{ "schema_version": "1.4.0", "id": "GHSA-48wg-v88q-c99m", "modified": "2022-09-27T00:00:21Z", "published": "2022-09-21T00:00:38Z", "aliases": [ "CVE-2022-2154" ], "details": "An attacker with physical access can exploit this vulnerability to execute arbitrary code during DXE phase. A malicious code installed as a result of vulnerability exploitation in DXE driver could survive across an operating system (OS) boot process and runtime This issue affects: Module name: AMITSE SHA256: 288769fcb374d9280735e259c579e2dc209491f4da43b085d6aabc2d6e6ee57d Module GUID: b1da0adf-4f77-4070-a88e-bffe1c60529a This issue affects: AMI Aptio 5.x.", "severity": [ { "type": "CVSS_V3", "score": "CVSS:3.1/AV:P/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H" } ], "affected": [], "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-2154" }, { "type": "WEB", "url": "https://www.ami.com/security-center" }, { "type": "WEB", "url": "https://www.binarly.io/advisories/BRLY-2022-015" }, { "type": "WEB", "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00712.html" } ], "database_specific": { "cwe_ids": [ "CWE-787" ], "severity": "HIGH", "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2022-09-20T18:15:00Z" } }