Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2022-21807 (GCVE-0-2022-21807)
Vulnerability from cvelistv5 – Published: 2022-08-18 19:52 – Updated: 2025-05-05 16:30- escalation of privilege
| URL | Tags | ||||
|---|---|---|---|---|---|
|
|||||
| Vendor | Product | Version | ||
|---|---|---|---|---|
| n/a | Intel(R) VTune(TM) Profiler software |
Affected:
before version 2022.2.0
|
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-03T02:53:36.270Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00658.html"
}
],
"title": "CVE Program Container"
},
{
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
}
},
{
"other": {
"content": {
"id": "CVE-2022-21807",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-04-23T13:29:51.601805Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-427",
"description": "CWE-427 Uncontrolled Search Path Element",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-05-05T16:30:19.152Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"product": "Intel(R) VTune(TM) Profiler software",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "before version 2022.2.0"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "Uncontrolled search path elements in the Intel(R) VTune(TM) Profiler software before version 2022.2.0 may allow an authenticated user to potentially enable escalation of privilege via local access."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "escalation of privilege",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2022-08-18T19:52:16.000Z",
"orgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
"shortName": "intel"
},
"references": [
{
"tags": [
"x_refsource_MISC"
],
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00658.html"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "secure@intel.com",
"ID": "CVE-2022-21807",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "Intel(R) VTune(TM) Profiler software",
"version": {
"version_data": [
{
"version_value": "before version 2022.2.0"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Uncontrolled search path elements in the Intel(R) VTune(TM) Profiler software before version 2022.2.0 may allow an authenticated user to potentially enable escalation of privilege via local access."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "escalation of privilege"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00658.html",
"refsource": "MISC",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00658.html"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
"assignerShortName": "intel",
"cveId": "CVE-2022-21807",
"datePublished": "2022-08-18T19:52:16.000Z",
"dateReserved": "2022-02-03T00:00:00.000Z",
"dateUpdated": "2025-05-05T16:30:19.152Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"fkie_nvd": {
"configurations": "[{\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:intel:vtune_profiler:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"2022.2.0\", \"matchCriteriaId\": \"197A1D19-CDAC-4C6A-BD00-958FDA2ED971\"}]}]}]",
"descriptions": "[{\"lang\": \"en\", \"value\": \"Uncontrolled search path elements in the Intel(R) VTune(TM) Profiler software before version 2022.2.0 may allow an authenticated user to potentially enable escalation of privilege via local access.\"}, {\"lang\": \"es\", \"value\": \"Los elementos de ruta de b\\u00fasqueda no controlados en el software Intel(R) VTune(TM) Profiler versiones anteriores a 2022.2.0, pueden permitir que un usuario autenticado habilite potencialmente una escalada de privilegios por medio del acceso local.\"}]",
"id": "CVE-2022-21807",
"lastModified": "2024-11-21T06:45:28.473",
"metrics": "{\"cvssMetricV31\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"3.1\", \"vectorString\": \"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H\", \"baseScore\": 7.8, \"baseSeverity\": \"HIGH\", \"attackVector\": \"LOCAL\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"LOW\", \"userInteraction\": \"NONE\", \"scope\": \"UNCHANGED\", \"confidentialityImpact\": \"HIGH\", \"integrityImpact\": \"HIGH\", \"availabilityImpact\": \"HIGH\"}, \"exploitabilityScore\": 1.8, \"impactScore\": 5.9}]}",
"published": "2022-08-18T20:15:10.387",
"references": "[{\"url\": \"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00658.html\", \"source\": \"secure@intel.com\", \"tags\": [\"Patch\", \"Vendor Advisory\"]}, {\"url\": \"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00658.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Patch\", \"Vendor Advisory\"]}]",
"sourceIdentifier": "secure@intel.com",
"vulnStatus": "Modified",
"weaknesses": "[{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-427\"}]}]"
},
"nvd": "{\"cve\":{\"id\":\"CVE-2022-21807\",\"sourceIdentifier\":\"secure@intel.com\",\"published\":\"2022-08-18T20:15:10.387\",\"lastModified\":\"2025-05-05T17:17:51.643\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Uncontrolled search path elements in the Intel(R) VTune(TM) Profiler software before version 2022.2.0 may allow an authenticated user to potentially enable escalation of privilege via local access.\"},{\"lang\":\"es\",\"value\":\"Los elementos de ruta de b\u00fasqueda no controlados en el software Intel(R) VTune(TM) Profiler versiones anteriores a 2022.2.0, pueden permitir que un usuario autenticado habilite potencialmente una escalada de privilegios por medio del acceso local.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H\",\"baseScore\":7.8,\"baseSeverity\":\"HIGH\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":1.8,\"impactScore\":5.9},{\"source\":\"134c704f-9b21-4f2e-91b3-4a467353bcc0\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H\",\"baseScore\":7.8,\"baseSeverity\":\"HIGH\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":1.8,\"impactScore\":5.9}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-427\"}]},{\"source\":\"134c704f-9b21-4f2e-91b3-4a467353bcc0\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-427\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:intel:vtune_profiler:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"2022.2.0\",\"matchCriteriaId\":\"197A1D19-CDAC-4C6A-BD00-958FDA2ED971\"}]}]}],\"references\":[{\"url\":\"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00658.html\",\"source\":\"secure@intel.com\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00658.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Vendor Advisory\"]}]}}"
}
}
FKIE_CVE-2022-21807
Vulnerability from fkie_nvd - Published: 2022-08-18 20:15 - Updated: 2025-05-05 17:177.8 (High) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
| Vendor | Product | Version | |
|---|---|---|---|
| intel | vtune_profiler | * |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:intel:vtune_profiler:*:*:*:*:*:*:*:*",
"matchCriteriaId": "197A1D19-CDAC-4C6A-BD00-958FDA2ED971",
"versionEndExcluding": "2022.2.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Uncontrolled search path elements in the Intel(R) VTune(TM) Profiler software before version 2022.2.0 may allow an authenticated user to potentially enable escalation of privilege via local access."
},
{
"lang": "es",
"value": "Los elementos de ruta de b\u00fasqueda no controlados en el software Intel(R) VTune(TM) Profiler versiones anteriores a 2022.2.0, pueden permitir que un usuario autenticado habilite potencialmente una escalada de privilegios por medio del acceso local."
}
],
"id": "CVE-2022-21807",
"lastModified": "2025-05-05T17:17:51.643",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9,
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary"
}
]
},
"published": "2022-08-18T20:15:10.387",
"references": [
{
"source": "secure@intel.com",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00658.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00658.html"
}
],
"sourceIdentifier": "secure@intel.com",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-427"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
},
{
"description": [
{
"lang": "en",
"value": "CWE-427"
}
],
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary"
}
]
}
GSD-2022-21807
Vulnerability from gsd - Updated: 2023-12-13 01:19{
"GSD": {
"alias": "CVE-2022-21807",
"description": "Uncontrolled search path elements in the Intel(R) VTune(TM) Profiler software before version 2022.2.0 may allow an authenticated user to potentially enable escalation of privilege via local access.",
"id": "GSD-2022-21807"
},
"gsd": {
"metadata": {
"exploitCode": "unknown",
"remediation": "unknown",
"reportConfidence": "confirmed",
"type": "vulnerability"
},
"osvSchema": {
"aliases": [
"CVE-2022-21807"
],
"details": "Uncontrolled search path elements in the Intel(R) VTune(TM) Profiler software before version 2022.2.0 may allow an authenticated user to potentially enable escalation of privilege via local access.",
"id": "GSD-2022-21807",
"modified": "2023-12-13T01:19:14.430084Z",
"schema_version": "1.4.0"
}
},
"namespaces": {
"cve.org": {
"CVE_data_meta": {
"ASSIGNER": "secure@intel.com",
"ID": "CVE-2022-21807",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "Intel(R) VTune(TM) Profiler software",
"version": {
"version_data": [
{
"version_value": "before version 2022.2.0"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Uncontrolled search path elements in the Intel(R) VTune(TM) Profiler software before version 2022.2.0 may allow an authenticated user to potentially enable escalation of privilege via local access."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "escalation of privilege"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00658.html",
"refsource": "MISC",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00658.html"
}
]
}
},
"nvd.nist.gov": {
"configurations": {
"CVE_data_version": "4.0",
"nodes": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:intel:vtune_profiler:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndExcluding": "2022.2.0",
"vulnerable": true
}
],
"operator": "OR"
}
]
},
"cve": {
"CVE_data_meta": {
"ASSIGNER": "secure@intel.com",
"ID": "CVE-2022-21807"
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "en",
"value": "Uncontrolled search path elements in the Intel(R) VTune(TM) Profiler software before version 2022.2.0 may allow an authenticated user to potentially enable escalation of privilege via local access."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "en",
"value": "CWE-427"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00658.html",
"refsource": "MISC",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00658.html"
}
]
}
},
"impact": {
"baseMetricV3": {
"cvssV3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
},
"lastModifiedDate": "2022-08-22T20:01Z",
"publishedDate": "2022-08-18T20:15Z"
}
}
}
CERTFR-2022-AVI-727
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans les produits Intel. Certaines d'entre elles permettent à un attaquant de provoquer un déni de service, une atteinte à l'intégrité des données et une atteinte à la confidentialité des données.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| Intel | N/A | Intel 722 Series Ethernet contrôleurs et adaptateurs versions antérieures à 1.5.5 | ||
| Intel | N/A | Intel Killer™ WiFi versions antérieures à 3.1122.1105 | ||
| Intel | N/A | Open AMT Cloud Toolkit versions antérieures à 2.0.2 et 2.2.2 | ||
| Intel | N/A | Intel E810 Ethernet contrôleurs et adaptateurs versions antérieures à 1.6.1.9 | ||
| Intel | N/A | Intel Support Android versions antérieures à 21.7.40 | ||
| Intel | N/A | Intel Team Blue toutes versions | ||
| Intel | N/A | Intel IPP Cryptography versions antérieures à 2021.5 | ||
| Intel | N/A | Intel VTune™ Profiler versions antérieures à 2022.2.0 | ||
| Intel | N/A | Intel Processors (veuillez vous référer aux avis de l'éditeur : intel-sa-00706 et intel-sa-00657) | ||
| Intel | N/A | Intel Edge Insights pour les versions Industrial antérieures à 2.6.1 | ||
| Intel | N/A | Intel Standard Manageability toutes versions | ||
| Intel | N/A | Intel Data Center Manager versions antérieures à 4.1 | ||
| Intel | N/A | Intel PROSet/Wireless WiFi versions antérieure à 22.120 | ||
| Intel | N/A | Intel Datacenter Group Event Android toutes versions | ||
| Intel | N/A | Intel SPS versions antérieures à SPS_E3_04.08.04.330.0 et SPS_E3_04.01.04.530.0 | ||
| Intel | N/A | Intel Ethernet 700 Series Controller drivers pour les versions VMware antérieures à 2.1.5.0 | ||
| Intel | N/A | Intel 700 Series Ethernet contrôleurs et adaptateurs versions antérieures à 8.5 | ||
| Intel | N/A | Intel DSA versions antérieures 22.2.14 | ||
| Intel | N/A | Intel NUC9 Extreme Laptop kits versions antérieures à 2.2.0.22 | ||
| Intel | N/A | Intel Connect M Android versions antérieures à 1.7.4 | ||
| Intel | N/A | Intel HAXM versions antérieures à 7.7.1 | ||
| Intel | N/A | Intel Distribution pour Python versions antérieures à 2022.0.3 | ||
| Intel | N/A | Intel Killer™ Bluetooth versions antérieures à 22.120 | ||
| Intel | N/A | Intel NUCs versions antérieures à BC0076 | ||
| Intel | N/A | Intel RST versions antérieures à 16.8.4.1011, 17.7.1.1010, 18.1.6.1039, 18.2.1.1008 et 18.3.0.1003 | ||
| Intel | N/A | Intel SEAPI toutes versions | ||
| Intel | N/A | Intel Ethernet 500 Series Controller drivers pour les versions VMware antérieures à 1.11.4.0 | ||
| Intel | N/A | Intel Wireless Bluetooth versions antérieures à 22.120 | ||
| Intel | N/A | Intel AMT toutes versions | ||
| Intel | N/A | Intel Enpirion Digital Power Configurator GUI toutes versions | ||
| Intel | N/A | Intel Datacenter Group Event Advisory iOS toutes versions |
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Intel 722 Series Ethernet contr\u00f4leurs et adaptateurs versions ant\u00e9rieures \u00e0 1.5.5",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel Killer\u2122 WiFi versions ant\u00e9rieures \u00e0 3.1122.1105",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Open AMT Cloud Toolkit versions ant\u00e9rieures \u00e0 2.0.2 et 2.2.2",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel E810 Ethernet contr\u00f4leurs et adaptateurs versions ant\u00e9rieures \u00e0 1.6.1.9",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel Support Android versions ant\u00e9rieures \u00e0 21.7.40",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel Team Blue toutes versions",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel IPP Cryptography versions ant\u00e9rieures \u00e0 2021.5",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel VTune\u2122 Profiler versions ant\u00e9rieures \u00e0 2022.2.0",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel Processors (veuillez vous r\u00e9f\u00e9rer aux avis de l\u0027\u00e9diteur : intel-sa-00706 et intel-sa-00657)",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel Edge Insights pour les versions Industrial ant\u00e9rieures \u00e0 2.6.1",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel Standard Manageability toutes versions",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel Data Center Manager versions ant\u00e9rieures \u00e0 4.1",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel PROSet/Wireless WiFi versions ant\u00e9rieure \u00e0 22.120",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel Datacenter Group Event Android toutes versions",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel SPS versions ant\u00e9rieures \u00e0 SPS_E3_04.08.04.330.0 et SPS_E3_04.01.04.530.0",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel Ethernet 700 Series Controller drivers pour les versions VMware ant\u00e9rieures \u00e0 2.1.5.0",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel 700 Series Ethernet contr\u00f4leurs et adaptateurs versions ant\u00e9rieures \u00e0 8.5",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel DSA versions ant\u00e9rieures 22.2.14",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel NUC9 Extreme Laptop kits versions ant\u00e9rieures \u00e0 2.2.0.22",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel Connect M Android versions ant\u00e9rieures \u00e0 1.7.4",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel HAXM versions ant\u00e9rieures \u00e0 7.7.1",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel Distribution pour Python versions ant\u00e9rieures \u00e0 2022.0.3",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel Killer\u2122 Bluetooth versions ant\u00e9rieures \u00e0 22.120",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel NUCs versions ant\u00e9rieures \u00e0 BC0076",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel RST versions ant\u00e9rieures \u00e0 16.8.4.1011, 17.7.1.1010, 18.1.6.1039, 18.2.1.1008 et 18.3.0.1003",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel SEAPI toutes versions",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel Ethernet 500 Series Controller drivers pour les versions VMware ant\u00e9rieures \u00e0 1.11.4.0",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel Wireless Bluetooth versions ant\u00e9rieures \u00e0 22.120",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel AMT toutes versions",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel Enpirion Digital Power Configurator GUI toutes versions",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel Datacenter Group Event Advisory iOS toutes versions",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2022-28696",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28696"
},
{
"name": "CVE-2022-33209",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-33209"
},
{
"name": "CVE-2022-21197",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21197"
},
{
"name": "CVE-2022-29507",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29507"
},
{
"name": "CVE-2022-28709",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28709"
},
{
"name": "CVE-2022-21233",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21233"
},
{
"name": "CVE-2022-21139",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21139"
},
{
"name": "CVE-2022-27500",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27500"
},
{
"name": "CVE-2022-34345",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-34345"
},
{
"name": "CVE-2022-30944",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30944"
},
{
"name": "CVE-2022-30601",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30601"
},
{
"name": "CVE-2022-23182",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23182"
},
{
"name": "CVE-2021-23179",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-23179"
},
{
"name": "CVE-2022-21172",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21172"
},
{
"name": "CVE-2022-26344",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-26344"
},
{
"name": "CVE-2022-21160",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21160"
},
{
"name": "CVE-2022-34488",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-34488"
},
{
"name": "CVE-2022-21152",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21152"
},
{
"name": "CVE-2021-33126",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33126"
},
{
"name": "CVE-2022-26374",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-26374"
},
{
"name": "CVE-2022-21793",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21793"
},
{
"name": "CVE-2021-23168",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-23168"
},
{
"name": "CVE-2022-27493",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27493"
},
{
"name": "CVE-2022-21225",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21225"
},
{
"name": "CVE-2021-26950",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-26950"
},
{
"name": "CVE-2022-26017",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-26017"
},
{
"name": "CVE-2022-30296",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30296"
},
{
"name": "CVE-2022-22730",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22730"
},
{
"name": "CVE-2021-33847",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33847"
},
{
"name": "CVE-2022-25999",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-25999"
},
{
"name": "CVE-2022-21812",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21812"
},
{
"name": "CVE-2022-26083",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-26083"
},
{
"name": "CVE-2022-25841",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-25841"
},
{
"name": "CVE-2021-33060",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33060"
},
{
"name": "CVE-2022-21181",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21181"
},
{
"name": "CVE-2021-26254",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-26254"
},
{
"name": "CVE-2022-25899",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-25899"
},
{
"name": "CVE-2021-44545",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-44545"
},
{
"name": "CVE-2018-1285",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1285"
},
{
"name": "CVE-2022-26373",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-26373"
},
{
"name": "CVE-2021-44470",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-44470"
},
{
"name": "CVE-2022-25966",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-25966"
},
{
"name": "CVE-2022-28858",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28858"
},
{
"name": "CVE-2022-21140",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21140"
},
{
"name": "CVE-2022-26844",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-26844"
},
{
"name": "CVE-2022-21212",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21212"
},
{
"name": "CVE-2021-33128",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33128"
},
{
"name": "CVE-2022-23403",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23403"
},
{
"name": "CVE-2022-21229",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21229"
},
{
"name": "CVE-2021-26257",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-26257"
},
{
"name": "CVE-2022-28697",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28697"
},
{
"name": "CVE-2021-23188",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-23188"
},
{
"name": "CVE-2022-21807",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21807"
},
{
"name": "CVE-2022-32579",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32579"
},
{
"name": "CVE-2022-21148",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21148"
},
{
"name": "CVE-2022-26074",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-26074"
},
{
"name": "CVE-2021-37409",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-37409"
},
{
"name": "CVE-2021-23223",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-23223"
},
{
"name": "CVE-2022-21240",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21240"
},
{
"name": "CVE-2022-24378",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-24378"
}
],
"links": [],
"reference": "CERTFR-2022-AVI-727",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2022-08-10T00:00:00.000000"
}
],
"risks": [
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "D\u00e9ni de service"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits Intel.\nCertaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer un d\u00e9ni\nde service, une atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es et une atteinte \u00e0 la\nconfidentialit\u00e9 des donn\u00e9es.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Intel",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00701.html du 09 ao\u00fbt 2022",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00701.html.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00703.html du 09 ao\u00fbt 2022",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00703.html.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00669.html du 09 ao\u00fbt 2022",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00669.html.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00686.html du 09 ao\u00fbt 2022",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00686.html.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00679.html du 09 ao\u00fbt 2022",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00679.html.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00668.html du 09 ao\u00fbt 2022",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00668.html.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00657.html du 09 ao\u00fbt 2022",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00657.html.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00660.html du 09 ao\u00fbt 2022",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00660.html.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00593.html du 09 ao\u00fbt 2022",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00593.html.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00684.html du 09 ao\u00fbt 2022",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00684.html.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00653.html du 09 ao\u00fbt 2022",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00653.html.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00658.html du 09 ao\u00fbt 2022",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00658.html.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00709.html du 09 ao\u00fbt 2022",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00709.html.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00621.html du 09 ao\u00fbt 2022",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00621.html.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00672.html du 09 ao\u00fbt 2022",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00672.html.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00628.html du 09 ao\u00fbt 2022",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00628.html.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00596.html du 09 ao\u00fbt 2022",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00596.html.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00665.html du 09 ao\u00fbt 2022",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00665.html.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00655.html du 09 ao\u00fbt 2022",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00655.html.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00712.html du 09 ao\u00fbt 2022",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00712.html.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00678.html du 09 ao\u00fbt 2022",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00678.html.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00667.html du 09 ao\u00fbt 2022",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00667.html.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00705.html du 09 ao\u00fbt 2022",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00705.html.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00706.html du 09 ao\u00fbt 2022",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00706.html.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00694.html du 09 ao\u00fbt 2022",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00694.html.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00650.html du 09 ao\u00fbt 2022",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00650.html.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00662.html du 09 ao\u00fbt 2022",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00662.html.html"
}
]
}
CERTFR-2022-AVI-727
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans les produits Intel. Certaines d'entre elles permettent à un attaquant de provoquer un déni de service, une atteinte à l'intégrité des données et une atteinte à la confidentialité des données.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| Intel | N/A | Intel 722 Series Ethernet contrôleurs et adaptateurs versions antérieures à 1.5.5 | ||
| Intel | N/A | Intel Killer™ WiFi versions antérieures à 3.1122.1105 | ||
| Intel | N/A | Open AMT Cloud Toolkit versions antérieures à 2.0.2 et 2.2.2 | ||
| Intel | N/A | Intel E810 Ethernet contrôleurs et adaptateurs versions antérieures à 1.6.1.9 | ||
| Intel | N/A | Intel Support Android versions antérieures à 21.7.40 | ||
| Intel | N/A | Intel Team Blue toutes versions | ||
| Intel | N/A | Intel IPP Cryptography versions antérieures à 2021.5 | ||
| Intel | N/A | Intel VTune™ Profiler versions antérieures à 2022.2.0 | ||
| Intel | N/A | Intel Processors (veuillez vous référer aux avis de l'éditeur : intel-sa-00706 et intel-sa-00657) | ||
| Intel | N/A | Intel Edge Insights pour les versions Industrial antérieures à 2.6.1 | ||
| Intel | N/A | Intel Standard Manageability toutes versions | ||
| Intel | N/A | Intel Data Center Manager versions antérieures à 4.1 | ||
| Intel | N/A | Intel PROSet/Wireless WiFi versions antérieure à 22.120 | ||
| Intel | N/A | Intel Datacenter Group Event Android toutes versions | ||
| Intel | N/A | Intel SPS versions antérieures à SPS_E3_04.08.04.330.0 et SPS_E3_04.01.04.530.0 | ||
| Intel | N/A | Intel Ethernet 700 Series Controller drivers pour les versions VMware antérieures à 2.1.5.0 | ||
| Intel | N/A | Intel 700 Series Ethernet contrôleurs et adaptateurs versions antérieures à 8.5 | ||
| Intel | N/A | Intel DSA versions antérieures 22.2.14 | ||
| Intel | N/A | Intel NUC9 Extreme Laptop kits versions antérieures à 2.2.0.22 | ||
| Intel | N/A | Intel Connect M Android versions antérieures à 1.7.4 | ||
| Intel | N/A | Intel HAXM versions antérieures à 7.7.1 | ||
| Intel | N/A | Intel Distribution pour Python versions antérieures à 2022.0.3 | ||
| Intel | N/A | Intel Killer™ Bluetooth versions antérieures à 22.120 | ||
| Intel | N/A | Intel NUCs versions antérieures à BC0076 | ||
| Intel | N/A | Intel RST versions antérieures à 16.8.4.1011, 17.7.1.1010, 18.1.6.1039, 18.2.1.1008 et 18.3.0.1003 | ||
| Intel | N/A | Intel SEAPI toutes versions | ||
| Intel | N/A | Intel Ethernet 500 Series Controller drivers pour les versions VMware antérieures à 1.11.4.0 | ||
| Intel | N/A | Intel Wireless Bluetooth versions antérieures à 22.120 | ||
| Intel | N/A | Intel AMT toutes versions | ||
| Intel | N/A | Intel Enpirion Digital Power Configurator GUI toutes versions | ||
| Intel | N/A | Intel Datacenter Group Event Advisory iOS toutes versions |
| Title | Publication Time | Tags | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Intel 722 Series Ethernet contr\u00f4leurs et adaptateurs versions ant\u00e9rieures \u00e0 1.5.5",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel Killer\u2122 WiFi versions ant\u00e9rieures \u00e0 3.1122.1105",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Open AMT Cloud Toolkit versions ant\u00e9rieures \u00e0 2.0.2 et 2.2.2",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel E810 Ethernet contr\u00f4leurs et adaptateurs versions ant\u00e9rieures \u00e0 1.6.1.9",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel Support Android versions ant\u00e9rieures \u00e0 21.7.40",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel Team Blue toutes versions",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel IPP Cryptography versions ant\u00e9rieures \u00e0 2021.5",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel VTune\u2122 Profiler versions ant\u00e9rieures \u00e0 2022.2.0",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel Processors (veuillez vous r\u00e9f\u00e9rer aux avis de l\u0027\u00e9diteur : intel-sa-00706 et intel-sa-00657)",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel Edge Insights pour les versions Industrial ant\u00e9rieures \u00e0 2.6.1",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel Standard Manageability toutes versions",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel Data Center Manager versions ant\u00e9rieures \u00e0 4.1",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel PROSet/Wireless WiFi versions ant\u00e9rieure \u00e0 22.120",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel Datacenter Group Event Android toutes versions",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel SPS versions ant\u00e9rieures \u00e0 SPS_E3_04.08.04.330.0 et SPS_E3_04.01.04.530.0",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel Ethernet 700 Series Controller drivers pour les versions VMware ant\u00e9rieures \u00e0 2.1.5.0",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel 700 Series Ethernet contr\u00f4leurs et adaptateurs versions ant\u00e9rieures \u00e0 8.5",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel DSA versions ant\u00e9rieures 22.2.14",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel NUC9 Extreme Laptop kits versions ant\u00e9rieures \u00e0 2.2.0.22",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel Connect M Android versions ant\u00e9rieures \u00e0 1.7.4",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel HAXM versions ant\u00e9rieures \u00e0 7.7.1",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel Distribution pour Python versions ant\u00e9rieures \u00e0 2022.0.3",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel Killer\u2122 Bluetooth versions ant\u00e9rieures \u00e0 22.120",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel NUCs versions ant\u00e9rieures \u00e0 BC0076",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel RST versions ant\u00e9rieures \u00e0 16.8.4.1011, 17.7.1.1010, 18.1.6.1039, 18.2.1.1008 et 18.3.0.1003",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel SEAPI toutes versions",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel Ethernet 500 Series Controller drivers pour les versions VMware ant\u00e9rieures \u00e0 1.11.4.0",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel Wireless Bluetooth versions ant\u00e9rieures \u00e0 22.120",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel AMT toutes versions",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel Enpirion Digital Power Configurator GUI toutes versions",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel Datacenter Group Event Advisory iOS toutes versions",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2022-28696",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28696"
},
{
"name": "CVE-2022-33209",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-33209"
},
{
"name": "CVE-2022-21197",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21197"
},
{
"name": "CVE-2022-29507",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29507"
},
{
"name": "CVE-2022-28709",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28709"
},
{
"name": "CVE-2022-21233",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21233"
},
{
"name": "CVE-2022-21139",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21139"
},
{
"name": "CVE-2022-27500",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27500"
},
{
"name": "CVE-2022-34345",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-34345"
},
{
"name": "CVE-2022-30944",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30944"
},
{
"name": "CVE-2022-30601",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30601"
},
{
"name": "CVE-2022-23182",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23182"
},
{
"name": "CVE-2021-23179",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-23179"
},
{
"name": "CVE-2022-21172",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21172"
},
{
"name": "CVE-2022-26344",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-26344"
},
{
"name": "CVE-2022-21160",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21160"
},
{
"name": "CVE-2022-34488",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-34488"
},
{
"name": "CVE-2022-21152",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21152"
},
{
"name": "CVE-2021-33126",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33126"
},
{
"name": "CVE-2022-26374",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-26374"
},
{
"name": "CVE-2022-21793",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21793"
},
{
"name": "CVE-2021-23168",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-23168"
},
{
"name": "CVE-2022-27493",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27493"
},
{
"name": "CVE-2022-21225",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21225"
},
{
"name": "CVE-2021-26950",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-26950"
},
{
"name": "CVE-2022-26017",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-26017"
},
{
"name": "CVE-2022-30296",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30296"
},
{
"name": "CVE-2022-22730",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22730"
},
{
"name": "CVE-2021-33847",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33847"
},
{
"name": "CVE-2022-25999",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-25999"
},
{
"name": "CVE-2022-21812",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21812"
},
{
"name": "CVE-2022-26083",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-26083"
},
{
"name": "CVE-2022-25841",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-25841"
},
{
"name": "CVE-2021-33060",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33060"
},
{
"name": "CVE-2022-21181",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21181"
},
{
"name": "CVE-2021-26254",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-26254"
},
{
"name": "CVE-2022-25899",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-25899"
},
{
"name": "CVE-2021-44545",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-44545"
},
{
"name": "CVE-2018-1285",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1285"
},
{
"name": "CVE-2022-26373",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-26373"
},
{
"name": "CVE-2021-44470",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-44470"
},
{
"name": "CVE-2022-25966",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-25966"
},
{
"name": "CVE-2022-28858",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28858"
},
{
"name": "CVE-2022-21140",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21140"
},
{
"name": "CVE-2022-26844",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-26844"
},
{
"name": "CVE-2022-21212",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21212"
},
{
"name": "CVE-2021-33128",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33128"
},
{
"name": "CVE-2022-23403",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23403"
},
{
"name": "CVE-2022-21229",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21229"
},
{
"name": "CVE-2021-26257",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-26257"
},
{
"name": "CVE-2022-28697",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28697"
},
{
"name": "CVE-2021-23188",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-23188"
},
{
"name": "CVE-2022-21807",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21807"
},
{
"name": "CVE-2022-32579",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32579"
},
{
"name": "CVE-2022-21148",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21148"
},
{
"name": "CVE-2022-26074",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-26074"
},
{
"name": "CVE-2021-37409",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-37409"
},
{
"name": "CVE-2021-23223",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-23223"
},
{
"name": "CVE-2022-21240",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21240"
},
{
"name": "CVE-2022-24378",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-24378"
}
],
"links": [],
"reference": "CERTFR-2022-AVI-727",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2022-08-10T00:00:00.000000"
}
],
"risks": [
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "D\u00e9ni de service"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits Intel.\nCertaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer un d\u00e9ni\nde service, une atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es et une atteinte \u00e0 la\nconfidentialit\u00e9 des donn\u00e9es.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Intel",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00701.html du 09 ao\u00fbt 2022",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00701.html.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00703.html du 09 ao\u00fbt 2022",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00703.html.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00669.html du 09 ao\u00fbt 2022",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00669.html.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00686.html du 09 ao\u00fbt 2022",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00686.html.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00679.html du 09 ao\u00fbt 2022",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00679.html.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00668.html du 09 ao\u00fbt 2022",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00668.html.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00657.html du 09 ao\u00fbt 2022",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00657.html.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00660.html du 09 ao\u00fbt 2022",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00660.html.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00593.html du 09 ao\u00fbt 2022",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00593.html.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00684.html du 09 ao\u00fbt 2022",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00684.html.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00653.html du 09 ao\u00fbt 2022",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00653.html.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00658.html du 09 ao\u00fbt 2022",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00658.html.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00709.html du 09 ao\u00fbt 2022",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00709.html.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00621.html du 09 ao\u00fbt 2022",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00621.html.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00672.html du 09 ao\u00fbt 2022",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00672.html.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00628.html du 09 ao\u00fbt 2022",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00628.html.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00596.html du 09 ao\u00fbt 2022",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00596.html.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00665.html du 09 ao\u00fbt 2022",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00665.html.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00655.html du 09 ao\u00fbt 2022",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00655.html.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00712.html du 09 ao\u00fbt 2022",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00712.html.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00678.html du 09 ao\u00fbt 2022",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00678.html.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00667.html du 09 ao\u00fbt 2022",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00667.html.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00705.html du 09 ao\u00fbt 2022",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00705.html.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00706.html du 09 ao\u00fbt 2022",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00706.html.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00694.html du 09 ao\u00fbt 2022",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00694.html.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00650.html du 09 ao\u00fbt 2022",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00650.html.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00662.html du 09 ao\u00fbt 2022",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00662.html.html"
}
]
}
VAR-202208-0825
Vulnerability from variot - Updated: 2023-12-18 10:43Uncontrolled search path elements in the Intel(R) VTune(TM) Profiler software before version 2022.2.0 may allow an authenticated user to potentially enable escalation of privilege via local access. Intel's Intel VTune Profiler Exists in a vulnerability in an element of an uncontrolled search path.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. Intel VTune Profiler is a performance testing tool developed by Intel Corporation for optimizing software. The software can perform performance tests on IoT embedded applications, media software, Java applications, and high-performance computing applications. Attackers exploit this vulnerability to escalate privileges
Show details on source website{
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
"affected_products": {
"@id": "https://www.variotdbs.pl/ref/affected_products"
},
"configurations": {
"@id": "https://www.variotdbs.pl/ref/configurations"
},
"credits": {
"@id": "https://www.variotdbs.pl/ref/credits"
},
"cvss": {
"@id": "https://www.variotdbs.pl/ref/cvss/"
},
"description": {
"@id": "https://www.variotdbs.pl/ref/description/"
},
"exploit_availability": {
"@id": "https://www.variotdbs.pl/ref/exploit_availability/"
},
"external_ids": {
"@id": "https://www.variotdbs.pl/ref/external_ids/"
},
"iot": {
"@id": "https://www.variotdbs.pl/ref/iot/"
},
"iot_taxonomy": {
"@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
},
"patch": {
"@id": "https://www.variotdbs.pl/ref/patch/"
},
"problemtype_data": {
"@id": "https://www.variotdbs.pl/ref/problemtype_data/"
},
"references": {
"@id": "https://www.variotdbs.pl/ref/references/"
},
"sources": {
"@id": "https://www.variotdbs.pl/ref/sources/"
},
"sources_release_date": {
"@id": "https://www.variotdbs.pl/ref/sources_release_date/"
},
"sources_update_date": {
"@id": "https://www.variotdbs.pl/ref/sources_update_date/"
},
"threat_type": {
"@id": "https://www.variotdbs.pl/ref/threat_type/"
},
"title": {
"@id": "https://www.variotdbs.pl/ref/title/"
},
"type": {
"@id": "https://www.variotdbs.pl/ref/type/"
}
},
"@id": "https://www.variotdbs.pl/vuln/VAR-202208-0825",
"affected_products": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/affected_products#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"model": "vtune profiler",
"scope": "lt",
"trust": 1.0,
"vendor": "intel",
"version": "2022.2.0"
},
{
"model": "intel vtune profiler",
"scope": null,
"trust": 0.8,
"vendor": "\u30a4\u30f3\u30c6\u30eb",
"version": null
},
{
"model": "intel vtune profiler",
"scope": "eq",
"trust": 0.8,
"vendor": "\u30a4\u30f3\u30c6\u30eb",
"version": "2022.2.0"
},
{
"model": "intel vtune profiler",
"scope": "eq",
"trust": 0.8,
"vendor": "\u30a4\u30f3\u30c6\u30eb",
"version": null
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2022-015199"
},
{
"db": "NVD",
"id": "CVE-2022-21807"
}
]
},
"configurations": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/configurations#",
"children": {
"@container": "@list"
},
"cpe_match": {
"@container": "@list"
},
"data": {
"@container": "@list"
},
"nodes": {
"@container": "@list"
}
},
"data": [
{
"CVE_data_version": "4.0",
"nodes": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:intel:vtune_profiler:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndExcluding": "2022.2.0",
"vulnerable": true
}
],
"operator": "OR"
}
]
}
],
"sources": [
{
"db": "NVD",
"id": "CVE-2022-21807"
}
]
},
"cve": "CVE-2022-21807",
"cvss": {
"@context": {
"cvssV2": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
},
"cvssV3": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
},
"severity": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/cvss/severity#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/severity"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"cvssV2": [],
"cvssV3": [
{
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"author": "NVD",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"exploitabilityScore": 1.8,
"impactScore": 5.9,
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"trust": 1.0,
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
{
"attackComplexity": "Low",
"attackVector": "Local",
"author": "NVD",
"availabilityImpact": "High",
"baseScore": 7.8,
"baseSeverity": "High",
"confidentialityImpact": "High",
"exploitabilityScore": null,
"id": "CVE-2022-21807",
"impactScore": null,
"integrityImpact": "High",
"privilegesRequired": "Low",
"scope": "Unchanged",
"trust": 0.8,
"userInteraction": "None",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
}
],
"severity": [
{
"author": "NVD",
"id": "CVE-2022-21807",
"trust": 1.8,
"value": "HIGH"
},
{
"author": "CNNVD",
"id": "CNNVD-202208-2713",
"trust": 0.6,
"value": "HIGH"
}
]
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2022-015199"
},
{
"db": "NVD",
"id": "CVE-2022-21807"
},
{
"db": "CNNVD",
"id": "CNNVD-202208-2713"
}
]
},
"description": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/description#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Uncontrolled search path elements in the Intel(R) VTune(TM) Profiler software before version 2022.2.0 may allow an authenticated user to potentially enable escalation of privilege via local access. Intel\u0027s Intel VTune Profiler Exists in a vulnerability in an element of an uncontrolled search path.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. Intel VTune Profiler is a performance testing tool developed by Intel Corporation for optimizing software. The software can perform performance tests on IoT embedded applications, media software, Java applications, and high-performance computing applications. Attackers exploit this vulnerability to escalate privileges",
"sources": [
{
"db": "NVD",
"id": "CVE-2022-21807"
},
{
"db": "JVNDB",
"id": "JVNDB-2022-015199"
},
{
"db": "CNNVD",
"id": "CNNVD-202208-2713"
},
{
"db": "VULHUB",
"id": "VHN-414096"
},
{
"db": "VULMON",
"id": "CVE-2022-21807"
}
],
"trust": 2.34
},
"external_ids": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/external_ids#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"db": "NVD",
"id": "CVE-2022-21807",
"trust": 3.4
},
{
"db": "JVN",
"id": "JVNVU99494206",
"trust": 0.8
},
{
"db": "JVNDB",
"id": "JVNDB-2022-015199",
"trust": 0.8
},
{
"db": "AUSCERT",
"id": "ESB-2022.3960",
"trust": 0.6
},
{
"db": "CNNVD",
"id": "CNNVD-202208-2713",
"trust": 0.6
},
{
"db": "VULHUB",
"id": "VHN-414096",
"trust": 0.1
},
{
"db": "VULMON",
"id": "CVE-2022-21807",
"trust": 0.1
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-414096"
},
{
"db": "VULMON",
"id": "CVE-2022-21807"
},
{
"db": "JVNDB",
"id": "JVNDB-2022-015199"
},
{
"db": "NVD",
"id": "CVE-2022-21807"
},
{
"db": "CNNVD",
"id": "CNNVD-202208-2713"
}
]
},
"id": "VAR-202208-0825",
"iot": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": true,
"sources": [
{
"db": "VULHUB",
"id": "VHN-414096"
}
],
"trust": 0.01
},
"last_update_date": "2023-12-18T10:43:57.594000Z",
"patch": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/patch#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"title": "Intel VTune Profiler Fixes for code issue vulnerabilities",
"trust": 0.6,
"url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=205193"
}
],
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-202208-2713"
}
]
},
"problemtype_data": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"problemtype": "CWE-427",
"trust": 1.1
},
{
"problemtype": "Uncontrolled search path elements (CWE-427) [NVD evaluation ]",
"trust": 0.8
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-414096"
},
{
"db": "JVNDB",
"id": "JVNDB-2022-015199"
},
{
"db": "NVD",
"id": "CVE-2022-21807"
}
]
},
"references": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/references#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"trust": 2.6,
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00658.html"
},
{
"trust": 0.8,
"url": "https://jvn.jp/vu/jvnvu99494206/"
},
{
"trust": 0.8,
"url": "https://nvd.nist.gov/vuln/detail/cve-2022-21807"
},
{
"trust": 0.6,
"url": "https://cxsecurity.com/cveshow/cve-2022-21807/"
},
{
"trust": 0.6,
"url": "https://www.auscert.org.au/bulletins/esb-2022.3960"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov"
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-414096"
},
{
"db": "VULMON",
"id": "CVE-2022-21807"
},
{
"db": "JVNDB",
"id": "JVNDB-2022-015199"
},
{
"db": "NVD",
"id": "CVE-2022-21807"
},
{
"db": "CNNVD",
"id": "CNNVD-202208-2713"
}
]
},
"sources": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
"data": {
"@container": "@list"
}
},
"data": [
{
"db": "VULHUB",
"id": "VHN-414096"
},
{
"db": "VULMON",
"id": "CVE-2022-21807"
},
{
"db": "JVNDB",
"id": "JVNDB-2022-015199"
},
{
"db": "NVD",
"id": "CVE-2022-21807"
},
{
"db": "CNNVD",
"id": "CNNVD-202208-2713"
}
]
},
"sources_release_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2022-08-18T00:00:00",
"db": "VULHUB",
"id": "VHN-414096"
},
{
"date": "2022-08-18T00:00:00",
"db": "VULMON",
"id": "CVE-2022-21807"
},
{
"date": "2023-09-25T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2022-015199"
},
{
"date": "2022-08-18T20:15:10.387000",
"db": "NVD",
"id": "CVE-2022-21807"
},
{
"date": "2022-08-10T00:00:00",
"db": "CNNVD",
"id": "CNNVD-202208-2713"
}
]
},
"sources_update_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2022-08-22T00:00:00",
"db": "VULHUB",
"id": "VHN-414096"
},
{
"date": "2022-08-19T00:00:00",
"db": "VULMON",
"id": "CVE-2022-21807"
},
{
"date": "2023-09-25T08:46:00",
"db": "JVNDB",
"id": "JVNDB-2022-015199"
},
{
"date": "2022-08-22T20:01:38.560000",
"db": "NVD",
"id": "CVE-2022-21807"
},
{
"date": "2022-08-23T00:00:00",
"db": "CNNVD",
"id": "CNNVD-202208-2713"
}
]
},
"threat_type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/threat_type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "local",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-202208-2713"
}
],
"trust": 0.6
},
"title": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/title#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Intel\u0027s \u00a0Intel\u00a0VTune\u00a0Profiler\u00a0 Vulnerability regarding uncontrolled search path elements in",
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2022-015199"
}
],
"trust": 0.8
},
"type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "code problem",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-202208-2713"
}
],
"trust": 0.6
}
}
GHSA-JWGR-PH78-4R57
Vulnerability from github – Published: 2022-08-19 00:00 – Updated: 2022-08-23 00:00Uncontrolled search path elements in the Intel(R) VTune(TM) Profiler software before version 2022.2.0 may allow an authenticated user to potentially enable escalation of privilege via local access.
{
"affected": [],
"aliases": [
"CVE-2022-21807"
],
"database_specific": {
"cwe_ids": [
"CWE-427"
],
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2022-08-18T20:15:00Z",
"severity": "HIGH"
},
"details": "Uncontrolled search path elements in the Intel(R) VTune(TM) Profiler software before version 2022.2.0 may allow an authenticated user to potentially enable escalation of privilege via local access.",
"id": "GHSA-jwgr-ph78-4r57",
"modified": "2022-08-23T00:00:15Z",
"published": "2022-08-19T00:00:18Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-21807"
},
{
"type": "WEB",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00658.html"
}
],
"schema_version": "1.4.0",
"severity": [
{
"score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"type": "CVSS_V3"
}
]
}
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.