The SentinelOne Annual Threat Report - A Defenders Guide from the FrontlinesThe SentinelOne Annual Threat ReportGet the Report
Experiencing a Breach?Blog
Get StartedContact Us
SentinelOne
  • Platform
    Platform Overview
    • Singularity Platform
      Welcome to Integrated Enterprise Security
    • AI for Security
      Leading the Way in AI-Powered Security Solutions
    • Securing AI
      Accelerate AI Adoption with Secure AI Tools, Apps, and Agents.
    • How It Works
      The Singularity XDR Difference
    • Singularity Marketplace
      One-Click Integrations to Unlock the Power of XDR
    • Pricing & Packaging
      Comparisons and Guidance at a Glance
    Data & AI
    • Purple AI
      Accelerate SecOps with Generative AI
    • Singularity Hyperautomation
      Easily Automate Security Processes
    • AI-SIEM
      The AI SIEM for the Autonomous SOC
    • Singularity Data Lake
      AI-Powered, Unified Data Lake
    • Singularity Data Lake for Log Analytics
      Seamlessly Ingest Data from On-Prem, Cloud or Hybrid Environments
    Endpoint Security
    • Singularity Endpoint
      Autonomous Prevention, Detection, and Response
    • Singularity XDR
      Native & Open Protection, Detection, and Response
    • Singularity RemoteOps Forensics
      Orchestrate Forensics at Scale
    • Singularity Threat Intelligence
      Comprehensive Adversary Intelligence
    • Singularity Vulnerability Management
      Application & OS Vulnerability Management
    • Singularity Identity
      Identity Threat Detection and Response
    Cloud Security
    • Singularity Cloud Security
      Block Attacks with an AI-Powered CNAPP
    • Singularity Cloud Native Security
      Secure Cloud and Development Resources
    • Singularity Cloud Workload Security
      Real-Time Cloud Workload Protection Platform
    • Singularity Cloud Data Security
      AI-Powered Threat Detection for Cloud Storage
    • Singularity Cloud Security Posture Management
      Detect and Remediate Cloud Misconfigurations
    Securing AI
    • Prompt Security
      Secure AI Tools Across Your Enterprise
  • Why SentinelOne?
    Why SentinelOne?
    • Why SentinelOne?
      Cybersecurity Built for What’s Next
    • Our Customers
      Trusted by the World’s Leading Enterprises
    • Industry Recognition
      Tested and Proven by the Experts
    • About Us
      The Industry Leader in Autonomous Cybersecurity
    Compare SentinelOne
    • Arctic Wolf
    • Broadcom
    • CrowdStrike
    • Cybereason
    • Microsoft
    • Palo Alto Networks
    • Sophos
    • Splunk
    • Trellix
    • Trend Micro
    • Wiz
    Verticals
    • Energy
    • Federal Government
    • Finance
    • Healthcare
    • Higher Education
    • K-12 Education
    • Manufacturing
    • Retail
    • State and Local Government
  • Services
    Managed Services
    • Managed Services Overview
      Wayfinder Threat Detection & Response
    • Threat Hunting
      World-Class Expertise and Threat Intelligence
    • Managed Detection & Response
      24/7/365 Expert MDR Across Your Entire Environment
    • Incident Readiness & Response
      DFIR, Breach Readiness, & Compromise Assessments
    Support, Deployment, & Health
    • Technical Account Management
      Customer Success with Personalized Service
    • SentinelOne GO
      Guided Onboarding & Deployment Advisory
    • SentinelOne University
      Live and On-Demand Training
    • Services Overview
      Comprehensive Solutions for Seamless Security Operations
    • SentinelOne Community
      Community Login
  • Partners
    Our Network
    • MSSP Partners
      Succeed Faster with SentinelOne
    • Singularity Marketplace
      Extend the Power of S1 Technology
    • Cyber Risk Partners
      Enlist Pro Response and Advisory Teams
    • Technology Alliances
      Integrated, Enterprise-Scale Solutions
    • SentinelOne for AWS
      Hosted in AWS Regions Around the World
    • Channel Partners
      Deliver the Right Solutions, Together
    • SentinelOne for Google Cloud
      Unified, Autonomous Security Giving Defenders the Advantage at Global Scale
    • Partner Locator
      Your Go-to Source for Our Top Partners in Your Region
    Partner Portal→
  • Resources
    Resource Center
    • Case Studies
    • Data Sheets
    • eBooks
    • Reports
    • Videos
    • Webinars
    • Whitepapers
    • Events
    View All Resources→
    Blog
    • Feature Spotlight
    • For CISO/CIO
    • From the Front Lines
    • Identity
    • Cloud
    • macOS
    • SentinelOne Blog
    Blog→
    Tech Resources
    • SentinelLABS
    • Ransomware Anthology
    • Cybersecurity 101
  • About
    About SentinelOne
    • About SentinelOne
      The Industry Leader in Cybersecurity
    • Investor Relations
      Financial Information & Events
    • SentinelLABS
      Threat Research for the Modern Threat Hunter
    • Careers
      The Latest Job Opportunities
    • Press & News
      Company Announcements
    • Cybersecurity Blog
      The Latest Cybersecurity Threats, News, & More
    • FAQ
      Get Answers to Our Most Frequently Asked Questions
    • DataSet
      The Live Data Platform
    • S Foundation
      Securing a Safer Future for All
    • S Ventures
      Investing in the Next Generation of Security, Data and AI
  • Pricing
Get StartedContact Us
CVE Vulnerability Database
Vulnerability Database/CVE-2023-40238

CVE-2023-40238: Fujitsu Esprimo Buffer Overflow Flaw

CVE-2023-40238 is a buffer overflow vulnerability in Fujitsu Esprimo D556/2 Firmware affecting InsydeH2O kernel versions. Attackers can exploit crafted BMP files during UEFI execution. This article covers technical details, affected versions, impact, and mitigation strategies.

Published: January 28, 2026

CVE-2023-40238 Overview

CVE-2023-40238 is a UEFI firmware vulnerability, part of the broader "LogoFAIL" vulnerability family, affecting the BmpDecoderDxe module in Insyde InsydeH2O UEFI firmware. This vulnerability allows attackers to exploit improper image parsing of crafted BMP logo files during the DXE (Driver Execution Environment) phase of UEFI boot, potentially leading to arbitrary memory writes and system compromise before the operating system loads.

The vulnerability stems from an integer signedness error when processing PixelHeight and PixelWidth values during RLE4/RLE8 compression handling in BMP image decoding. A malicious BMP image stored in the EFI System Partition (ESP) or firmware flash can trigger memory corruption, enabling persistent firmware-level attacks that survive OS reinstallation.

Critical Impact

This pre-boot vulnerability enables attackers to execute code at the UEFI level, bypassing Secure Boot protections and establishing persistent implants that cannot be detected or removed by traditional endpoint security solutions.

Affected Products

  • Insyde InsydeH2O kernel 5.2 (before 05.28.47)
  • Insyde InsydeH2O kernel 5.3 (before 05.37.47)
  • Insyde InsydeH2O kernel 5.4 (before 05.45.47)
  • Insyde InsydeH2O kernel 5.5 (before 05.53.47)
  • Insyde InsydeH2O kernel 5.6 (before 05.60.47)
  • Fujitsu Esprimo series (D556/2, D6011, D6012, D7010, D7011, D7012, D7013, D738, D757, D9010, D9011, D9012, D9013, D957, D958, and more)
  • Fujitsu Lifebook series (U939, U9310, U9311, U9312, U9313x, U9413, U7310, U7311, U7312, U7313, and more)
  • Fujitsu Celsius workstations (C780, J5010, J550/2, J580, M7010, W5010, W5011, W5012, W570, W580, H5511, H7510, H7613, H780, H980)
  • Fujitsu Primergy servers (RX, TX, CX, BX, GX series)
  • Fujitsu Primequest servers (3800B, 3800B2, 3800E, 3800E2, 4400E)
  • Fujitsu Stylistic tablets (Q509, Q5010, Q739, Q7310, Q7311, Q7312)

Discovery Timeline

  • December 7, 2023 - CVE-2023-40238 published to NVD
  • December 31, 2025 - Last updated in NVD database

Technical Details for CVE-2023-40238

Vulnerability Analysis

The LogoFAIL vulnerability in BmpDecoderDxe exploits a fundamental flaw in how UEFI firmware parses BMP (bitmap) images used for boot logos. During system initialization, the DXE phase processes boot logo images before security controls like Secure Boot verification are fully active.

The BmpDecoderDxe driver improperly handles signed integer values when reading BMP header fields, specifically PixelHeight and PixelWidth. When processing RLE4 or RLE8 compressed BMP files, the driver fails to validate that these dimensions are positive values. An attacker can craft a malicious BMP file with negative height values, causing the decoder to calculate incorrect buffer sizes and memory offsets.

This integer signedness error results in the decoder writing decompressed pixel data to arbitrary memory locations, allowing an attacker to corrupt critical UEFI data structures or inject executable code into DXE driver memory space. Because this occurs before the operating system loads, the attack persists across reboots and OS reinstallations.

Root Cause

The root cause is an integer signedness error (CWE-312) in the BMP image parsing logic within the BmpDecoderDxe UEFI driver. The vulnerability occurs because:

  1. The BMP header PixelHeight field is stored as a signed 32-bit integer, where negative values indicate a top-down bitmap
  2. The decoder reads this field but uses it in unsigned arithmetic for buffer size calculations
  3. When a negative height value is interpreted as unsigned, it becomes an extremely large positive value
  4. RLE decompression writes data based on miscalculated offsets, resulting in out-of-bounds memory writes
  5. The lack of bounds checking allows controlled memory corruption at attacker-specified addresses

Attack Vector

This vulnerability requires local access to modify the boot logo image. An attacker with physical access or with sufficient privileges to write to the EFI System Partition can replace the legitimate boot logo with a crafted malicious BMP file. The attack proceeds as follows:

The attacker crafts a BMP file with manipulated PixelHeight and PixelWidth header values designed to trigger the integer signedness error. When placed in the appropriate firmware location or ESP, this malicious image is processed during the next boot cycle. The DXE driver's flawed RLE decompression writes attacker-controlled data to specific memory addresses, potentially overwriting function pointers or injecting shellcode. This enables arbitrary code execution at UEFI privilege level, which is higher than kernel ring-0.

The attack can be delivered through:

  • Physical access to plant malicious boot images
  • Malware with administrative privileges modifying the ESP
  • Supply chain attacks embedding malicious logos in firmware updates

Detection Methods for CVE-2023-40238

Indicators of Compromise

  • Unexpected modifications to BMP files in the EFI System Partition (/boot/efi or ESP volume)
  • Changes to firmware boot logo configuration or NVRAM variables related to logo display
  • Anomalous firmware behavior during POST or unexpected delays in the boot process
  • Unauthorized modifications to UEFI firmware flash regions containing logo data
  • Discrepancies between expected and actual firmware component hashes

Detection Strategies

  • Deploy firmware integrity monitoring solutions to detect unauthorized changes to UEFI components and boot partition contents
  • Implement file integrity monitoring on the EFI System Partition to alert on any BMP file modifications
  • Use hardware-based firmware verification tools (such as Intel Boot Guard or AMD Hardware Validated Boot) to detect tampering
  • Conduct periodic firmware hash verification against known-good baselines from vendor sources
  • Monitor UEFI event logs for unusual DXE driver loading patterns or memory allocation anomalies

Monitoring Recommendations

  • Enable UEFI Secure Boot logging and audit boot-time events through platform-specific tools
  • Implement SentinelOne's firmware protection capabilities to monitor for pre-boot threats and unauthorized firmware modifications
  • Regularly verify firmware versions against vendor-published security advisories from Insyde and affected OEMs
  • Maintain an inventory of affected Fujitsu systems and track firmware update deployment status

How to Mitigate CVE-2023-40238

Immediate Actions Required

  • Identify all systems using Insyde InsydeH2O firmware (particularly Fujitsu Esprimo, Lifebook, Celsius, Primergy, Primequest, and Stylistic products)
  • Apply firmware updates from your hardware vendor that address CVE-2023-40238
  • Verify Secure Boot is enabled and properly configured on all affected systems
  • Restrict write access to the EFI System Partition to prevent unauthorized logo file modifications
  • Implement physical security controls to prevent unauthorized access to affected systems

Patch Information

Insyde has released security updates addressing this vulnerability in the following firmware kernel versions:

  • InsydeH2O kernel 5.2: Update to version 05.28.47 or later
  • InsydeH2O kernel 5.3: Update to version 05.37.47 or later
  • InsydeH2O kernel 5.4: Update to version 05.45.47 or later
  • InsydeH2O kernel 5.5: Update to version 05.53.47 or later
  • InsydeH2O kernel 5.6: Update to version 05.60.47 or later

Organizations should obtain firmware updates through their hardware vendor (Fujitsu, Lenovo, or other OEMs using InsydeH2O). Consult the Insyde Security Advisory SA-2023053 and the CERT Vulnerability Report VU#811862 for additional details. NetApp customers should refer to NetApp Security Advisory NTAP-20240105-0002.

Workarounds

  • Enable and enforce UEFI Secure Boot to provide partial mitigation against unsigned firmware modifications
  • Configure BIOS/UEFI password protection to prevent unauthorized firmware settings changes
  • Disable custom boot logos if the firmware provides this option, forcing use of default embedded images
  • Implement BitLocker with TPM and PCR validation to detect boot component changes and seal encryption keys to known-good firmware state
  • Use hardware-enforced write protection for firmware regions where supported by the platform
bash
# Verify Secure Boot status on Linux systems
mokutil --sb-state

# Check current firmware version on Linux
dmidecode -s bios-version

# List EFI System Partition contents to audit for suspicious files
ls -la /boot/efi/EFI/

# Monitor ESP for file changes (example using inotifywait)
inotifywait -m -r /boot/efi/ -e modify,create,delete

Disclaimer: This content was generated using AI. While we strive for accuracy, please verify critical information with official sources.

  • Vulnerability Details
  • TypeBuffer Overflow

  • Vendor/TechFujitsu

  • SeverityMEDIUM

  • CVSS Score5.5

  • EPSS Probability0.13%

  • Known ExploitedNo
  • CVSS Vector
  • CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • Impact Assessment
  • ConfidentialityLow
  • IntegrityNone
  • AvailabilityHigh
  • CWE References
  • CWE-312
  • Technical References
  • Binarly Blog Post on Image Parsing

  • NetApp Security Advisory NTAP-20240105-0002

  • CERT Vulnerability Report ID 811862
  • Vendor Resources
  • Insyde Security Pledge Overview

  • Insyde Security Advisory SA-2023053
  • Related CVEs
  • CVE-2026-20893: Fujitsu AuthConductor Privilege Escalation
Experience the World’s Most Advanced Cybersecurity Platform

Experience the World’s Most Advanced Cybersecurity Platform

See how our intelligent, autonomous cybersecurity platform can protect your organization now and into the future.

Try SentinelOne
  • Get Started
  • Get a Demo
  • Product Tour
  • Why SentinelOne
  • Pricing & Packaging
  • FAQ
  • Contact
  • Contact Us
  • Customer Support
  • SentinelOne Status
  • Language
  • Platform
  • Singularity Platform
  • Singularity Endpoint
  • Singularity Cloud
  • Singularity AI-SIEM
  • Singularity Identity
  • Singularity Marketplace
  • Purple AI
  • Services
  • Wayfinder TDR
  • SentinelOne GO
  • Technical Account Management
  • Support Services
  • Verticals
  • Energy
  • Federal Government
  • Finance
  • Healthcare
  • Higher Education
  • K-12 Education
  • Manufacturing
  • Retail
  • State and Local Government
  • Cybersecurity for SMB
  • Resources
  • Blog
  • Labs
  • Case Studies
  • Videos
  • Product Tours
  • Events
  • Cybersecurity 101
  • eBooks
  • Webinars
  • Whitepapers
  • Press
  • News
  • Ransomware Anthology
  • Company
  • About Us
  • Our Customers
  • Careers
  • Partners
  • Legal & Compliance
  • Security & Compliance
  • Investor Relations
  • S Foundation
  • S Ventures

©2026 SentinelOne, All Rights Reserved.

Privacy Notice Terms of Use

English