{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2025-33045","assignerOrgId":"7e9044f1-7f56-4c38-8864-c0c7302263d6","state":"PUBLISHED","assignerShortName":"AMI","dateReserved":"2025-04-15T16:15:34.583Z","datePublished":"2025-09-09T14:00:31.402Z","dateUpdated":"2025-09-09T14:15:08.538Z"},"containers":{"cna":{"affected":[{"defaultStatus":"unaffected","product":"AptioV","vendor":"AMI","versions":[{"lessThan":"AptioV_5.040","status":"affected","version":"AptioV_5.0","versionType":"custom"}]}],"credits":[{"lang":"en","type":"reporter","value":"Binarly"}],"datePublic":"2025-09-09T14:00:00.000Z","descriptions":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"APTIOV contains vulnerabilities in the BIOS where a privileged user may cause “Write-what-where Condition” and “Exposure of Sensitive Information to an Unauthorized Actor” through local access. The successful exploitation of these vulnerabilities can lead to information disclosure, arbitrary data writing, and impact Confidentiality, Integrity, and Availability."}],"value":"APTIOV contains vulnerabilities in the BIOS where a privileged user may cause “Write-what-where Condition” and “Exposure of Sensitive Information to an Unauthorized Actor” through local access. The successful exploitation of these vulnerabilities can lead to information disclosure, arbitrary data writing, and impact Confidentiality, Integrity, and Availability."}],"metrics":[{"cvssV3_1":{"attackComplexity":"LOW","attackVector":"LOCAL","availabilityImpact":"HIGH","baseScore":8.2,"baseSeverity":"HIGH","confidentialityImpact":"HIGH","integrityImpact":"HIGH","privilegesRequired":"HIGH","scope":"CHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H","version":"3.1"},"format":"CVSS","scenarios":[{"lang":"en","value":"GENERAL"}]}],"problemTypes":[{"descriptions":[{"cweId":"CWE-123","description":"CWE-123: Write-what-where Condition","lang":"en","type":"CWE"}]},{"descriptions":[{"cweId":"CWE-200","description":"CWE-200 Exposure of Sensitive Information to an Unauthorized Actor","lang":"en","type":"CWE"}]}],"providerMetadata":{"orgId":"7e9044f1-7f56-4c38-8864-c0c7302263d6","shortName":"AMI","dateUpdated":"2025-09-09T14:00:31.402Z"},"references":[{"url":"https://go.ami.com/hubfs/Security%20Advisories/2025/AMI-SA-2025007.pdf"}],"source":{"discovery":"UNKNOWN"},"title":"Legacy Serial Redirection SMRAM Vulnerabilities","x_generator":{"engine":"Vulnogram 0.2.0"}},"adp":[{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2025-09-09T14:14:02.373579Z","id":"CVE-2025-33045","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"total"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2025-09-09T14:15:08.538Z"}}]}}