Metrics
Affected Vendors & Products
No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
| Link | Providers |
|---|---|
| https://www.insyde.com/security-pledge/sa-2025009/ |
|
Fri, 12 Dec 2025 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Fri, 12 Dec 2025 09:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Insyde
Insyde insydeh2o |
|
| Vendors & Products |
Insyde
Insyde insydeh2o |
Fri, 12 Dec 2025 00:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Unchecked output buffer may allowed arbitrary code execution in SMM and potentially result in SMM memory corruption. | |
| Title | H19Int15CallbackSmm: SMM memory corruption vulnerability in combined DXE/SMM (SMRAM write) | |
| Weaknesses | CWE-787 | |
| References |
| |
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: Insyde
Published:
Updated: 2025-12-12T18:45:44.288Z
Reserved: 2025-09-15T01:13:10.842Z
Link: CVE-2025-10451
Updated: 2025-12-12T18:45:26.027Z
Status : Awaiting Analysis
Published: 2025-12-12T01:15:45.310
Modified: 2025-12-12T15:17:31.973
Link: CVE-2025-10451
No data.
OpenCVE Enrichment
Updated: 2025-12-12T08:48:32Z