CVE-2022-36764
📋 TL;DR
CVE-2022-36764 is a heap buffer overflow vulnerability in EDK2's Tcg2MeasurePeImage() function that allows local network attackers to potentially execute arbitrary code or cause denial of service. This affects systems using EDK2 firmware, particularly those with TPM measurements enabled. Successful exploitation could compromise system confidentiality, integrity, and availability.
💻 Affected Systems
- EDK2 (UEFI Development Kit)
📦 What is this software?
Edk2 by Tianocore
⚠️ Risk & Real-World Impact
Worst Case
Complete system compromise allowing attacker to execute arbitrary code at firmware level, potentially bypassing OS security controls and establishing persistent access.
Likely Case
System crash or denial of service, with potential for limited code execution depending on exploit sophistication and system configuration.
If Mitigated
Minimal impact if systems are patched, have network segmentation, and restrict local network access to firmware management interfaces.
🎯 Exploit Status
Exploitation requires local network access to trigger the vulnerable function. No public exploit code has been identified.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: EDK2 commit 0b2e297 or later
Vendor Advisory: https://github.com/tianocore/edk2/security/advisories/GHSA-4hcq-p8q8-hj8j
Restart Required: Yes
Instructions:
1. Update EDK2 firmware to version containing commit 0b2e297 or later. 2. Check with your hardware vendor for firmware updates. 3. Apply firmware updates following vendor instructions. 4. Reboot system to activate new firmware.
🔧 Temporary Workarounds
Network Segmentation
allRestrict access to firmware management interfaces to trusted networks only
Disable TPM Measurements
allIf not required, disable TPM/TCG measurements in firmware settings
🧯 If You Can't Patch
- Implement strict network segmentation to isolate systems from untrusted local networks
- Monitor for unusual firmware access attempts and system crashes
🔍 How to Verify
Check if Vulnerable:
Check EDK2 version: dmidecode -t bios | grep Version. Compare against vulnerable versions. Check if commit 0b2e297 is present in EDK2 source.
Check Version:
dmidecode -t bios | grep Version
Verify Fix Applied:
Verify EDK2 version contains commit 0b2e297 or later. Check with vendor for specific firmware version that includes the fix.
📡 Detection & Monitoring
Log Indicators:
- Unexpected system crashes or reboots
- Firmware access logs showing unusual patterns
Network Indicators:
- Unusual network traffic to firmware management interfaces
- Local network scanning for vulnerable systems
SIEM Query:
source="bios_logs" AND (event="crash" OR event="unexpected_reboot") OR source="network_logs" AND dest_port IN (firmware_management_ports)
🔗 References
- https://github.com/tianocore/edk2/security/advisories/GHSA-4hcq-p8q8-hj8j
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SJ42V7O7F4OU6R7QSQQECLB6LDHKZIMQ/
- https://github.com/tianocore/edk2/security/advisories/GHSA-4hcq-p8q8-hj8j
- https://lists.debian.org/debian-lts-announce/2025/06/msg00007.html
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SJ42V7O7F4OU6R7QSQQECLB6LDHKZIMQ/