parameter buffer used by the Int15ServiceSmm software SMI handler. A local administrator can gain elevated privileges on the target system.