CVE-2025-12053
Unknown Unknown - Not Provided
Buffer Overflow in Tool Package Drivers via Registry Query Flag

Publication date: 2026-01-14

Last updated on: 2026-01-14

Assigner: Insyde

Description
The drivers in the tool packages use RTL_QUERY_REGISTRY_DIRECT flag to read a registry value to which an untrusted user-mode application may be able to cause a buffer overflow.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-01-14
Last Modified
2026-01-14
Generated
2026-05-07
AI Q&A
2026-01-14
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 15 associated CPEs
Vendor Product Version / Range
insyde h2offt 6.76.00
insyde h2offt 200.02.01.00
insyde h2ouvez 200.02.01.00
insyde h2osde 200.02.01.00
insyde h2orte 200.02.01.00
insyde h2ooae 200.02.01.00
insyde h2opcm 200.02.01.00
insyde h2oelv 200.02.01.00
insyde h2ouve_arm 200.02.01.00
insyde h2osde_arm 200.02.01.00
insyde h2orte_arm 200.02.01.00
hp flashwin 6.51.00
hp readback_tool 1.2.4.0
hp flashverifyutility 6.2.5.0
hp issecurebootkeyinstaller 1.2.0.2
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-787 The product writes data past the end, or before the beginning, of the intended buffer.
Attack-Flow Graph
AI Powered Q&A
How can this vulnerability impact me? :

The vulnerability can be exploited locally by an attacker with low privileges and no user interaction required. Successful exploitation can lead to high impact on confidentiality, integrity, and availability of the affected system, meaning sensitive data could be exposed or altered, and system functionality could be disrupted. [1]


Can you explain this vulnerability to me?

This vulnerability involves drivers in certain tool packages that use the RTL_QUERY_REGISTRY_DIRECT flag to read registry values. An untrusted user-mode application can exploit this by causing a buffer overflow due to insecure reading of these registry values. This buffer overflow can lead to out-of-bounds writes, potentially compromising the system. [1]


What immediate steps should I take to mitigate this vulnerability?

Immediate mitigation steps include updating the affected tools and drivers to their fixed versions. Specifically, update H2OFFT (mobile) to version 6.76.00 or newer, H2OFFT (server/embedded) to version 200.02.01.00 or newer, and other affected Insyde tools such as H2OUVE, H2OSDE, H2ORTE, H2OOAE, H2OPCM, H2OELV, H2OUVE_ARM, H2OSDE_ARM, H2ORTE_ARM to version 200.02.01.00 or newer. Additionally, update OEM tools like HP FlashWin to 6.51.00, HP Readback tool to 1.2.4.0, HP FlashVerifyUtility to 6.2.5.0, and HP IsSecureBootKeyInstaller to 1.2.0.2. These updates address the buffer overflow vulnerability caused by insecure registry value reading in the drivers. [1]


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart