All the vulnerabilites related to intel - pcsd_bios
Vulnerability from fkie_nvd
Published
2023-08-11 03:15
Modified
2024-11-21 07:09
Severity ?
6.0 (Medium) - CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N
4.4 (Medium) - CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N
4.4 (Medium) - CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N
Summary
Improper input validation in firmware for some Intel(R) PCSD BIOS before version 02.01.0013 may allow a privileged user to potentially enable information disclosure via local access.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
intel | pcsd_bios | * | |
intel | r1208wfqysr | - | |
intel | r1208wftys | - | |
intel | r1208wftysr | - | |
intel | r1304wf0ys | - | |
intel | r1304wf0ysr | - | |
intel | r1304wftys | - | |
intel | r1304wftysr | - | |
intel | r2208wf0zs | - | |
intel | r2208wf0zsr | - | |
intel | r2208wfqzs | - | |
intel | r2208wfqzsr | - | |
intel | r2208wftzs | - | |
intel | r2208wftzsr | - | |
intel | r2224wfqzs | - | |
intel | r2224wftzs | - | |
intel | r2224wftzsr | - | |
intel | r2308wftzs | - | |
intel | r2308wftzsr | - | |
intel | r2312wf0np | - | |
intel | r2312wf0npr | - | |
intel | r2312wfqzs | - | |
intel | r2312wftzs | - | |
intel | r2312wftzsr | - | |
intel | s2600wf0 | - | |
intel | s2600wf0r | - | |
intel | s2600wfq | - | |
intel | s2600wfqr | - | |
intel | s2600wft | - | |
intel | s2600wftf | - | |
intel | s2600wftr | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:pcsd_bios:*:*:*:*:*:*:*:*", "matchCriteriaId": "5F1E0B49-1018-4E99-979A-BA01E85B0387", "versionEndExcluding": "02.01.0013", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:r1208wfqysr:-:*:*:*:*:*:*:*", "matchCriteriaId": "85763067-E9E5-4418-A51F-FF3DD3710F9B", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:r1208wftys:-:*:*:*:*:*:*:*", "matchCriteriaId": "F1DD69C7-9E7C-4569-9971-A06F77028BB7", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:r1208wftysr:-:*:*:*:*:*:*:*", "matchCriteriaId": "3506908A-8081-4ADA-A986-E02415956AB4", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:r1304wf0ys:-:*:*:*:*:*:*:*", "matchCriteriaId": "0DEF6206-E94C-4C16-8D91-AD776D62F79F", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:r1304wf0ysr:-:*:*:*:*:*:*:*", "matchCriteriaId": "A1E6AFA4-49E7-4191-9EA2-7E2EE269067B", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:r1304wftys:-:*:*:*:*:*:*:*", "matchCriteriaId": "0A47AC30-315C-4E4B-BBBB-305FA5131281", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:r1304wftysr:-:*:*:*:*:*:*:*", "matchCriteriaId": "48054F35-53C1-4480-86E2-CB8260DD84B6", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:r2208wf0zs:-:*:*:*:*:*:*:*", "matchCriteriaId": "EF575955-C7E1-4DD6-8AAE-5930EDFEDA93", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:r2208wf0zsr:-:*:*:*:*:*:*:*", "matchCriteriaId": "8029A5F9-E999-4BA9-AA77-14A73B83454E", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:r2208wfqzs:-:*:*:*:*:*:*:*", "matchCriteriaId": "3B83196F-06BD-41D6-A6B8-C7ABD25CA238", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:r2208wfqzsr:-:*:*:*:*:*:*:*", "matchCriteriaId": "07C54A6D-7193-4AC3-A1E5-3CE16DF54FCB", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:r2208wftzs:-:*:*:*:*:*:*:*", "matchCriteriaId": "30E49457-D38D-4145-81F2-7FA4D463CD24", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:r2208wftzsr:-:*:*:*:*:*:*:*", "matchCriteriaId": "7BB1E675-B059-4F28-8EBA-9FA5EF6E4044", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:r2224wfqzs:-:*:*:*:*:*:*:*", "matchCriteriaId": "13C6540A-C5E4-46E5-BB7C-E4C53904AE68", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:r2224wftzs:-:*:*:*:*:*:*:*", "matchCriteriaId": "D952C1D5-581F-4ADC-8DB5-3682DC8588CA", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:r2224wftzsr:-:*:*:*:*:*:*:*", "matchCriteriaId": "7D6DFA67-F1EE-4DBB-8E7B-CCDF097DC8BE", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:r2308wftzs:-:*:*:*:*:*:*:*", "matchCriteriaId": "31EF6A93-7FDE-43A7-BB5D-1DD52318F60D", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:r2308wftzsr:-:*:*:*:*:*:*:*", "matchCriteriaId": "F3183B56-D5BB-4010-B2EE-3427D796D2A1", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:r2312wf0np:-:*:*:*:*:*:*:*", "matchCriteriaId": "98B6DF59-DF1E-4D9C-B574-37DC398B16AB", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:r2312wf0npr:-:*:*:*:*:*:*:*", "matchCriteriaId": "931E4D81-FAF0-4BFF-92E0-D5F653C5E845", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:r2312wfqzs:-:*:*:*:*:*:*:*", "matchCriteriaId": "6982CB5F-4448-48D4-BD3A-782874AB2304", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:r2312wftzs:-:*:*:*:*:*:*:*", "matchCriteriaId": "B14E3D1D-B614-458D-8F78-E25CC89B311E", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:r2312wftzsr:-:*:*:*:*:*:*:*", "matchCriteriaId": "81818501-4F4A-4CED-895D-84D6DC139811", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:s2600wf0:-:*:*:*:*:*:*:*", "matchCriteriaId": "5D8B99E9-63EF-45FA-AD23-1CEBDB3DD41E", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:s2600wf0r:-:*:*:*:*:*:*:*", "matchCriteriaId": "C74211C3-3F9D-41E8-AB5B-16205AD90B64", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:s2600wfq:-:*:*:*:*:*:*:*", "matchCriteriaId": "F105271A-9DC1-42CE-9D19-E4A55BE1F04E", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:s2600wfqr:-:*:*:*:*:*:*:*", "matchCriteriaId": "FC998F55-2B5C-418D-9B17-23A05C75F454", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:s2600wft:-:*:*:*:*:*:*:*", "matchCriteriaId": "D4BEA962-CEFF-429C-BB64-1C3FEA98FCE9", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:s2600wftf:-:*:*:*:*:*:*:*", "matchCriteriaId": "DDADADBF-BF1E-4337-A622-79A59A013745", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:s2600wftr:-:*:*:*:*:*:*:*", "matchCriteriaId": "51C622C8-95E1-4A7F-B3E1-4199310CF4E8", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper input validation in firmware for some Intel(R) PCSD BIOS before version 02.01.0013 may allow a privileged user to potentially enable information disclosure via local access." }, { "lang": "es", "value": "Una validaci\u00f3n de entrada incorrecta en el firmware de algunas BIOS Intel(R) PCSD anteriores a la versi\u00f3n 02.01.0013 puede permitir a un usuario con privilegios la divulgaci\u00f3n potencial de informaci\u00f3n mediante acceso local." } ], "id": "CVE-2022-34657", "lastModified": "2024-11-21T07:09:55.193", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 6.0, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "HIGH", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 1.5, "impactScore": 4.0, "source": "secure@intel.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 4.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 0.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2023-08-11T03:15:12.570", "references": [ { "source": "secure@intel.com", "tags": [ "Vendor Advisory" ], "url": "http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00742.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00742.html" } ], "sourceIdentifier": "secure@intel.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-20" } ], "source": "secure@intel.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-20" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
cve-2022-34657
Vulnerability from cvelistv5
Published
2023-08-11 02:36
Modified
2024-10-02 14:13
Severity ?
EPSS score ?
Summary
Improper input validation in firmware for some Intel(R) PCSD BIOS before version 02.01.0013 may allow a privileged user to potentially enable information disclosure via local access.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | n/a | Intel(R) PCSD BIOS |
Version: before version 02.01.0013 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T09:15:15.641Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00742.html", "tags": [ "x_transferred" ], "url": "http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00742.html" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2022-34657", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-10-02T14:09:11.440724Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-10-02T14:13:31.614Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "Intel(R) PCSD BIOS", "vendor": "n/a", "versions": [ { "status": "affected", "version": "before version 02.01.0013" } ] } ], "descriptions": [ { "lang": "en", "value": "Improper input validation in firmware for some Intel(R) PCSD BIOS before version 02.01.0013 may allow a privileged user to potentially enable information disclosure via local access." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 6, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "HIGH", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "description": "information disclosure", "lang": "en" }, { "cweId": "CWE-20", "description": "Improper input validation", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-08-11T02:36:52.308Z", "orgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce", "shortName": "intel" }, "references": [ { "name": "http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00742.html", "url": "http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00742.html" } ] } }, "cveMetadata": { "assignerOrgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce", "assignerShortName": "intel", "cveId": "CVE-2022-34657", "datePublished": "2023-08-11T02:36:52.308Z", "dateReserved": "2022-07-22T03:00:24.424Z", "dateUpdated": "2024-10-02T14:13:31.614Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }