CVE-2022-42269 (GCVE-0-2022-42269)
Vulnerability from cvelistv5 – Published: 2022-12-30 00:00 – Updated: 2025-04-10 20:47
VLAI?
Summary
NVIDIA Trusted OS contains a vulnerability in an SMC call handler, where failure to validate untrusted input may allow a highly privileged local attacker to cause information disclosure and compromise integrity. The scope of the impact can extend to other components.
Severity ?
7.9 (High)
CWE
Assigner
References
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| NVIDIA | Jetson AGX Xavier series, Jetson Xavier NX, Jetson TX1, Jetson TX2 series, Jetson TX2 NX |
Affected:
All versions prior to 32.7.2
|
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-03T13:03:45.939Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_transferred"
],
"url": "https://nvidia.custhelp.com/app/answers/detail/a_id/5417"
}
],
"title": "CVE Program Container"
},
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2022-42269",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-04-10T20:47:31.563069Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2025-04-10T20:47:39.657Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"product": "Jetson AGX Xavier series, Jetson Xavier NX, Jetson TX1, Jetson TX2 series, Jetson TX2 NX",
"vendor": "NVIDIA",
"versions": [
{
"status": "affected",
"version": "All versions prior to 32.7.2"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "NVIDIA Trusted OS contains a vulnerability in an SMC call handler, where failure to validate untrusted input may allow a highly privileged local attacker to cause information disclosure and compromise integrity. The scope of the impact can extend to other components."
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 7.9,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:N",
"version": "3.1"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-20",
"description": "CWE-20",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2022-12-30T00:00:00.000Z",
"orgId": "9576f279-3576-44b5-a4af-b9a8644b2de6",
"shortName": "nvidia"
},
"references": [
{
"url": "https://nvidia.custhelp.com/app/answers/detail/a_id/5417"
}
]
}
},
"cveMetadata": {
"assignerOrgId": "9576f279-3576-44b5-a4af-b9a8644b2de6",
"assignerShortName": "nvidia",
"cveId": "CVE-2022-42269",
"datePublished": "2022-12-30T00:00:00.000Z",
"dateReserved": "2022-10-03T00:00:00.000Z",
"dateUpdated": "2025-04-10T20:47:39.657Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"fkie_nvd": {
"configurations": "[{\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:nvidia:jetson_linux:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"32.7.2\", \"matchCriteriaId\": \"5C65BE02-61B8-4A4D-84A8-52BCA6895C34\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:nvidia:jetson_agx_xavier:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5DD3D2AA-2A9F-470D-BB0F-A7B7C2EC2490\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:nvidia:jetson_agx_xavier_16gb:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E0E081CB-B6EC-42DC-BA04-BCA13C17D190\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:nvidia:jetson_agx_xavier_32gb:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"4F92D471-8E65-41FC-A5DE-255136F6F989\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:nvidia:jetson_agx_xavier_64gb:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B51F666B-F3ED-4CF3-B48E-B39BDE1C2579\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:nvidia:jetson_agx_xavier_8gb:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E29459F7-997A-4B87-9164-6E3B5158ADC3\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:nvidia:jetson_agx_xavier_industrial:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"3C7C6B22-EBD3-4465-9852-4A4844AA714A\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:nvidia:jetson_tx1:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"86D1FDAD-C594-43D9-9BF6-F7461177AB91\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:nvidia:jetson_tx2:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"DE9D4A55-A232-4AF2-B7E9-CD58D7D17479\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:nvidia:jetson_tx2_4gb:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"71994F94-5279-4107-99F5-48990AE0C686\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:nvidia:jetson_tx2_nx:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"64C3FB58-08AA-4FE4-97BE-21B254BA229F\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:nvidia:jetson_tx2i:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5DF55ABB-1B4F-452E-9D84-C01A638F88A0\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:nvidia:jetson_xavier_nx:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B0AA5976-FD71-4A53-BD4F-D342E871FEB0\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:nvidia:jetson_xavier_nx_16gb:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A36028A3-EE83-4158-9039-5C6C795FA048\"}]}]}]",
"descriptions": "[{\"lang\": \"en\", \"value\": \"NVIDIA Trusted OS contains a vulnerability in an SMC call handler, where failure to validate untrusted input may allow a highly privileged local attacker to cause information disclosure and compromise integrity. The scope of the impact can extend to other components.\"}, {\"lang\": \"es\", \"value\": \"NVIDIA Trusted OS contiene una vulnerabilidad en un controlador de llamadas SMC, donde no validar entradas que no son de confianza puede permitir que un atacante local con privilegios elevados provoque la divulgaci\\u00f3n de informaci\\u00f3n y comprometa la integridad. El alcance del impacto puede extenderse a otros componentes.\"}]",
"id": "CVE-2022-42269",
"lastModified": "2024-11-21T07:24:37.670",
"metrics": "{\"cvssMetricV31\": [{\"source\": \"psirt@nvidia.com\", \"type\": \"Secondary\", \"cvssData\": {\"version\": \"3.1\", \"vectorString\": \"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:N\", \"baseScore\": 7.9, \"baseSeverity\": \"HIGH\", \"attackVector\": \"LOCAL\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"HIGH\", \"userInteraction\": \"NONE\", \"scope\": \"CHANGED\", \"confidentialityImpact\": \"HIGH\", \"integrityImpact\": \"HIGH\", \"availabilityImpact\": \"NONE\"}, \"exploitabilityScore\": 1.5, \"impactScore\": 5.8}, {\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"3.1\", \"vectorString\": \"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:N\", \"baseScore\": 7.9, \"baseSeverity\": \"HIGH\", \"attackVector\": \"LOCAL\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"HIGH\", \"userInteraction\": \"NONE\", \"scope\": \"CHANGED\", \"confidentialityImpact\": \"HIGH\", \"integrityImpact\": \"HIGH\", \"availabilityImpact\": \"NONE\"}, \"exploitabilityScore\": 1.5, \"impactScore\": 5.8}]}",
"published": "2022-12-30T23:15:11.750",
"references": "[{\"url\": \"https://nvidia.custhelp.com/app/answers/detail/a_id/5417\", \"source\": \"psirt@nvidia.com\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"https://nvidia.custhelp.com/app/answers/detail/a_id/5417\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}]",
"sourceIdentifier": "psirt@nvidia.com",
"vulnStatus": "Modified",
"weaknesses": "[{\"source\": \"psirt@nvidia.com\", \"type\": \"Secondary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-20\"}]}, {\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-20\"}]}]"
},
"nvd": "{\"cve\":{\"id\":\"CVE-2022-42269\",\"sourceIdentifier\":\"psirt@nvidia.com\",\"published\":\"2022-12-30T23:15:11.750\",\"lastModified\":\"2024-11-21T07:24:37.670\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"NVIDIA Trusted OS contains a vulnerability in an SMC call handler, where failure to validate untrusted input may allow a highly privileged local attacker to cause information disclosure and compromise integrity. The scope of the impact can extend to other components.\"},{\"lang\":\"es\",\"value\":\"NVIDIA Trusted OS contiene una vulnerabilidad en un controlador de llamadas SMC, donde no validar entradas que no son de confianza puede permitir que un atacante local con privilegios elevados provoque la divulgaci\u00f3n de informaci\u00f3n y comprometa la integridad. El alcance del impacto puede extenderse a otros componentes.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"psirt@nvidia.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:N\",\"baseScore\":7.9,\"baseSeverity\":\"HIGH\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"HIGH\",\"userInteraction\":\"NONE\",\"scope\":\"CHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":1.5,\"impactScore\":5.8},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:N\",\"baseScore\":7.9,\"baseSeverity\":\"HIGH\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"HIGH\",\"userInteraction\":\"NONE\",\"scope\":\"CHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":1.5,\"impactScore\":5.8}]},\"weaknesses\":[{\"source\":\"psirt@nvidia.com\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-20\"}]},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-20\"}]}],\"configurations\":[{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:nvidia:jetson_linux:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"32.7.2\",\"matchCriteriaId\":\"5C65BE02-61B8-4A4D-84A8-52BCA6895C34\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:nvidia:jetson_agx_xavier:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5DD3D2AA-2A9F-470D-BB0F-A7B7C2EC2490\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:nvidia:jetson_agx_xavier_16gb:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E0E081CB-B6EC-42DC-BA04-BCA13C17D190\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:nvidia:jetson_agx_xavier_32gb:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4F92D471-8E65-41FC-A5DE-255136F6F989\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:nvidia:jetson_agx_xavier_64gb:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B51F666B-F3ED-4CF3-B48E-B39BDE1C2579\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:nvidia:jetson_agx_xavier_8gb:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E29459F7-997A-4B87-9164-6E3B5158ADC3\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:nvidia:jetson_agx_xavier_industrial:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3C7C6B22-EBD3-4465-9852-4A4844AA714A\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:nvidia:jetson_tx1:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"86D1FDAD-C594-43D9-9BF6-F7461177AB91\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:nvidia:jetson_tx2:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DE9D4A55-A232-4AF2-B7E9-CD58D7D17479\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:nvidia:jetson_tx2_4gb:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"71994F94-5279-4107-99F5-48990AE0C686\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:nvidia:jetson_tx2_nx:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"64C3FB58-08AA-4FE4-97BE-21B254BA229F\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:nvidia:jetson_tx2i:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5DF55ABB-1B4F-452E-9D84-C01A638F88A0\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:nvidia:jetson_xavier_nx:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B0AA5976-FD71-4A53-BD4F-D342E871FEB0\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:nvidia:jetson_xavier_nx_16gb:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A36028A3-EE83-4158-9039-5C6C795FA048\"}]}]}],\"references\":[{\"url\":\"https://nvidia.custhelp.com/app/answers/detail/a_id/5417\",\"source\":\"psirt@nvidia.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://nvidia.custhelp.com/app/answers/detail/a_id/5417\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]}]}}",
"vulnrichment": {
"containers": "{\"adp\": [{\"title\": \"CVE Program Container\", \"references\": [{\"url\": \"https://nvidia.custhelp.com/app/answers/detail/a_id/5417\", \"tags\": [\"x_transferred\"]}], \"providerMetadata\": {\"orgId\": \"af854a3a-2127-422b-91ae-364da2661108\", \"shortName\": \"CVE\", \"dateUpdated\": \"2024-08-03T13:03:45.939Z\"}}, {\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2022-42269\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"total\"}], \"version\": \"2.0.3\", \"timestamp\": \"2025-04-10T20:47:31.563069Z\"}}}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2025-04-10T20:47:35.399Z\"}}], \"cna\": {\"metrics\": [{\"cvssV3_1\": {\"scope\": \"CHANGED\", \"version\": \"3.1\", \"baseScore\": 7.9, \"attackVector\": \"LOCAL\", \"baseSeverity\": \"HIGH\", \"vectorString\": \"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:N\", \"integrityImpact\": \"HIGH\", \"userInteraction\": \"NONE\", \"attackComplexity\": \"LOW\", \"availabilityImpact\": \"NONE\", \"privilegesRequired\": \"HIGH\", \"confidentialityImpact\": \"HIGH\"}}], \"affected\": [{\"vendor\": \"NVIDIA\", \"product\": \"Jetson AGX Xavier series, Jetson Xavier NX, Jetson TX1, Jetson TX2 series, Jetson TX2 NX\", \"versions\": [{\"status\": \"affected\", \"version\": \"All versions prior to 32.7.2\"}]}], \"references\": [{\"url\": \"https://nvidia.custhelp.com/app/answers/detail/a_id/5417\"}], \"descriptions\": [{\"lang\": \"en\", \"value\": \"NVIDIA Trusted OS contains a vulnerability in an SMC call handler, where failure to validate untrusted input may allow a highly privileged local attacker to cause information disclosure and compromise integrity. The scope of the impact can extend to other components.\"}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-20\", \"description\": \"CWE-20\"}]}], \"providerMetadata\": {\"orgId\": \"9576f279-3576-44b5-a4af-b9a8644b2de6\", \"shortName\": \"nvidia\", \"dateUpdated\": \"2022-12-30T00:00:00.000Z\"}}}",
"cveMetadata": "{\"cveId\": \"CVE-2022-42269\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2025-04-10T20:47:39.657Z\", \"dateReserved\": \"2022-10-03T00:00:00.000Z\", \"assignerOrgId\": \"9576f279-3576-44b5-a4af-b9a8644b2de6\", \"datePublished\": \"2022-12-30T00:00:00.000Z\", \"assignerShortName\": \"nvidia\"}",
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
}
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…