Tianocore Tianocore

Do you want an email whenever new security vulnerabilities are reported in any Tianocore product?

Products by Tianocore Sorted by Most Security Vulnerabilities since 2018

Tianocore Edk226 vulnerabilities

Tianocore Edk Ii11 vulnerabilities

By the Year

In 2024 there have been 12 vulnerabilities in Tianocore with an average score of 7.7 out of ten. Tianocore did not have any published security vulnerabilities last year. That is, 12 more vulnerabilities have already been reported in 2024 as compared to last year.

Year Vulnerabilities Average Score
2024 12 7.73
2023 0 0.00
2022 2 8.65
2021 7 7.50
2020 6 7.18
2019 9 7.59
2018 0 0.00

It may take a day or so for new Tianocore vulnerabilities to show up in the stats or in the list of recent security vulnerabilties. Additionally vulnerabilities may be tagged under a different product or component name.

Recent Tianocore Security Vulnerabilities

EDK2's Network Package is susceptible to an out-of-bounds read vulnerability when processing the IA_NA or IA_TA option in a DHCPv6 Advertise message

CVE-2023-45229 6.5 - Medium - January 16, 2024

EDK2's Network Package is susceptible to an out-of-bounds read vulnerability when processing the IA_NA or IA_TA option in a DHCPv6 Advertise message. This vulnerability can be exploited by an attacker to gain unauthorized access and potentially lead to a loss of Confidentiality.

Out-of-bounds Read

EDK2's Network Package is susceptible to a predictable TCP Initial Sequence Number

CVE-2023-45237 7.5 - High - January 16, 2024

EDK2's Network Package is susceptible to a predictable TCP Initial Sequence Number. This vulnerability can be exploited by an attacker to gain unauthorized access and potentially lead to a loss of Confidentiality.

PRNG

EDK2's Network Package is susceptible to a predictable TCP Initial Sequence Number

CVE-2023-45236 7.5 - High - January 16, 2024

EDK2's Network Package is susceptible to a predictable TCP Initial Sequence Number. This vulnerability can be exploited by an attacker to gain unauthorized access and potentially lead to a loss of Confidentiality.

PRNG

EDK2's Network Package is susceptible to a buffer overflow vulnerability when handling Server ID option

CVE-2023-45235 8.8 - High - January 16, 2024

EDK2's Network Package is susceptible to a buffer overflow vulnerability when handling Server ID option from a DHCPv6 proxy Advertise message. This vulnerability can be exploited by an attacker to gain unauthorized access and potentially lead to a loss of Confidentiality, Integrity and/or Availability.

Buffer Overflow

EDK2's Network Package is susceptible to a buffer overflow vulnerability when processing DNS Servers option from a DHCPv6 Advertise message

CVE-2023-45234 8.8 - High - January 16, 2024

EDK2's Network Package is susceptible to a buffer overflow vulnerability when processing DNS Servers option from a DHCPv6 Advertise message. This vulnerability can be exploited by an attacker to gain unauthorized access and potentially lead to a loss of Confidentiality, Integrity and/or Availability.

Buffer Overflow

EDK2's Network Package is susceptible to an out-of-bounds read vulnerability when processing  Neighbor Discovery Redirect message

CVE-2023-45231 6.5 - Medium - January 16, 2024

EDK2's Network Package is susceptible to an out-of-bounds read vulnerability when processing  Neighbor Discovery Redirect message. This vulnerability can be exploited by an attacker to gain unauthorized access and potentially lead to a loss of Confidentiality.

Out-of-bounds Read

EDK2's Network Package is susceptible to an infinite lop vulnerability when parsing a PadN option in the Destination Options header of IPv6

CVE-2023-45233 7.5 - High - January 16, 2024

EDK2's Network Package is susceptible to an infinite lop vulnerability when parsing a PadN option in the Destination Options header of IPv6. This vulnerability can be exploited by an attacker to gain unauthorized access and potentially lead to a loss of Availability.

Infinite Loop

EDK2's Network Package is susceptible to an infinite loop vulnerability when parsing unknown options in the Destination Options header of IPv6

CVE-2023-45232 7.5 - High - January 16, 2024

EDK2's Network Package is susceptible to an infinite loop vulnerability when parsing unknown options in the Destination Options header of IPv6. This vulnerability can be exploited by an attacker to gain unauthorized access and potentially lead to a loss of Availability.

Infinite Loop

EDK2's Network Package is susceptible to a buffer overflow vulnerability via a long server ID option in DHCPv6 client

CVE-2023-45230 8.8 - High - January 16, 2024

EDK2's Network Package is susceptible to a buffer overflow vulnerability via a long server ID option in DHCPv6 client. This vulnerability can be exploited by an attacker to gain unauthorized access and potentially lead to a loss of Confidentiality, Integrity and/or Availability.

Buffer Overflow

EDK2 is susceptible to a vulnerability in the Tcg2MeasureGptTable() function

CVE-2022-36763 7.8 - High - January 09, 2024

EDK2 is susceptible to a vulnerability in the Tcg2MeasureGptTable() function, allowing a user to trigger a heap buffer overflow via a local network. Successful exploitation of this vulnerability may result in a compromise of confidentiality, integrity, and/or availability.

Buffer Overflow

EDK2 is susceptible to a vulnerability in the Tcg2MeasurePeImage() function

CVE-2022-36764 7.8 - High - January 09, 2024

EDK2 is susceptible to a vulnerability in the Tcg2MeasurePeImage() function, allowing a user to trigger a heap buffer overflow via a local network. Successful exploitation of this vulnerability may result in a compromise of confidentiality, integrity, and/or availability.

Buffer Overflow

EDK2 is susceptible to a vulnerability in the CreateHob() function

CVE-2022-36765 7.8 - High - January 09, 2024

EDK2 is susceptible to a vulnerability in the CreateHob() function, allowing a user to trigger a integer overflow to buffer overflow via a local network. Successful exploitation of this vulnerability may result in a compromise of confidentiality, integrity, and/or availability.

Buffer Overflow

Existing CommBuffer checks in SmmEntryPoint will not catch underflow when computing BufferSize.

CVE-2021-38578 9.8 - Critical - March 03, 2022

Existing CommBuffer checks in SmmEntryPoint will not catch underflow when computing BufferSize.

Memory Corruption

A BIOS bug in firmware for a particular PC model leaves the Platform authorization value empty

CVE-2021-38576 7.5 - High - January 03, 2022

A BIOS bug in firmware for a particular PC model leaves the Platform authorization value empty. This can be used to permanently brick the TPM in multiple ways, as well as to non-permanently DoS the system.

NetworkPkg/IScsiDxe has remotely exploitable buffer overflows.

CVE-2021-38575 8.1 - High - December 01, 2021

NetworkPkg/IScsiDxe has remotely exploitable buffer overflows.

Buffer Overflow

BootPerformanceTable pointer is read from an NVRAM variable in PEI

CVE-2021-28216 7.8 - High - August 05, 2021

BootPerformanceTable pointer is read from an NVRAM variable in PEI. Recommend setting PcdFirmwarePerformanceDataTableS3Support to FALSE.

Release of Invalid Pointer or Reference

Insufficient input validation in MdeModulePkg in EDKII may

CVE-2019-11098 6.8 - Medium - July 14, 2021

Insufficient input validation in MdeModulePkg in EDKII may allow an unauthenticated user to potentially enable escalation of privilege, denial of service and/or information disclosure via physical access.

Improper Input Validation

Example EDK2 encrypted private key in the IpSecDxe.efi present potential security risks.

CVE-2021-28213 7.5 - High - June 11, 2021

Example EDK2 encrypted private key in the IpSecDxe.efi present potential security risks.

An unlimited recursion in DxeCore in EDK II.

CVE-2021-28210 7.8 - High - June 11, 2021

An unlimited recursion in DxeCore in EDK II.

Stack Exhaustion

A heap overflow in LzmaUefiDecompressGetInfo function in EDK II.

CVE-2021-28211 6.7 - Medium - June 11, 2021

A heap overflow in LzmaUefiDecompressGetInfo function in EDK II.

Memory Corruption

Built by Foundeo Inc., with data from the National Vulnerability Database (NVD), Icons by Icons8. Privacy Policy. Use of this site is governed by the Legal Terms
Disclaimer
CONTENT ON THIS WEBSITE IS PROVIDED ON AN "AS IS" BASIS AND DOES NOT IMPLY ANY KIND OF GUARANTEE OR WARRANTY, INCLUDING THE WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR USE. YOUR USE OF THE INFORMATION ON THE DOCUMENT OR MATERIALS LINKED FROM THE DOCUMENT IS AT YOUR OWN RISK. Always check with your vendor for the most up to date, and accurate information.