Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2022-26083 (GCVE-0-2022-26083)
Vulnerability from cvelistv5 – Published: 2025-02-14 20:41 – Updated: 2025-02-18 16:29- Information Disclosure
- CWE-1204 - Generation of Weak Initialization Vector (IV)
| Vendor | Product | Version | ||
|---|---|---|---|---|
| n/a | Intel(R) IPP Cryptography software library |
Affected:
before version 2021.5
|
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2022-26083",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-02-18T16:28:53.060853Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2025-02-18T16:29:02.579Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"product": "Intel(R) IPP Cryptography software library",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "before version 2021.5"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "Generation of weak initialization vector in an Intel(R) IPP Cryptography software library before version 2021.5 may allow an unauthenticated user to potentially enable information disclosure via local access."
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:N",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "Information Disclosure",
"lang": "en"
},
{
"cweId": "CWE-1204",
"description": "Generation of Weak Initialization Vector (IV)",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-02-14T20:41:27.084Z",
"orgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
"shortName": "intel"
},
"references": [
{
"name": "https://intel.com/content/www/us/en/security-center/advisory/intel-sa-00667.html",
"url": "https://intel.com/content/www/us/en/security-center/advisory/intel-sa-00667.html"
}
]
}
},
"cveMetadata": {
"assignerOrgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
"assignerShortName": "intel",
"cveId": "CVE-2022-26083",
"datePublished": "2025-02-14T20:41:27.084Z",
"dateReserved": "2022-03-02T00:32:53.297Z",
"dateUpdated": "2025-02-18T16:29:02.579Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"nvd": "{\"cve\":{\"id\":\"CVE-2022-26083\",\"sourceIdentifier\":\"secure@intel.com\",\"published\":\"2025-02-14T21:15:11.947\",\"lastModified\":\"2025-09-02T15:35:44.930\",\"vulnStatus\":\"Analyzed\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Generation of weak initialization vector in an Intel(R) IPP Cryptography software library before version 2021.5 may allow an unauthenticated user to potentially enable information disclosure via local access.\"},{\"lang\":\"es\",\"value\":\"La generaci\u00f3n de un vector de inicializaci\u00f3n d\u00e9bil en una librer\u00eda de software de criptograf\u00eda Intel(R) IPP anterior a la versi\u00f3n 2021.5 puede permitir que un usuario no autenticado habilite potencialmente la divulgaci\u00f3n de informaci\u00f3n a trav\u00e9s del acceso local.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"secure@intel.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:N\",\"baseScore\":7.5,\"baseSeverity\":\"HIGH\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"HIGH\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"CHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":1.1,\"impactScore\":5.8}]},\"weaknesses\":[{\"source\":\"secure@intel.com\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-1204\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:intel:integrated_performance_primitives_cryptography:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"2021.5\",\"matchCriteriaId\":\"129EA74C-6942-4533-B717-92C6DF12663D\"}]}]}],\"references\":[{\"url\":\"https://intel.com/content/www/us/en/security-center/advisory/intel-sa-00667.html\",\"source\":\"secure@intel.com\",\"tags\":[\"Vendor Advisory\"]}]}}",
"vulnrichment": {
"containers": "{\"adp\": [{\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2022-26083\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"total\"}], \"version\": \"2.0.3\", \"timestamp\": \"2025-02-18T16:28:53.060853Z\"}}}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2025-02-18T16:28:46.429Z\"}}], \"cna\": {\"metrics\": [{\"format\": \"CVSS\", \"cvssV3_1\": {\"scope\": \"CHANGED\", \"version\": \"3.1\", \"baseScore\": 7.5, \"attackVector\": \"LOCAL\", \"baseSeverity\": \"HIGH\", \"vectorString\": \"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:N\", \"integrityImpact\": \"HIGH\", \"userInteraction\": \"NONE\", \"attackComplexity\": \"HIGH\", \"availabilityImpact\": \"NONE\", \"privilegesRequired\": \"LOW\", \"confidentialityImpact\": \"HIGH\"}, \"scenarios\": [{\"lang\": \"en\", \"value\": \"GENERAL\"}]}], \"affected\": [{\"vendor\": \"n/a\", \"product\": \"Intel(R) IPP Cryptography software library\", \"versions\": [{\"status\": \"affected\", \"version\": \"before version 2021.5\"}], \"defaultStatus\": \"unaffected\"}], \"references\": [{\"url\": \"https://intel.com/content/www/us/en/security-center/advisory/intel-sa-00667.html\", \"name\": \"https://intel.com/content/www/us/en/security-center/advisory/intel-sa-00667.html\"}], \"descriptions\": [{\"lang\": \"en\", \"value\": \"Generation of weak initialization vector in an Intel(R) IPP Cryptography software library before version 2021.5 may allow an unauthenticated user to potentially enable information disclosure via local access.\"}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"description\": \"Information Disclosure\"}, {\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-1204\", \"description\": \"Generation of Weak Initialization Vector (IV)\"}]}], \"providerMetadata\": {\"orgId\": \"6dda929c-bb53-4a77-a76d-48e79601a1ce\", \"shortName\": \"intel\", \"dateUpdated\": \"2025-02-14T20:41:27.084Z\"}}}",
"cveMetadata": "{\"cveId\": \"CVE-2022-26083\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2025-02-18T16:29:02.579Z\", \"dateReserved\": \"2022-03-02T00:32:53.297Z\", \"assignerOrgId\": \"6dda929c-bb53-4a77-a76d-48e79601a1ce\", \"datePublished\": \"2025-02-14T20:41:27.084Z\", \"assignerShortName\": \"intel\"}",
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
}
}
FKIE_CVE-2022-26083
Vulnerability from fkie_nvd - Published: 2025-02-14 21:15 - Updated: 2025-09-02 15:35| Vendor | Product | Version | |
|---|---|---|---|
| intel | integrated_performance_primitives_cryptography | * |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:intel:integrated_performance_primitives_cryptography:*:*:*:*:*:*:*:*",
"matchCriteriaId": "129EA74C-6942-4533-B717-92C6DF12663D",
"versionEndExcluding": "2021.5",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Generation of weak initialization vector in an Intel(R) IPP Cryptography software library before version 2021.5 may allow an unauthenticated user to potentially enable information disclosure via local access."
},
{
"lang": "es",
"value": "La generaci\u00f3n de un vector de inicializaci\u00f3n d\u00e9bil en una librer\u00eda de software de criptograf\u00eda Intel(R) IPP anterior a la versi\u00f3n 2021.5 puede permitir que un usuario no autenticado habilite potencialmente la divulgaci\u00f3n de informaci\u00f3n a trav\u00e9s del acceso local."
}
],
"id": "CVE-2022-26083",
"lastModified": "2025-09-02T15:35:44.930",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:N",
"version": "3.1"
},
"exploitabilityScore": 1.1,
"impactScore": 5.8,
"source": "secure@intel.com",
"type": "Secondary"
}
]
},
"published": "2025-02-14T21:15:11.947",
"references": [
{
"source": "secure@intel.com",
"tags": [
"Vendor Advisory"
],
"url": "https://intel.com/content/www/us/en/security-center/advisory/intel-sa-00667.html"
}
],
"sourceIdentifier": "secure@intel.com",
"vulnStatus": "Analyzed",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-1204"
}
],
"source": "secure@intel.com",
"type": "Primary"
}
]
}
CERTFR-2022-AVI-727
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans les produits Intel. Certaines d'entre elles permettent à un attaquant de provoquer un déni de service, une atteinte à l'intégrité des données et une atteinte à la confidentialité des données.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| Intel | N/A | Intel 722 Series Ethernet contrôleurs et adaptateurs versions antérieures à 1.5.5 | ||
| Intel | N/A | Intel Killer™ WiFi versions antérieures à 3.1122.1105 | ||
| Intel | N/A | Open AMT Cloud Toolkit versions antérieures à 2.0.2 et 2.2.2 | ||
| Intel | N/A | Intel E810 Ethernet contrôleurs et adaptateurs versions antérieures à 1.6.1.9 | ||
| Intel | N/A | Intel Support Android versions antérieures à 21.7.40 | ||
| Intel | N/A | Intel Team Blue toutes versions | ||
| Intel | N/A | Intel IPP Cryptography versions antérieures à 2021.5 | ||
| Intel | N/A | Intel VTune™ Profiler versions antérieures à 2022.2.0 | ||
| Intel | N/A | Intel Processors (veuillez vous référer aux avis de l'éditeur : intel-sa-00706 et intel-sa-00657) | ||
| Intel | N/A | Intel Edge Insights pour les versions Industrial antérieures à 2.6.1 | ||
| Intel | N/A | Intel Standard Manageability toutes versions | ||
| Intel | N/A | Intel Data Center Manager versions antérieures à 4.1 | ||
| Intel | N/A | Intel PROSet/Wireless WiFi versions antérieure à 22.120 | ||
| Intel | N/A | Intel Datacenter Group Event Android toutes versions | ||
| Intel | N/A | Intel SPS versions antérieures à SPS_E3_04.08.04.330.0 et SPS_E3_04.01.04.530.0 | ||
| Intel | N/A | Intel Ethernet 700 Series Controller drivers pour les versions VMware antérieures à 2.1.5.0 | ||
| Intel | N/A | Intel 700 Series Ethernet contrôleurs et adaptateurs versions antérieures à 8.5 | ||
| Intel | N/A | Intel DSA versions antérieures 22.2.14 | ||
| Intel | N/A | Intel NUC9 Extreme Laptop kits versions antérieures à 2.2.0.22 | ||
| Intel | N/A | Intel Connect M Android versions antérieures à 1.7.4 | ||
| Intel | N/A | Intel HAXM versions antérieures à 7.7.1 | ||
| Intel | N/A | Intel Distribution pour Python versions antérieures à 2022.0.3 | ||
| Intel | N/A | Intel Killer™ Bluetooth versions antérieures à 22.120 | ||
| Intel | N/A | Intel NUCs versions antérieures à BC0076 | ||
| Intel | N/A | Intel RST versions antérieures à 16.8.4.1011, 17.7.1.1010, 18.1.6.1039, 18.2.1.1008 et 18.3.0.1003 | ||
| Intel | N/A | Intel SEAPI toutes versions | ||
| Intel | N/A | Intel Ethernet 500 Series Controller drivers pour les versions VMware antérieures à 1.11.4.0 | ||
| Intel | N/A | Intel Wireless Bluetooth versions antérieures à 22.120 | ||
| Intel | N/A | Intel AMT toutes versions | ||
| Intel | N/A | Intel Enpirion Digital Power Configurator GUI toutes versions | ||
| Intel | N/A | Intel Datacenter Group Event Advisory iOS toutes versions |
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Intel 722 Series Ethernet contr\u00f4leurs et adaptateurs versions ant\u00e9rieures \u00e0 1.5.5",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel Killer\u2122 WiFi versions ant\u00e9rieures \u00e0 3.1122.1105",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Open AMT Cloud Toolkit versions ant\u00e9rieures \u00e0 2.0.2 et 2.2.2",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel E810 Ethernet contr\u00f4leurs et adaptateurs versions ant\u00e9rieures \u00e0 1.6.1.9",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel Support Android versions ant\u00e9rieures \u00e0 21.7.40",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel Team Blue toutes versions",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel IPP Cryptography versions ant\u00e9rieures \u00e0 2021.5",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel VTune\u2122 Profiler versions ant\u00e9rieures \u00e0 2022.2.0",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel Processors (veuillez vous r\u00e9f\u00e9rer aux avis de l\u0027\u00e9diteur : intel-sa-00706 et intel-sa-00657)",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel Edge Insights pour les versions Industrial ant\u00e9rieures \u00e0 2.6.1",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel Standard Manageability toutes versions",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel Data Center Manager versions ant\u00e9rieures \u00e0 4.1",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel PROSet/Wireless WiFi versions ant\u00e9rieure \u00e0 22.120",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel Datacenter Group Event Android toutes versions",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel SPS versions ant\u00e9rieures \u00e0 SPS_E3_04.08.04.330.0 et SPS_E3_04.01.04.530.0",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel Ethernet 700 Series Controller drivers pour les versions VMware ant\u00e9rieures \u00e0 2.1.5.0",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel 700 Series Ethernet contr\u00f4leurs et adaptateurs versions ant\u00e9rieures \u00e0 8.5",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel DSA versions ant\u00e9rieures 22.2.14",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel NUC9 Extreme Laptop kits versions ant\u00e9rieures \u00e0 2.2.0.22",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel Connect M Android versions ant\u00e9rieures \u00e0 1.7.4",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel HAXM versions ant\u00e9rieures \u00e0 7.7.1",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel Distribution pour Python versions ant\u00e9rieures \u00e0 2022.0.3",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel Killer\u2122 Bluetooth versions ant\u00e9rieures \u00e0 22.120",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel NUCs versions ant\u00e9rieures \u00e0 BC0076",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel RST versions ant\u00e9rieures \u00e0 16.8.4.1011, 17.7.1.1010, 18.1.6.1039, 18.2.1.1008 et 18.3.0.1003",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel SEAPI toutes versions",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel Ethernet 500 Series Controller drivers pour les versions VMware ant\u00e9rieures \u00e0 1.11.4.0",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel Wireless Bluetooth versions ant\u00e9rieures \u00e0 22.120",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel AMT toutes versions",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel Enpirion Digital Power Configurator GUI toutes versions",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel Datacenter Group Event Advisory iOS toutes versions",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2022-28696",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28696"
},
{
"name": "CVE-2022-33209",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-33209"
},
{
"name": "CVE-2022-21197",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21197"
},
{
"name": "CVE-2022-29507",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29507"
},
{
"name": "CVE-2022-28709",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28709"
},
{
"name": "CVE-2022-21233",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21233"
},
{
"name": "CVE-2022-21139",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21139"
},
{
"name": "CVE-2022-27500",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27500"
},
{
"name": "CVE-2022-34345",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-34345"
},
{
"name": "CVE-2022-30944",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30944"
},
{
"name": "CVE-2022-30601",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30601"
},
{
"name": "CVE-2022-23182",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23182"
},
{
"name": "CVE-2021-23179",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-23179"
},
{
"name": "CVE-2022-21172",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21172"
},
{
"name": "CVE-2022-26344",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-26344"
},
{
"name": "CVE-2022-21160",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21160"
},
{
"name": "CVE-2022-34488",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-34488"
},
{
"name": "CVE-2022-21152",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21152"
},
{
"name": "CVE-2021-33126",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33126"
},
{
"name": "CVE-2022-26374",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-26374"
},
{
"name": "CVE-2022-21793",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21793"
},
{
"name": "CVE-2021-23168",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-23168"
},
{
"name": "CVE-2022-27493",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27493"
},
{
"name": "CVE-2022-21225",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21225"
},
{
"name": "CVE-2021-26950",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-26950"
},
{
"name": "CVE-2022-26017",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-26017"
},
{
"name": "CVE-2022-30296",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30296"
},
{
"name": "CVE-2022-22730",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22730"
},
{
"name": "CVE-2021-33847",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33847"
},
{
"name": "CVE-2022-25999",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-25999"
},
{
"name": "CVE-2022-21812",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21812"
},
{
"name": "CVE-2022-26083",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-26083"
},
{
"name": "CVE-2022-25841",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-25841"
},
{
"name": "CVE-2021-33060",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33060"
},
{
"name": "CVE-2022-21181",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21181"
},
{
"name": "CVE-2021-26254",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-26254"
},
{
"name": "CVE-2022-25899",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-25899"
},
{
"name": "CVE-2021-44545",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-44545"
},
{
"name": "CVE-2018-1285",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1285"
},
{
"name": "CVE-2022-26373",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-26373"
},
{
"name": "CVE-2021-44470",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-44470"
},
{
"name": "CVE-2022-25966",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-25966"
},
{
"name": "CVE-2022-28858",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28858"
},
{
"name": "CVE-2022-21140",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21140"
},
{
"name": "CVE-2022-26844",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-26844"
},
{
"name": "CVE-2022-21212",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21212"
},
{
"name": "CVE-2021-33128",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33128"
},
{
"name": "CVE-2022-23403",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23403"
},
{
"name": "CVE-2022-21229",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21229"
},
{
"name": "CVE-2021-26257",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-26257"
},
{
"name": "CVE-2022-28697",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28697"
},
{
"name": "CVE-2021-23188",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-23188"
},
{
"name": "CVE-2022-21807",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21807"
},
{
"name": "CVE-2022-32579",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32579"
},
{
"name": "CVE-2022-21148",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21148"
},
{
"name": "CVE-2022-26074",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-26074"
},
{
"name": "CVE-2021-37409",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-37409"
},
{
"name": "CVE-2021-23223",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-23223"
},
{
"name": "CVE-2022-21240",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21240"
},
{
"name": "CVE-2022-24378",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-24378"
}
],
"links": [],
"reference": "CERTFR-2022-AVI-727",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2022-08-10T00:00:00.000000"
}
],
"risks": [
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "D\u00e9ni de service"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits Intel.\nCertaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer un d\u00e9ni\nde service, une atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es et une atteinte \u00e0 la\nconfidentialit\u00e9 des donn\u00e9es.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Intel",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00701.html du 09 ao\u00fbt 2022",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00701.html.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00703.html du 09 ao\u00fbt 2022",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00703.html.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00669.html du 09 ao\u00fbt 2022",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00669.html.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00686.html du 09 ao\u00fbt 2022",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00686.html.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00679.html du 09 ao\u00fbt 2022",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00679.html.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00668.html du 09 ao\u00fbt 2022",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00668.html.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00657.html du 09 ao\u00fbt 2022",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00657.html.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00660.html du 09 ao\u00fbt 2022",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00660.html.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00593.html du 09 ao\u00fbt 2022",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00593.html.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00684.html du 09 ao\u00fbt 2022",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00684.html.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00653.html du 09 ao\u00fbt 2022",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00653.html.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00658.html du 09 ao\u00fbt 2022",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00658.html.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00709.html du 09 ao\u00fbt 2022",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00709.html.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00621.html du 09 ao\u00fbt 2022",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00621.html.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00672.html du 09 ao\u00fbt 2022",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00672.html.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00628.html du 09 ao\u00fbt 2022",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00628.html.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00596.html du 09 ao\u00fbt 2022",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00596.html.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00665.html du 09 ao\u00fbt 2022",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00665.html.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00655.html du 09 ao\u00fbt 2022",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00655.html.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00712.html du 09 ao\u00fbt 2022",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00712.html.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00678.html du 09 ao\u00fbt 2022",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00678.html.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00667.html du 09 ao\u00fbt 2022",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00667.html.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00705.html du 09 ao\u00fbt 2022",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00705.html.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00706.html du 09 ao\u00fbt 2022",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00706.html.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00694.html du 09 ao\u00fbt 2022",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00694.html.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00650.html du 09 ao\u00fbt 2022",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00650.html.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00662.html du 09 ao\u00fbt 2022",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00662.html.html"
}
]
}
CERTFR-2022-AVI-727
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans les produits Intel. Certaines d'entre elles permettent à un attaquant de provoquer un déni de service, une atteinte à l'intégrité des données et une atteinte à la confidentialité des données.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| Intel | N/A | Intel 722 Series Ethernet contrôleurs et adaptateurs versions antérieures à 1.5.5 | ||
| Intel | N/A | Intel Killer™ WiFi versions antérieures à 3.1122.1105 | ||
| Intel | N/A | Open AMT Cloud Toolkit versions antérieures à 2.0.2 et 2.2.2 | ||
| Intel | N/A | Intel E810 Ethernet contrôleurs et adaptateurs versions antérieures à 1.6.1.9 | ||
| Intel | N/A | Intel Support Android versions antérieures à 21.7.40 | ||
| Intel | N/A | Intel Team Blue toutes versions | ||
| Intel | N/A | Intel IPP Cryptography versions antérieures à 2021.5 | ||
| Intel | N/A | Intel VTune™ Profiler versions antérieures à 2022.2.0 | ||
| Intel | N/A | Intel Processors (veuillez vous référer aux avis de l'éditeur : intel-sa-00706 et intel-sa-00657) | ||
| Intel | N/A | Intel Edge Insights pour les versions Industrial antérieures à 2.6.1 | ||
| Intel | N/A | Intel Standard Manageability toutes versions | ||
| Intel | N/A | Intel Data Center Manager versions antérieures à 4.1 | ||
| Intel | N/A | Intel PROSet/Wireless WiFi versions antérieure à 22.120 | ||
| Intel | N/A | Intel Datacenter Group Event Android toutes versions | ||
| Intel | N/A | Intel SPS versions antérieures à SPS_E3_04.08.04.330.0 et SPS_E3_04.01.04.530.0 | ||
| Intel | N/A | Intel Ethernet 700 Series Controller drivers pour les versions VMware antérieures à 2.1.5.0 | ||
| Intel | N/A | Intel 700 Series Ethernet contrôleurs et adaptateurs versions antérieures à 8.5 | ||
| Intel | N/A | Intel DSA versions antérieures 22.2.14 | ||
| Intel | N/A | Intel NUC9 Extreme Laptop kits versions antérieures à 2.2.0.22 | ||
| Intel | N/A | Intel Connect M Android versions antérieures à 1.7.4 | ||
| Intel | N/A | Intel HAXM versions antérieures à 7.7.1 | ||
| Intel | N/A | Intel Distribution pour Python versions antérieures à 2022.0.3 | ||
| Intel | N/A | Intel Killer™ Bluetooth versions antérieures à 22.120 | ||
| Intel | N/A | Intel NUCs versions antérieures à BC0076 | ||
| Intel | N/A | Intel RST versions antérieures à 16.8.4.1011, 17.7.1.1010, 18.1.6.1039, 18.2.1.1008 et 18.3.0.1003 | ||
| Intel | N/A | Intel SEAPI toutes versions | ||
| Intel | N/A | Intel Ethernet 500 Series Controller drivers pour les versions VMware antérieures à 1.11.4.0 | ||
| Intel | N/A | Intel Wireless Bluetooth versions antérieures à 22.120 | ||
| Intel | N/A | Intel AMT toutes versions | ||
| Intel | N/A | Intel Enpirion Digital Power Configurator GUI toutes versions | ||
| Intel | N/A | Intel Datacenter Group Event Advisory iOS toutes versions |
| Title | Publication Time | Tags | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Intel 722 Series Ethernet contr\u00f4leurs et adaptateurs versions ant\u00e9rieures \u00e0 1.5.5",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel Killer\u2122 WiFi versions ant\u00e9rieures \u00e0 3.1122.1105",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Open AMT Cloud Toolkit versions ant\u00e9rieures \u00e0 2.0.2 et 2.2.2",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel E810 Ethernet contr\u00f4leurs et adaptateurs versions ant\u00e9rieures \u00e0 1.6.1.9",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel Support Android versions ant\u00e9rieures \u00e0 21.7.40",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel Team Blue toutes versions",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel IPP Cryptography versions ant\u00e9rieures \u00e0 2021.5",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel VTune\u2122 Profiler versions ant\u00e9rieures \u00e0 2022.2.0",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel Processors (veuillez vous r\u00e9f\u00e9rer aux avis de l\u0027\u00e9diteur : intel-sa-00706 et intel-sa-00657)",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel Edge Insights pour les versions Industrial ant\u00e9rieures \u00e0 2.6.1",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel Standard Manageability toutes versions",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel Data Center Manager versions ant\u00e9rieures \u00e0 4.1",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel PROSet/Wireless WiFi versions ant\u00e9rieure \u00e0 22.120",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel Datacenter Group Event Android toutes versions",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel SPS versions ant\u00e9rieures \u00e0 SPS_E3_04.08.04.330.0 et SPS_E3_04.01.04.530.0",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel Ethernet 700 Series Controller drivers pour les versions VMware ant\u00e9rieures \u00e0 2.1.5.0",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel 700 Series Ethernet contr\u00f4leurs et adaptateurs versions ant\u00e9rieures \u00e0 8.5",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel DSA versions ant\u00e9rieures 22.2.14",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel NUC9 Extreme Laptop kits versions ant\u00e9rieures \u00e0 2.2.0.22",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel Connect M Android versions ant\u00e9rieures \u00e0 1.7.4",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel HAXM versions ant\u00e9rieures \u00e0 7.7.1",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel Distribution pour Python versions ant\u00e9rieures \u00e0 2022.0.3",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel Killer\u2122 Bluetooth versions ant\u00e9rieures \u00e0 22.120",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel NUCs versions ant\u00e9rieures \u00e0 BC0076",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel RST versions ant\u00e9rieures \u00e0 16.8.4.1011, 17.7.1.1010, 18.1.6.1039, 18.2.1.1008 et 18.3.0.1003",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel SEAPI toutes versions",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel Ethernet 500 Series Controller drivers pour les versions VMware ant\u00e9rieures \u00e0 1.11.4.0",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel Wireless Bluetooth versions ant\u00e9rieures \u00e0 22.120",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel AMT toutes versions",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel Enpirion Digital Power Configurator GUI toutes versions",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel Datacenter Group Event Advisory iOS toutes versions",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2022-28696",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28696"
},
{
"name": "CVE-2022-33209",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-33209"
},
{
"name": "CVE-2022-21197",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21197"
},
{
"name": "CVE-2022-29507",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29507"
},
{
"name": "CVE-2022-28709",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28709"
},
{
"name": "CVE-2022-21233",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21233"
},
{
"name": "CVE-2022-21139",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21139"
},
{
"name": "CVE-2022-27500",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27500"
},
{
"name": "CVE-2022-34345",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-34345"
},
{
"name": "CVE-2022-30944",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30944"
},
{
"name": "CVE-2022-30601",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30601"
},
{
"name": "CVE-2022-23182",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23182"
},
{
"name": "CVE-2021-23179",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-23179"
},
{
"name": "CVE-2022-21172",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21172"
},
{
"name": "CVE-2022-26344",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-26344"
},
{
"name": "CVE-2022-21160",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21160"
},
{
"name": "CVE-2022-34488",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-34488"
},
{
"name": "CVE-2022-21152",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21152"
},
{
"name": "CVE-2021-33126",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33126"
},
{
"name": "CVE-2022-26374",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-26374"
},
{
"name": "CVE-2022-21793",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21793"
},
{
"name": "CVE-2021-23168",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-23168"
},
{
"name": "CVE-2022-27493",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27493"
},
{
"name": "CVE-2022-21225",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21225"
},
{
"name": "CVE-2021-26950",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-26950"
},
{
"name": "CVE-2022-26017",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-26017"
},
{
"name": "CVE-2022-30296",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30296"
},
{
"name": "CVE-2022-22730",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22730"
},
{
"name": "CVE-2021-33847",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33847"
},
{
"name": "CVE-2022-25999",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-25999"
},
{
"name": "CVE-2022-21812",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21812"
},
{
"name": "CVE-2022-26083",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-26083"
},
{
"name": "CVE-2022-25841",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-25841"
},
{
"name": "CVE-2021-33060",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33060"
},
{
"name": "CVE-2022-21181",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21181"
},
{
"name": "CVE-2021-26254",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-26254"
},
{
"name": "CVE-2022-25899",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-25899"
},
{
"name": "CVE-2021-44545",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-44545"
},
{
"name": "CVE-2018-1285",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1285"
},
{
"name": "CVE-2022-26373",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-26373"
},
{
"name": "CVE-2021-44470",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-44470"
},
{
"name": "CVE-2022-25966",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-25966"
},
{
"name": "CVE-2022-28858",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28858"
},
{
"name": "CVE-2022-21140",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21140"
},
{
"name": "CVE-2022-26844",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-26844"
},
{
"name": "CVE-2022-21212",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21212"
},
{
"name": "CVE-2021-33128",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33128"
},
{
"name": "CVE-2022-23403",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23403"
},
{
"name": "CVE-2022-21229",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21229"
},
{
"name": "CVE-2021-26257",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-26257"
},
{
"name": "CVE-2022-28697",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28697"
},
{
"name": "CVE-2021-23188",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-23188"
},
{
"name": "CVE-2022-21807",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21807"
},
{
"name": "CVE-2022-32579",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32579"
},
{
"name": "CVE-2022-21148",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21148"
},
{
"name": "CVE-2022-26074",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-26074"
},
{
"name": "CVE-2021-37409",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-37409"
},
{
"name": "CVE-2021-23223",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-23223"
},
{
"name": "CVE-2022-21240",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21240"
},
{
"name": "CVE-2022-24378",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-24378"
}
],
"links": [],
"reference": "CERTFR-2022-AVI-727",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2022-08-10T00:00:00.000000"
}
],
"risks": [
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "D\u00e9ni de service"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits Intel.\nCertaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer un d\u00e9ni\nde service, une atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es et une atteinte \u00e0 la\nconfidentialit\u00e9 des donn\u00e9es.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Intel",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00701.html du 09 ao\u00fbt 2022",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00701.html.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00703.html du 09 ao\u00fbt 2022",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00703.html.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00669.html du 09 ao\u00fbt 2022",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00669.html.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00686.html du 09 ao\u00fbt 2022",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00686.html.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00679.html du 09 ao\u00fbt 2022",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00679.html.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00668.html du 09 ao\u00fbt 2022",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00668.html.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00657.html du 09 ao\u00fbt 2022",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00657.html.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00660.html du 09 ao\u00fbt 2022",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00660.html.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00593.html du 09 ao\u00fbt 2022",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00593.html.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00684.html du 09 ao\u00fbt 2022",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00684.html.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00653.html du 09 ao\u00fbt 2022",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00653.html.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00658.html du 09 ao\u00fbt 2022",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00658.html.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00709.html du 09 ao\u00fbt 2022",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00709.html.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00621.html du 09 ao\u00fbt 2022",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00621.html.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00672.html du 09 ao\u00fbt 2022",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00672.html.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00628.html du 09 ao\u00fbt 2022",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00628.html.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00596.html du 09 ao\u00fbt 2022",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00596.html.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00665.html du 09 ao\u00fbt 2022",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00665.html.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00655.html du 09 ao\u00fbt 2022",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00655.html.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00712.html du 09 ao\u00fbt 2022",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00712.html.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00678.html du 09 ao\u00fbt 2022",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00678.html.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00667.html du 09 ao\u00fbt 2022",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00667.html.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00705.html du 09 ao\u00fbt 2022",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00705.html.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00706.html du 09 ao\u00fbt 2022",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00706.html.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00694.html du 09 ao\u00fbt 2022",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00694.html.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00650.html du 09 ao\u00fbt 2022",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00650.html.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00662.html du 09 ao\u00fbt 2022",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00662.html.html"
}
]
}
GSD-2022-26083
Vulnerability from gsd - Updated: 2023-12-13 01:19{
"GSD": {
"alias": "CVE-2022-26083",
"id": "GSD-2022-26083"
},
"gsd": {
"metadata": {
"exploitCode": "unknown",
"remediation": "unknown",
"reportConfidence": "confirmed",
"type": "vulnerability"
},
"osvSchema": {
"aliases": [
"CVE-2022-26083"
],
"id": "GSD-2022-26083",
"modified": "2023-12-13T01:19:38.827593Z",
"schema_version": "1.4.0"
}
},
"namespaces": {
"cve.org": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2022-26083",
"STATE": "RESERVED"
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
}
]
}
}
}
}
GHSA-97M5-X73G-J7XJ
Vulnerability from github – Published: 2025-02-14 21:31 – Updated: 2025-02-14 21:31Generation of weak initialization vector in an Intel(R) IPP Cryptography software library before version 2021.5 may allow an unauthenticated user to potentially enable information disclosure via local access.
{
"affected": [],
"aliases": [
"CVE-2022-26083"
],
"database_specific": {
"cwe_ids": [
"CWE-1204"
],
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2025-02-14T21:15:11Z",
"severity": "HIGH"
},
"details": "Generation of weak initialization vector in an Intel(R) IPP Cryptography software library before version 2021.5 may allow an unauthenticated user to potentially enable information disclosure via local access.",
"id": "GHSA-97m5-x73g-j7xj",
"modified": "2025-02-14T21:31:05Z",
"published": "2025-02-14T21:31:05Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-26083"
},
{
"type": "WEB",
"url": "https://intel.com/content/www/us/en/security-center/advisory/intel-sa-00667.html"
}
],
"schema_version": "1.4.0",
"severity": [
{
"score": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:N",
"type": "CVSS_V3"
}
]
}
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.