📦 Aptio V
by Ami
🔍 What is Aptio V?
Description coming soon...
🛡️ Security Overview
Click on a severity to filter vulnerabilities
⚠️ Known Vulnerabilities
CVE-2025-58770 is a BIOS vulnerability in AMI APTIOV firmware that allows local attackers to bypass permission checks and escalate privileges. This affects systems with vulnerable AMI BIOS implementat...
CVE-2025-22831 is an out-of-bounds write vulnerability in AMI APTIOV BIOS firmware that allows local attackers to corrupt data and disrupt system availability. This affects systems using vulnerable AM...
This CVE describes a buffer overflow vulnerability in AMI APTIOV BIOS firmware where an attacker with local access can execute arbitrary code by exploiting improper input size validation. The vulnerab...
This CVE describes vulnerabilities in APTIOV BIOS firmware where a privileged local user can write arbitrary data to memory locations and access sensitive information. Successful exploitation allows i...
This CVE describes a Time-of-check Time-of-use (TOCTOU) race condition vulnerability in AMI's APTIOV BIOS firmware. An attacker with local access can exploit this to execute arbitrary code at the BIOS...
This CVE describes a Time-of-check Time-of-use (TOCTOU) race condition vulnerability in AMI's APTIOV BIOS firmware. An attacker with local access can exploit this to execute arbitrary code, potentiall...
This vulnerability in AMI APTIOV BIOS allows a local attacker to exploit improper input validation, potentially leading to arbitrary memory overwrites and code execution at System Management Mode (SMM...
CVE-2024-42444 is a TOCTOU race condition vulnerability in AMI APTIOV BIOS that allows local attackers to execute arbitrary code on affected devices. This affects systems with vulnerable BIOS firmware...
CVE-2024-42442 is a memory buffer vulnerability in AMI APTIOV BIOS that allows network-based attackers to execute arbitrary code outside System Management Mode boundaries. This affects systems with vu...
This vulnerability in AMI AptioV BIOS allows local attackers to bypass access controls and modify SPI flash memory, potentially installing persistent bootkits or bricking systems. It affects systems w...
This SMM (System Management Mode) vulnerability allows privileged attackers to execute arbitrary code, manipulate stack memory, and leak information from SMRAM to kernel space. It affects systems with...
This vulnerability in AMI AptioV BIOS allows local attackers to upload malicious PNG logo files without proper validation, potentially compromising system confidentiality, integrity, and availability....
This CVE describes an improper input validation vulnerability in AMI AptioV BIOS that allows attackers on the local network to exploit the system. Successful exploitation could lead to loss of confide...
This vulnerability in AMI AptioV BIOS allows attackers on the local network to exploit improper input validation, potentially compromising system confidentiality, integrity, and availability. It affec...
This CVE describes an improper initialization vulnerability in AMI APTIOV BIOS that allows local attackers to leave system resources in unexpected states. Exploitation could impact confidentiality, in...
This CVE describes a race condition vulnerability in AMI APTIOV BIOS that allows a skilled local attacker to cause resource exhaustion. Exploitation could compromise confidentiality, integrity, and av...
This CVE describes an improper input validation vulnerability in AMI APTIOV BIOS firmware. An attacker with local access can exploit this to potentially modify BIOS settings or firmware, compromising ...
This vulnerability allows an attacker with physical access to manipulate SPI flash memory without detection, potentially compromising system integrity. It affects systems using vulnerable AMI firmware...