All the vulnerabilites related to intel - nuc_10_performance_kit_nuc10i7fnhn
Vulnerability from fkie_nvd
Published
2022-11-11 16:15
Modified
2024-11-21 07:13
Severity ?
7.5 (High) - CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H
7.8 (High) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
7.8 (High) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Summary
Improper access control in BIOS firmware for some Intel(R) NUC 10 Performance Kits and Intel(R) NUC 10 Performance Mini PCs before version FNCML357.0053 may allow a privileged user to potentially enable escalation of privilege via local access.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_10_performance_kit_nuc10i7fnhn_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "11077727-C535-422C-990B-C750994C5ED3", "versionEndExcluding": "fncml357.0053", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_10_performance_kit_nuc10i7fnhn:-:*:*:*:*:*:*:*", "matchCriteriaId": "26995DBC-B29B-4D8A-95BF-E6F501FFACA4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_10_performance_kit_nuc10i5fnkn_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "628F1749-9EEC-4344-9DF9-D61ABCABC417", "versionEndExcluding": "fncml357.0053", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_10_performance_kit_nuc10i5fnkn:-:*:*:*:*:*:*:*", "matchCriteriaId": "6C1423FF-6747-4E7B-B160-092F36B93028", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_10_performance_kit_nuc10i5fnhn_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "69445A79-94AE-4714-9A76-43789FC82A2F", "versionEndExcluding": "fncml357.0053", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_10_performance_kit_nuc10i5fnhn:-:*:*:*:*:*:*:*", "matchCriteriaId": "982BF293-B07A-493A-893E-58389B86674A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_10_performance_kit_nuc10i7fnkn_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "994E33C8-C230-4F93-B3EB-142AE21E8200", "versionEndExcluding": "fncml357.0053", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_10_performance_kit_nuc10i7fnkn:-:*:*:*:*:*:*:*", "matchCriteriaId": "57CDFD52-4E08-4522-8792-FA775111E2AE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_10_performance_kit_nuc10i3fnhn_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B54F08AA-3EE2-4324-8093-D4E126B8C816", "versionEndExcluding": "fncml357.0053", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_10_performance_kit_nuc10i3fnhn:-:*:*:*:*:*:*:*", "matchCriteriaId": "F45BFBCB-443E-4905-8728-8DECA49C671F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_10_performance_kit_nuc10i3fnkn_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F27CD649-EB48-444E-A08A-530BFADEA2DB", "versionEndExcluding": "fncml357.0053", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_10_performance_kit_nuc10i3fnkn:-:*:*:*:*:*:*:*", "matchCriteriaId": "4E7FE700-51E7-4478-BE04-296C62F37171", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_10_performance_mini_pc_nuc10i5fnhja_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "4E112B83-6B3F-4CAC-BEC2-656B90AA9FE3", "versionEndExcluding": "fncml357.0053", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_10_performance_mini_pc_nuc10i5fnhja:-:*:*:*:*:*:*:*", "matchCriteriaId": "C6D1375B-5030-4724-B522-C86CEFBBB8B0", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_10_performance_kit_nuc10i3fnhf_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "DF78A29B-EFA9-4877-8C39-4C7ABED76151", "versionEndExcluding": "fncml357.0053", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_10_performance_kit_nuc10i3fnhf:-:*:*:*:*:*:*:*", "matchCriteriaId": "72D7FE86-9466-4AFF-A1F9-D8A4A051D97A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_10_performance_mini_pc_nuc10i5fnhca_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "88A54C84-3B8E-426C-BEF5-ACC5C2EF309F", "versionEndExcluding": "fncml357.0053", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_10_performance_mini_pc_nuc10i5fnhca:-:*:*:*:*:*:*:*", "matchCriteriaId": "3FED0441-1CC3-4A83-95F2-D0918D12C3F3", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_10_performance_mini_pc_nuc10i3fnhfa_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "FB92C4A0-3E13-4E29-8C67-B0111636CF1D", "versionEndExcluding": "fncml357.0053", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_10_performance_mini_pc_nuc10i3fnhfa:-:*:*:*:*:*:*:*", "matchCriteriaId": "6A2589CD-5A05-4467-9B28-B0C91C1946DB", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_10_performance_kit_nuc10i5fnhj_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C1E36717-2560-4797-8D3F-6287F65FE3A5", "versionEndExcluding": "fncml357.0053", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_10_performance_kit_nuc10i5fnhj:-:*:*:*:*:*:*:*", "matchCriteriaId": "ACCC889D-9347-4B88-9EC9-7674AF8D48B9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_10_performance_kit_nuc10i7fnhc_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "8669B3AD-A6E7-4A11-8688-430C4E0CBA05", "versionEndExcluding": "fncml357.0053", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_10_performance_kit_nuc10i7fnhc:-:*:*:*:*:*:*:*", "matchCriteriaId": "687D8B64-1BB2-4851-914D-65A15E64CD05", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_10_performance_mini_pc_nuc10i7fnhja_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D34A97B6-64D4-4E35-9F52-33C1534A5892", "versionEndExcluding": "fncml357.0053", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_10_performance_mini_pc_nuc10i7fnhja:-:*:*:*:*:*:*:*", "matchCriteriaId": "9B1C87D1-007F-4AB6-9A35-F43ED48289AF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_10_performance_mini_pc_nuc10i3fnhja_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A0BF1D6C-501E-49A8-A8CA-B156C1CD108E", "versionEndExcluding": "fncml357.0053", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_10_performance_mini_pc_nuc10i3fnhja:-:*:*:*:*:*:*:*", "matchCriteriaId": "02C864F8-F071-4E64-98B0-5051DEA89078", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_10_performance_kit_nuc10i3fnk_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "93158039-E5DF-4A09-AFF2-0233F4F6870D", "versionEndExcluding": "fncml357.0053", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_10_performance_kit_nuc10i3fnk:-:*:*:*:*:*:*:*", "matchCriteriaId": "CFD23EB7-5C1D-4917-9C98-0EEBF46134F2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_10_performance_mini_pc_nuc10i7fnhaa_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F8E03914-1FFC-43AF-9DC0-DB5A55C667BA", "versionEndExcluding": "fncml357.0053", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_10_performance_mini_pc_nuc10i7fnhaa:-:*:*:*:*:*:*:*", "matchCriteriaId": "E31F7095-582A-4611-9954-3D8FD9E38DFE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_10_performance_kit_nuc10i5fnh_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "54E29364-986C-4AB8-B455-A7DE5E59E325", "versionEndExcluding": "fncml357.0053", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_10_performance_kit_nuc10i5fnh:-:*:*:*:*:*:*:*", "matchCriteriaId": "890DAA85-3F69-4F0F-B289-DA89A17E09AC", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_10_performance_kit_nuc10i5fnk_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "2111EC22-8C80-4E52-AF4B-F2001378DA70", "versionEndExcluding": "fncml357.0053", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_10_performance_kit_nuc10i5fnk:-:*:*:*:*:*:*:*", "matchCriteriaId": "FC03DC21-C64F-48AD-8405-3A9F0CF1875A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_10_performance_kit_nuc10i7fnh_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "BD5A325C-1E26-469D-8BFA-6B6C0A703A37", "versionEndExcluding": "fncml357.0053", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_10_performance_kit_nuc10i7fnh:-:*:*:*:*:*:*:*", "matchCriteriaId": "DDD0FB5E-5B58-411C-9C32-4B5B8E734484", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_10_performance_kit_nuc10i5fnhf_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B968F575-AF61-4A32-9CEB-26F86E60B2B7", "versionEndExcluding": "fncml357.0053", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_10_performance_kit_nuc10i5fnhf:-:*:*:*:*:*:*:*", "matchCriteriaId": "EBD38C4E-BF7C-42D3-ABDC-AB640F3603DE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_10_performance_mini_pc_nuc10i7fnkpa_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "278234AD-3DEB-419A-B765-08D7C4F76C3B", "versionEndExcluding": "fncml357.0053", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_10_performance_mini_pc_nuc10i7fnkpa:-:*:*:*:*:*:*:*", "matchCriteriaId": "B9D1B1A6-7408-40D8-84B9-74802A9A1CB9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_10_performance_mini_pc_nuc10i5fnkpa_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C24C4C7B-8B29-46CC-B475-A9D29C158DF4", "versionEndExcluding": "fncml357.0053", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_10_performance_mini_pc_nuc10i5fnkpa:-:*:*:*:*:*:*:*", "matchCriteriaId": "BF5E06C0-29FD-4156-B7CF-051DD2E2E150", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_10_performance_kit_nuc10i3fnh_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "119A6B0F-9327-4784-BF0B-67F350E4D54E", "versionEndExcluding": "fncml357.0053", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_10_performance_kit_nuc10i3fnh:-:*:*:*:*:*:*:*", "matchCriteriaId": "011A0721-F120-4B92-B9F6-315A87B0B9EA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_10_performance_kit_nuc10i7fnk_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "4A8995C1-8221-47FA-A485-1D3F3EB4474D", "versionEndExcluding": "fncml357.0053", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_10_performance_kit_nuc10i7fnk:-:*:*:*:*:*:*:*", "matchCriteriaId": "1740C3E2-6123-4B55-B40C-F9D363BCD6C3", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_10_performance_kit_nuc10i7fnkp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B1F23D04-BB12-4AAE-8E6F-BA56E062EEB2", "versionEndExcluding": "fncml357.0053", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_10_performance_kit_nuc10i7fnkp:-:*:*:*:*:*:*:*", "matchCriteriaId": "41DD645C-D706-4657-9823-03F6D49AE3B7", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_10_performance_kit_nuc10i5fnkp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D9418E2B-9B97-4CB3-B004-B0FC9817AA06", "versionEndExcluding": "fncml357.0053", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_10_performance_kit_nuc10i5fnkp:-:*:*:*:*:*:*:*", "matchCriteriaId": "7A9F6F48-C085-43D1-A7AD-E3AF54C78CDA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper access control in BIOS firmware for some Intel(R) NUC 10 Performance Kits and Intel(R) NUC 10 Performance Mini PCs before version FNCML357.0053 may allow a privileged user to potentially enable escalation of privilege via local access." }, { "lang": "es", "value": "Un control de acceso inadecuado en el firmware del BIOS para Intel(R) NUC 10 Performance Kits y Intel(R) NUC 10 Performance Mini PCs anteriores a la versi\u00f3n FNCML357.0053 puede permitir que un usuario privilegiado habilite potencialmente la escalada de privilegios a trav\u00e9s del acceso local." } ], "id": "CVE-2022-36789", "lastModified": "2024-11-21T07:13:44.907", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 0.8, "impactScore": 6.0, "source": "secure@intel.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2022-11-11T16:15:16.053", "references": [ { "source": "secure@intel.com", "tags": [ "Vendor Advisory" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00752.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00752.html" } ], "sourceIdentifier": "secure@intel.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2023-08-11 03:15
Modified
2024-11-21 07:14
Severity ?
7.9 (High) - CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:H/A:H
6.7 (Medium) - CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
6.7 (Medium) - CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
Summary
Improper input validation in BIOS firmware for some Intel(R) NUC may allow a privileged user to potentially enable escalation of privilege via local access.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_10_performance_kit_nuc10i7fnhn_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "14010DA7-F19F-44DD-A067-4B3AFE1D0105", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_10_performance_kit_nuc10i7fnhn:-:*:*:*:*:*:*:*", "matchCriteriaId": "26995DBC-B29B-4D8A-95BF-E6F501FFACA4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_10_performance_kit_nuc10i5fnkn_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "76C13FBF-30C4-43AC-BE0D-96F0EEBD825C", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_10_performance_kit_nuc10i5fnkn:-:*:*:*:*:*:*:*", "matchCriteriaId": "6C1423FF-6747-4E7B-B160-092F36B93028", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_10_performance_kit_nuc10i5fnhn_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "02D4DB3F-1F0E-47E1-A981-30552CE5C5DD", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_10_performance_kit_nuc10i5fnhn:-:*:*:*:*:*:*:*", "matchCriteriaId": "982BF293-B07A-493A-893E-58389B86674A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_10_performance_kit_nuc10i7fnkn_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "7900EABE-4F39-4A7F-B13B-300C00CED8B1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_10_performance_kit_nuc10i7fnkn:-:*:*:*:*:*:*:*", "matchCriteriaId": "57CDFD52-4E08-4522-8792-FA775111E2AE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_10_performance_kit_nuc10i3fnhn_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "492D45D2-6513-4E04-824F-74D37A37F7FF", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_10_performance_kit_nuc10i3fnhn:-:*:*:*:*:*:*:*", "matchCriteriaId": "F45BFBCB-443E-4905-8728-8DECA49C671F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_10_performance_kit_nuc10i3fnkn_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "2FC33852-0709-4203-A9D5-08DC9BFBDD9E", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_10_performance_kit_nuc10i3fnkn:-:*:*:*:*:*:*:*", "matchCriteriaId": "4E7FE700-51E7-4478-BE04-296C62F37171", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_10_performance_mini_pc_nuc10i5fnhja_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "D5B984D5-0BD5-4F3C-A4BA-AF23035F743E", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_10_performance_mini_pc_nuc10i5fnhja:-:*:*:*:*:*:*:*", "matchCriteriaId": "C6D1375B-5030-4724-B522-C86CEFBBB8B0", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_10_performance_kit_nuc10i3fnhf_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "965F81FD-D4DF-4347-B104-1802F3607350", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_10_performance_kit_nuc10i3fnhf:-:*:*:*:*:*:*:*", "matchCriteriaId": "72D7FE86-9466-4AFF-A1F9-D8A4A051D97A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_10_performance_mini_pc_nuc10i7fnkpa_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "061DFDF5-01E9-425C-8F20-5DABC4FBCCC9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_10_performance_mini_pc_nuc10i7fnkpa:-:*:*:*:*:*:*:*", "matchCriteriaId": "B9D1B1A6-7408-40D8-84B9-74802A9A1CB9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_10_performance_mini_pc_nuc10i5fnhca_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "E3D30FB2-2E8F-4166-A916-3FB9E60071D3", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_10_performance_mini_pc_nuc10i5fnhca:-:*:*:*:*:*:*:*", "matchCriteriaId": "3FED0441-1CC3-4A83-95F2-D0918D12C3F3", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_10_performance_mini_pc_nuc10i3fnhfa_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "BFEE2CE0-6C7B-46D4-BE71-47872A35C249", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_10_performance_mini_pc_nuc10i3fnhfa:-:*:*:*:*:*:*:*", "matchCriteriaId": "6A2589CD-5A05-4467-9B28-B0C91C1946DB", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_10_performance_kit_nuc10i5fnhj_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "B88C8854-462E-4E8D-A3BC-BF0A261E7E9D", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_10_performance_kit_nuc10i5fnhj:-:*:*:*:*:*:*:*", "matchCriteriaId": "ACCC889D-9347-4B88-9EC9-7674AF8D48B9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_10_performance_kit_nuc10i7fnhc_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "EAEF06D3-F944-4910-9B73-6045793A37A9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_10_performance_kit_nuc10i7fnhc:-:*:*:*:*:*:*:*", "matchCriteriaId": "687D8B64-1BB2-4851-914D-65A15E64CD05", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_10_performance_mini_pc_nuc10i7fnhja_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "52E8F8BD-93C7-4208-8C87-2AE87D32F942", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_10_performance_mini_pc_nuc10i7fnhja:-:*:*:*:*:*:*:*", "matchCriteriaId": "9B1C87D1-007F-4AB6-9A35-F43ED48289AF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_10_performance_mini_pc_nuc10i3fnhja_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "4813C055-32BF-46E9-B9B5-D2C796E9F19B", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_10_performance_mini_pc_nuc10i3fnhja:-:*:*:*:*:*:*:*", "matchCriteriaId": "02C864F8-F071-4E64-98B0-5051DEA89078", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_10_performance_kit_nuc10i3fnk_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "5F48CEE2-5B17-4176-8FC3-7422B38A44ED", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_10_performance_kit_nuc10i3fnk:-:*:*:*:*:*:*:*", "matchCriteriaId": "CFD23EB7-5C1D-4917-9C98-0EEBF46134F2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_10_performance_mini_pc_nuc10i7fnhaa_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "DE63E73A-087C-4090-863B-233BE21C1B18", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_10_performance_mini_pc_nuc10i7fnhaa:-:*:*:*:*:*:*:*", "matchCriteriaId": "E31F7095-582A-4611-9954-3D8FD9E38DFE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_10_performance_kit_nuc10i5fnh_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "4824DA22-D68B-4AA3-AC99-7E3FA9B62F26", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_10_performance_kit_nuc10i5fnh:-:*:*:*:*:*:*:*", "matchCriteriaId": "890DAA85-3F69-4F0F-B289-DA89A17E09AC", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_10_performance_kit_nuc10i5fnk_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "249D0BA3-0C5F-420F-B76A-254EFA233D54", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_10_performance_kit_nuc10i5fnk:-:*:*:*:*:*:*:*", "matchCriteriaId": "FC03DC21-C64F-48AD-8405-3A9F0CF1875A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_10_performance_kit_nuc10i7fnh_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "F57F470F-3B1C-4294-90A0-4DC84DC2CDCD", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_10_performance_kit_nuc10i7fnh:-:*:*:*:*:*:*:*", "matchCriteriaId": "DDD0FB5E-5B58-411C-9C32-4B5B8E734484", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_10_performance_kit_nuc10i5fnhf_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "F1EDFEC6-CAB7-4923-B338-E391029C1217", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_10_performance_kit_nuc10i5fnhf:-:*:*:*:*:*:*:*", "matchCriteriaId": "EBD38C4E-BF7C-42D3-ABDC-AB640F3603DE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_10_performance_mini_pc_nuc10i5fnkpa_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "CC2748B7-CDF6-4CCF-931C-2D3A029EA8F1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_10_performance_mini_pc_nuc10i5fnkpa:-:*:*:*:*:*:*:*", "matchCriteriaId": "BF5E06C0-29FD-4156-B7CF-051DD2E2E150", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_10_performance_kit_nuc10i3fnh_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "00539796-D61E-4FFF-A979-4265DA46A542", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_10_performance_kit_nuc10i3fnh:-:*:*:*:*:*:*:*", "matchCriteriaId": "011A0721-F120-4B92-B9F6-315A87B0B9EA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_10_performance_kit_nuc10i7fnk_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "134A6B8F-364E-490F-85E1-38DE92DCDEFD", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_10_performance_kit_nuc10i7fnk:-:*:*:*:*:*:*:*", "matchCriteriaId": "1740C3E2-6123-4B55-B40C-F9D363BCD6C3", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_10_performance_kit_nuc10i7fnkp_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "AFA30D75-9A90-48FF-BA92-62326811D9DA", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_10_performance_kit_nuc10i7fnkp:-:*:*:*:*:*:*:*", "matchCriteriaId": "41DD645C-D706-4657-9823-03F6D49AE3B7", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_10_performance_kit_nuc10i5fnkp_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "659E62DD-7AA2-4216-8EC1-00A655BB527F", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_10_performance_kit_nuc10i5fnkp:-:*:*:*:*:*:*:*", "matchCriteriaId": "7A9F6F48-C085-43D1-A7AD-E3AF54C78CDA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper input validation in BIOS firmware for some Intel(R) NUC may allow a privileged user to potentially enable escalation of privilege via local access." }, { "lang": "es", "value": "Una validaci\u00f3n de entrada inadecuada en el firmware de la BIOS para algunos Intel(R) NUC puede permitir que un usuario con privilegios habilite potencialmente una escalada de privilegios mediante acceso local." } ], "id": "CVE-2022-37336", "lastModified": "2024-11-21T07:14:46.933", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.9, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.5, "impactScore": 5.8, "source": "secure@intel.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 0.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2023-08-11T03:15:13.423", "references": [ { "source": "secure@intel.com", "tags": [ "Vendor Advisory" ], "url": "http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00892.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00892.html" } ], "sourceIdentifier": "secure@intel.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-20" } ], "source": "secure@intel.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
cve-2022-37336
Vulnerability from cvelistv5
Published
2023-08-11 02:37
Modified
2024-10-02 13:27
Severity ?
EPSS score ?
Summary
Improper input validation in BIOS firmware for some Intel(R) NUC may allow a privileged user to potentially enable escalation of privilege via local access.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | n/a | Intel(R) NUC |
Version: See references |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T10:29:20.651Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00892.html", "tags": [ "x_transferred" ], "url": "http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00892.html" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2022-37336", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-10-02T13:17:46.770775Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-10-02T13:27:03.292Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "Intel(R) NUC", "vendor": "n/a", "versions": [ { "status": "affected", "version": "See references" } ] } ], "descriptions": [ { "lang": "en", "value": "Improper input validation in BIOS firmware for some Intel(R) NUC may allow a privileged user to potentially enable escalation of privilege via local access." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.9, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:H/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "description": "escalation of privilege", "lang": "en" }, { "cweId": "CWE-20", "description": "Improper input validation", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-08-11T02:37:18.544Z", "orgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce", "shortName": "intel" }, "references": [ { "name": "http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00892.html", "url": "http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00892.html" } ] } }, "cveMetadata": { "assignerOrgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce", "assignerShortName": "intel", "cveId": "CVE-2022-37336", "datePublished": "2023-08-11T02:37:18.544Z", "dateReserved": "2022-08-10T03:00:25.333Z", "dateUpdated": "2024-10-02T13:27:03.292Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-36789
Vulnerability from cvelistv5
Published
2022-11-11 15:48
Modified
2024-08-03 10:14
Severity ?
EPSS score ?
Summary
Improper access control in BIOS firmware for some Intel(R) NUC 10 Performance Kits and Intel(R) NUC 10 Performance Mini PCs before version FNCML357.0053 may allow a privileged user to potentially enable escalation of privilege via local access.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | n/a | Intel(R) NUC 10 Performance Kits and Intel(R) NUC 10 Performance Mini PCs |
Version: before version FNCML357.0053 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T10:14:28.563Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00752.html", "tags": [ "x_transferred" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00752.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "Intel(R) NUC 10 Performance Kits and Intel(R) NUC 10 Performance Mini PCs", "vendor": "n/a", "versions": [ { "status": "affected", "version": "before version FNCML357.0053" } ] } ], "descriptions": [ { "lang": "en", "value": "Improper access control in BIOS firmware for some Intel(R) NUC 10 Performance Kits and Intel(R) NUC 10 Performance Mini PCs before version FNCML357.0053 may allow a privileged user to potentially enable escalation of privilege via local access." } ], "metrics": [ { "cvssV3_1": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "description": "escalation of privilege", "lang": "en" } ] } ], "providerMetadata": { "dateUpdated": "2022-11-14T17:46:20.561Z", "orgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce", "shortName": "intel" }, "references": [ { "name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00752.html", "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00752.html" } ] } }, "cveMetadata": { "assignerOrgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce", "assignerShortName": "intel", "cveId": "CVE-2022-36789", "datePublished": "2022-11-11T15:48:52.320Z", "dateReserved": "2022-08-04T03:00:18.750Z", "dateUpdated": "2024-08-03T10:14:28.563Z", "requesterUserId": "e1538295-92a9-4bd5-bb63-88a76fc3a35c", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }