Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2023-22662 (GCVE-0-2023-22662)
Vulnerability from cvelistv5 – Published: 2024-05-16 20:47 – Updated: 2024-08-02 10:13- denial of service
- CWE-20 - Improper Input Validation
| Vendor | Product | Version | ||
|---|---|---|---|---|
| n/a | UEFI firmware for some Intel(R) Server Board S2600BP products |
Affected:
See references
|
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2023-22662",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-05-17T13:01:19.772911Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2024-06-04T17:26:50.409Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
},
{
"providerMetadata": {
"dateUpdated": "2024-08-02T10:13:50.092Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01080.html",
"tags": [
"x_transferred"
],
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01080.html"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"product": "UEFI firmware for some Intel(R) Server Board S2600BP products",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "See references"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "Improper input validation of EpsdSrMgmtConfig in UEFI firmware for some Intel(R) Server Board S2600BP products may allow a privileged user to potentially enable denial of service via local access."
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.8,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"privilegesRequired": "HIGH",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:R/S:C/C:N/I:L/A:H",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "denial of service",
"lang": "en"
},
{
"cweId": "CWE-20",
"description": "Improper Input Validation",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2024-05-16T20:47:01.139Z",
"orgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
"shortName": "intel"
},
"references": [
{
"name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01080.html",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01080.html"
}
]
}
},
"cveMetadata": {
"assignerOrgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
"assignerShortName": "intel",
"cveId": "CVE-2023-22662",
"datePublished": "2024-05-16T20:47:01.139Z",
"dateReserved": "2023-06-09T03:00:03.474Z",
"dateUpdated": "2024-08-02T10:13:50.092Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"fkie_nvd": {
"descriptions": "[{\"lang\": \"en\", \"value\": \"Improper input validation of EpsdSrMgmtConfig in UEFI firmware for some Intel(R) Server Board S2600BP products may allow a privileged user to potentially enable denial of service via local access.\"}, {\"lang\": \"es\", \"value\": \" La validaci\\u00f3n de entrada incorrecta de EpsdSrMgmtConfig en el firmware UEFI para algunos productos Intel(R) Server Board S2600BP puede permitir que un usuario privilegiado habilite potencialmente la denegaci\\u00f3n de servicio a trav\\u00e9s del acceso local.\"}]",
"id": "CVE-2023-22662",
"lastModified": "2024-11-21T07:45:09.400",
"metrics": "{\"cvssMetricV31\": [{\"source\": \"secure@intel.com\", \"type\": \"Secondary\", \"cvssData\": {\"version\": \"3.1\", \"vectorString\": \"CVSS:3.1/AV:L/AC:H/PR:H/UI:R/S:C/C:N/I:L/A:H\", \"baseScore\": 5.8, \"baseSeverity\": \"MEDIUM\", \"attackVector\": \"LOCAL\", \"attackComplexity\": \"HIGH\", \"privilegesRequired\": \"HIGH\", \"userInteraction\": \"REQUIRED\", \"scope\": \"CHANGED\", \"confidentialityImpact\": \"NONE\", \"integrityImpact\": \"LOW\", \"availabilityImpact\": \"HIGH\"}, \"exploitabilityScore\": 0.6, \"impactScore\": 4.7}]}",
"published": "2024-05-16T21:15:50.580",
"references": "[{\"url\": \"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01080.html\", \"source\": \"secure@intel.com\"}, {\"url\": \"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01080.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}]",
"sourceIdentifier": "secure@intel.com",
"vulnStatus": "Awaiting Analysis",
"weaknesses": "[{\"source\": \"secure@intel.com\", \"type\": \"Secondary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-20\"}]}]"
},
"nvd": "{\"cve\":{\"id\":\"CVE-2023-22662\",\"sourceIdentifier\":\"secure@intel.com\",\"published\":\"2024-05-16T21:15:50.580\",\"lastModified\":\"2024-11-21T07:45:09.400\",\"vulnStatus\":\"Awaiting Analysis\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Improper input validation of EpsdSrMgmtConfig in UEFI firmware for some Intel(R) Server Board S2600BP products may allow a privileged user to potentially enable denial of service via local access.\"},{\"lang\":\"es\",\"value\":\" La validaci\u00f3n de entrada incorrecta de EpsdSrMgmtConfig en el firmware UEFI para algunos productos Intel(R) Server Board S2600BP puede permitir que un usuario privilegiado habilite potencialmente la denegaci\u00f3n de servicio a trav\u00e9s del acceso local.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"secure@intel.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:H/PR:H/UI:R/S:C/C:N/I:L/A:H\",\"baseScore\":5.8,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"HIGH\",\"privilegesRequired\":\"HIGH\",\"userInteraction\":\"REQUIRED\",\"scope\":\"CHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"LOW\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":0.6,\"impactScore\":4.7}]},\"weaknesses\":[{\"source\":\"secure@intel.com\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-20\"}]}],\"references\":[{\"url\":\"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01080.html\",\"source\":\"secure@intel.com\"},{\"url\":\"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01080.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}]}}",
"vulnrichment": {
"containers": "{\"adp\": [{\"title\": \"CVE Program Container\", \"references\": [{\"url\": \"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01080.html\", \"name\": \"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01080.html\", \"tags\": [\"x_transferred\"]}], \"providerMetadata\": {\"orgId\": \"af854a3a-2127-422b-91ae-364da2661108\", \"shortName\": \"CVE\", \"dateUpdated\": \"2024-08-02T10:13:50.092Z\"}}, {\"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2023-22662\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"partial\"}], \"version\": \"2.0.3\", \"timestamp\": \"2024-05-17T13:01:19.772911Z\"}}}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2024-05-23T19:01:24.511Z\"}, \"title\": \"CISA ADP Vulnrichment\"}], \"cna\": {\"metrics\": [{\"format\": \"CVSS\", \"cvssV3_1\": {\"scope\": \"CHANGED\", \"version\": \"3.1\", \"baseScore\": 5.8, \"attackVector\": \"LOCAL\", \"baseSeverity\": \"MEDIUM\", \"vectorString\": \"CVSS:3.1/AV:L/AC:H/PR:H/UI:R/S:C/C:N/I:L/A:H\", \"integrityImpact\": \"LOW\", \"userInteraction\": \"REQUIRED\", \"attackComplexity\": \"HIGH\", \"availabilityImpact\": \"HIGH\", \"privilegesRequired\": \"HIGH\", \"confidentialityImpact\": \"NONE\"}, \"scenarios\": [{\"lang\": \"en\", \"value\": \"GENERAL\"}]}], \"affected\": [{\"vendor\": \"n/a\", \"product\": \"UEFI firmware for some Intel(R) Server Board S2600BP products\", \"versions\": [{\"status\": \"affected\", \"version\": \"See references\"}], \"defaultStatus\": \"unaffected\"}], \"references\": [{\"url\": \"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01080.html\", \"name\": \"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01080.html\"}], \"descriptions\": [{\"lang\": \"en\", \"value\": \"Improper input validation of EpsdSrMgmtConfig in UEFI firmware for some Intel(R) Server Board S2600BP products may allow a privileged user to potentially enable denial of service via local access.\"}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"description\": \"denial of service\"}, {\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-20\", \"description\": \"Improper Input Validation\"}]}], \"providerMetadata\": {\"orgId\": \"6dda929c-bb53-4a77-a76d-48e79601a1ce\", \"shortName\": \"intel\", \"dateUpdated\": \"2024-05-16T20:47:01.139Z\"}}}",
"cveMetadata": "{\"cveId\": \"CVE-2023-22662\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2024-08-02T10:13:50.092Z\", \"dateReserved\": \"2023-06-09T03:00:03.474Z\", \"assignerOrgId\": \"6dda929c-bb53-4a77-a76d-48e79601a1ce\", \"datePublished\": \"2024-05-16T20:47:01.139Z\", \"assignerShortName\": \"intel\"}",
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
}
}
GSD-2023-22662
Vulnerability from gsd - Updated: 2023-12-13 01:20{
"GSD": {
"alias": "CVE-2023-22662",
"id": "GSD-2023-22662"
},
"gsd": {
"metadata": {
"exploitCode": "unknown",
"remediation": "unknown",
"reportConfidence": "confirmed",
"type": "vulnerability"
},
"osvSchema": {
"aliases": [
"CVE-2023-22662"
],
"id": "GSD-2023-22662",
"modified": "2023-12-13T01:20:43.491583Z",
"schema_version": "1.4.0"
}
},
"namespaces": {
"cve.org": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2023-22662",
"STATE": "RESERVED"
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
}
]
}
}
}
}
FKIE_CVE-2023-22662
Vulnerability from fkie_nvd - Published: 2024-05-16 21:15 - Updated: 2024-11-21 07:45| Vendor | Product | Version |
|---|
{
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Improper input validation of EpsdSrMgmtConfig in UEFI firmware for some Intel(R) Server Board S2600BP products may allow a privileged user to potentially enable denial of service via local access."
},
{
"lang": "es",
"value": " La validaci\u00f3n de entrada incorrecta de EpsdSrMgmtConfig en el firmware UEFI para algunos productos Intel(R) Server Board S2600BP puede permitir que un usuario privilegiado habilite potencialmente la denegaci\u00f3n de servicio a trav\u00e9s del acceso local."
}
],
"id": "CVE-2023-22662",
"lastModified": "2024-11-21T07:45:09.400",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.8,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"privilegesRequired": "HIGH",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:R/S:C/C:N/I:L/A:H",
"version": "3.1"
},
"exploitabilityScore": 0.6,
"impactScore": 4.7,
"source": "secure@intel.com",
"type": "Secondary"
}
]
},
"published": "2024-05-16T21:15:50.580",
"references": [
{
"source": "secure@intel.com",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01080.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01080.html"
}
],
"sourceIdentifier": "secure@intel.com",
"vulnStatus": "Awaiting Analysis",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-20"
}
],
"source": "secure@intel.com",
"type": "Secondary"
}
]
}
CERTFR-2024-AVI-0397
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans les produits Intel. Certaines d'entre elles permettent à un attaquant de provoquer une élévation de privilèges, un déni de service à distance et une atteinte à la confidentialité des données.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
- Bibliothèque Libva iotg-lin-gfx-libva toutes verions
- Bibliothèque Libva versions antérieures à 2.20.0
- Installateur Endurance Gaming Mode versions antérieures à 1.3.937.0
- Intel Advisor versions antérieures à 2024.0
- Intel Agilex 7 FPGA et SoC FPGA versions antérieures à 2.9.0
- Intel Arc & Iris Xe Graphics versions antérieures à 31.0.101.5081
- Intel Arc Control versions antérieures à 1.73.5335.2
- Intel Chipset Device Software versions antérieures à 10.1.19444.8378
- Intel Code Base Investigator (CBI) versions antérieures à 1.1.0
- Intel Computing Improvement Program versions antérieures à 2.4.10654
- Intel Context Sensing Technology (CST) versions antérieures à 2.1.10300
- Intel Data Center GPU Max Series 1100 and 1550 toutes versions
- Intel Distribution pour GDB versions antérieures à 2024.0
- Intel Dynamic Load Balancer versions antérieures à 8.5.0
- Intel Dynamic Tuning Technology (DTT) sans les derniers correctifs de sécurité
- Intel Ethernet Adapter Complete Driver Pack versions antérieures à 28.3
- Intel Ethernet Adapters versions antérieures à 29.0.1
- Intel Ethernet Connections Boot Utility, Preboot Images et EFI Drivers versions antérieures à 28.3
- Intel Extreme Tuning Utility (XTU) versions antérieures à 7.14.0.15
- Intel Graphics Command Center Service embarqué dans le pilote Intel Graphics Windows DCH versions antérieures à 31.0.101.3790 et 31.0.101.2114
- Intel Graphics Performance Analyzers (GPA) Framework versions antérieures à 2023.4.
- Intel Graphics Performance Analyzers (GPA) versions antérieures à 2023.4.
- Intel HPC Toolkit versions antérieures à 2024.0
- Intel Inspector versions antérieures à 2024.0
- Intel Media SDK toutes versions
- Intel Neural Compressor versions antérieures à 2.5.0
- Intel oneAPI Base Toolkit versions antérieures à 2024.0
- Intel oneAPI HPC Toolkit versions antérieures à 2024.0.1.
- Intel oneVPL versions antérieures à 23.3.5
- Intel Performance Counter Monitor (PCM) versions antérieures à 202311
- Intel Power Gadget toutes versions
- Intel Processor Diagnostic Tool versions antérieures à 4.1.9.41
- Intel Processor Identification Utility versions antérieures à 7.1.6
- Intel Processor Identification Utility-Legacy versions antérieures à 6.10.34.1129
- Intel Quartus Prime Lite, Standard et Pro Design versions antérieures à 23.1
- Intel Stratix 10 FPGA et SoC FPGA versions antérieures à 2.9.0
- Intel Trace Analyzer and Collector versions antérieures à 2022.0.0 publiées en novembre 2023
- Intel Trust Domain Extensions (TDX) module versions antérieures à TDX_1.5.05.46.698
- Intel VTune Profiler versions antérieures à 2024.0
- Logiciels Intel PROSet/Wireless WiFi et Bluetooth versions antérieures à 23.20
- Micrologiciel Intel Bios Guard sans les derniers correctifs de sécurité
- Micrologiciel Intel Bios PPAM sans les derniers correctifs de sécurité
- Micrologiciel Intel Ethernet Controller I225 Manageability versions antérieures à NVM 1.87
- Micrologiciel UEFI pour Intel Server Board S2600BP toutes versions
- Micrologiciel UEFI pour Intel Server D50DNP sans les derniers correctifs de sécurité
- Micrologiciel UEFI pour Intel Server M50FCP sans les derniers correctifs de sécurité
- Micrologiciels pour Intel Agilex 7 FPGA et SoC FPGA versions antérieures à 23.3
- Micrologiciels pour Intel Stratix 10 FPGA et SoC FPGA versions antérieures à 23.3
- Pilote Intel Thunderbolt versions antérieures à 89
- Pilote Onboard vidéo versions antérieures à 1.14 pour Intel Server Boards basés sur des puces Intel 62X
- Processeurs Intel Core Ultra, plateforme Meteor Lake sans les derniers correctifs de sécurité
- Programme de désinstallation Intel Driver & Support Assistant (DSA) versions antérieures à 23.4.39.10
Intel a indiqué qu'aucun correctif de sécurité ne sera fourni pour Intel Power Gadget et pour le micrologiciel UEFI pour Intel Server Board S2600BP. Se référer au bulletin de sécurité de l'éditeur pour l'obtention des produits affectés par les vulnérabilité CVE-2023-45733 et CVE-2024-21823 (cf. section Documentation).
| Vendor | Product | Description |
|---|
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [],
"affected_systems_content": "\u003cul\u003e \u003cli\u003eBiblioth\u00e8que Libva iotg-lin-gfx-libva toutes verions\u003c/li\u003e \u003cli\u003eBiblioth\u00e8que Libva versions ant\u00e9rieures \u00e0 2.20.0\u003c/li\u003e \u003cli\u003eInstallateur Endurance Gaming Mode versions ant\u00e9rieures \u00e0 1.3.937.0\u003c/li\u003e \u003cli\u003eIntel Advisor versions ant\u00e9rieures \u00e0 2024.0\u003c/li\u003e \u003cli\u003eIntel Agilex 7 FPGA et SoC FPGA versions ant\u00e9rieures \u00e0 2.9.0\u003c/li\u003e \u003cli\u003eIntel Arc \u0026amp; Iris Xe Graphics versions ant\u00e9rieures \u00e0 31.0.101.5081\u003c/li\u003e \u003cli\u003eIntel Arc Control versions ant\u00e9rieures \u00e0 1.73.5335.2\u003c/li\u003e \u003cli\u003eIntel Chipset Device Software versions ant\u00e9rieures \u00e0 10.1.19444.8378\u003c/li\u003e \u003cli\u003eIntel Code Base Investigator (CBI) versions ant\u00e9rieures \u00e0 1.1.0\u003c/li\u003e \u003cli\u003eIntel Computing Improvement Program versions ant\u00e9rieures \u00e0 2.4.10654\u003c/li\u003e \u003cli\u003eIntel Context Sensing Technology (CST) versions ant\u00e9rieures \u00e0 2.1.10300\u003c/li\u003e \u003cli\u003eIntel Data Center GPU Max Series 1100 and 1550 toutes versions\u003c/li\u003e \u003cli\u003eIntel Distribution pour GDB versions ant\u00e9rieures \u00e0 2024.0\u003c/li\u003e \u003cli\u003eIntel Dynamic Load Balancer versions ant\u00e9rieures \u00e0 8.5.0\u003c/li\u003e \u003cli\u003eIntel Dynamic Tuning Technology (DTT) sans les derniers correctifs de s\u00e9curit\u00e9\u003c/li\u003e \u003cli\u003eIntel Ethernet Adapter Complete Driver Pack versions ant\u00e9rieures \u00e0 28.3\u003c/li\u003e \u003cli\u003eIntel Ethernet Adapters versions ant\u00e9rieures \u00e0 29.0.1\u003c/li\u003e \u003cli\u003eIntel Ethernet Connections Boot Utility, Preboot Images et EFI Drivers versions ant\u00e9rieures \u00e0 28.3\u003c/li\u003e \u003cli\u003eIntel Extreme Tuning Utility (XTU) versions ant\u00e9rieures \u00e0 7.14.0.15\u003c/li\u003e \u003cli\u003eIntel Graphics Command Center Service embarqu\u00e9 dans le pilote Intel Graphics Windows DCH versions ant\u00e9rieures \u00e0 31.0.101.3790 et 31.0.101.2114\u003c/li\u003e \u003cli\u003eIntel Graphics Performance Analyzers (GPA) Framework versions ant\u00e9rieures \u00e0 2023.4.\u003c/li\u003e \u003cli\u003eIntel Graphics Performance Analyzers (GPA) versions ant\u00e9rieures \u00e0 2023.4.\u003c/li\u003e \u003cli\u003eIntel HPC Toolkit versions ant\u00e9rieures \u00e0 2024.0\u003c/li\u003e \u003cli\u003eIntel Inspector versions ant\u00e9rieures \u00e0 2024.0\u003c/li\u003e \u003cli\u003eIntel Media SDK toutes versions\u003c/li\u003e \u003cli\u003eIntel Neural Compressor versions ant\u00e9rieures \u00e0 2.5.0\u003c/li\u003e \u003cli\u003eIntel oneAPI Base Toolkit versions ant\u00e9rieures \u00e0 2024.0\u003c/li\u003e \u003cli\u003eIntel oneAPI HPC Toolkit versions ant\u00e9rieures \u00e0 2024.0.1.\u003c/li\u003e \u003cli\u003eIntel oneVPL versions ant\u00e9rieures \u00e0 23.3.5\u003c/li\u003e \u003cli\u003eIntel Performance Counter Monitor (PCM) versions ant\u00e9rieures \u00e0 202311\u003c/li\u003e \u003cli\u003eIntel Power Gadget toutes versions\u003c/li\u003e \u003cli\u003eIntel Processor Diagnostic Tool versions ant\u00e9rieures \u00e0 4.1.9.41\u003c/li\u003e \u003cli\u003eIntel Processor Identification Utility versions ant\u00e9rieures \u00e0 7.1.6\u003c/li\u003e \u003cli\u003eIntel Processor Identification Utility-Legacy versions ant\u00e9rieures \u00e0 6.10.34.1129\u003c/li\u003e \u003cli\u003eIntel Quartus Prime Lite, Standard et Pro Design versions ant\u00e9rieures \u00e0 23.1\u003c/li\u003e \u003cli\u003eIntel Stratix 10 FPGA et SoC FPGA versions ant\u00e9rieures \u00e0 2.9.0\u003c/li\u003e \u003cli\u003eIntel Trace Analyzer and Collector versions ant\u00e9rieures \u00e0 2022.0.0 publi\u00e9es en novembre 2023\u003c/li\u003e \u003cli\u003eIntel Trust Domain Extensions (TDX) module versions ant\u00e9rieures \u00e0 TDX_1.5.05.46.698\u003c/li\u003e \u003cli\u003eIntel VTune Profiler versions ant\u00e9rieures \u00e0 2024.0\u003c/li\u003e \u003cli\u003eLogiciels Intel PROSet/Wireless WiFi et Bluetooth versions ant\u00e9rieures \u00e0 23.20\u003c/li\u003e \u003cli\u003eMicrologiciel Intel Bios Guard sans les derniers correctifs de s\u00e9curit\u00e9\u003c/li\u003e \u003cli\u003eMicrologiciel Intel Bios PPAM sans les derniers correctifs de s\u00e9curit\u00e9\u003c/li\u003e \u003cli\u003eMicrologiciel Intel Ethernet Controller I225 Manageability versions ant\u00e9rieures \u00e0 NVM 1.87\u003c/li\u003e \u003cli\u003eMicrologiciel UEFI pour Intel Server Board S2600BP toutes versions\u003c/li\u003e \u003cli\u003eMicrologiciel UEFI pour Intel Server D50DNP sans les derniers correctifs de s\u00e9curit\u00e9\u003c/li\u003e \u003cli\u003eMicrologiciel UEFI pour Intel Server M50FCP sans les derniers correctifs de s\u00e9curit\u00e9\u003c/li\u003e \u003cli\u003eMicrologiciels pour Intel Agilex 7 FPGA et SoC FPGA versions ant\u00e9rieures \u00e0 23.3\u003c/li\u003e \u003cli\u003eMicrologiciels pour Intel Stratix 10 FPGA et SoC FPGA versions ant\u00e9rieures \u00e0 23.3\u003c/li\u003e \u003cli\u003ePilote Intel Thunderbolt versions ant\u00e9rieures \u00e0 89\u003c/li\u003e \u003cli\u003ePilote Onboard vid\u00e9o versions ant\u00e9rieures \u00e0 1.14 pour Intel Server Boards bas\u00e9s sur des puces Intel 62X\u003c/li\u003e \u003cli\u003eProcesseurs Intel Core Ultra, plateforme Meteor Lake sans les derniers correctifs de s\u00e9curit\u00e9\u003c/li\u003e \u003cli\u003eProgramme de d\u00e9sinstallation Intel Driver \u0026amp; Support Assistant (DSA) versions ant\u00e9rieures \u00e0 23.4.39.10\u003c/li\u003e \u003c/ul\u003e \u003cp\u003eIntel a indiqu\u00e9 qu\u0027aucun correctif de s\u00e9curit\u00e9 ne sera fourni pour Intel Power Gadget et pour le micrologiciel UEFI pour Intel Server Board S2600BP. Se r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des produits affect\u00e9s par les vuln\u00e9rabilit\u00e9 CVE-2023-45733 et CVE-2024-21823 (cf. section Documentation).\u003c/p\u003e ",
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2024-22379",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-22379"
},
{
"name": "CVE-2023-35192",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-35192"
},
{
"name": "CVE-2024-24971",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24971"
},
{
"name": "CVE-2024-21864",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21864"
},
{
"name": "CVE-2023-46103",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-46103"
},
{
"name": "CVE-2023-47859",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-47859"
},
{
"name": "CVE-2024-21862",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21862"
},
{
"name": "CVE-2021-33146",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33146"
},
{
"name": "CVE-2023-48368",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-48368"
},
{
"name": "CVE-2023-46689",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-46689"
},
{
"name": "CVE-2023-45845",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45845"
},
{
"name": "CVE-2024-21823",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21823"
},
{
"name": "CVE-2024-21818",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21818"
},
{
"name": "CVE-2021-33161",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33161"
},
{
"name": "CVE-2023-45846",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45846"
},
{
"name": "CVE-2024-21861",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21861"
},
{
"name": "CVE-2021-33157",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33157"
},
{
"name": "CVE-2023-42433",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-42433"
},
{
"name": "CVE-2021-33162",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33162"
},
{
"name": "CVE-2021-33158",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33158"
},
{
"name": "CVE-2023-38581",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38581"
},
{
"name": "CVE-2022-37341",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-37341"
},
{
"name": "CVE-2024-23487",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-23487"
},
{
"name": "CVE-2023-41082",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-41082"
},
{
"name": "CVE-2023-43629",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-43629"
},
{
"name": "CVE-2024-22382",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-22382"
},
{
"name": "CVE-2023-43745",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-43745"
},
{
"name": "CVE-2021-33141",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33141"
},
{
"name": "CVE-2023-28383",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28383"
},
{
"name": "CVE-2023-45736",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45736"
},
{
"name": "CVE-2024-21835",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21835"
},
{
"name": "CVE-2023-22662",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22662"
},
{
"name": "CVE-2024-21813",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21813"
},
{
"name": "CVE-2024-21831",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21831"
},
{
"name": "CVE-2023-41234",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-41234"
},
{
"name": "CVE-2023-45743",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45743"
},
{
"name": "CVE-2023-39433",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39433"
},
{
"name": "CVE-2023-43751",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-43751"
},
{
"name": "CVE-2023-45315",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45315"
},
{
"name": "CVE-2023-42668",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-42668"
},
{
"name": "CVE-2024-21828",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21828"
},
{
"name": "CVE-2023-47282",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-47282"
},
{
"name": "CVE-2023-38417",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38417"
},
{
"name": "CVE-2023-40070",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40070"
},
{
"name": "CVE-2023-39929",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39929"
},
{
"name": "CVE-2024-22476",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-22476"
},
{
"name": "CVE-2023-40155",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40155"
},
{
"name": "CVE-2024-21774",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21774"
},
{
"name": "CVE-2024-21772",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21772"
},
{
"name": "CVE-2024-21814",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21814"
},
{
"name": "CVE-2023-45320",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45320"
},
{
"name": "CVE-2022-37410",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-37410"
},
{
"name": "CVE-2023-29165",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29165"
},
{
"name": "CVE-2023-47169",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-47169"
},
{
"name": "CVE-2023-27504",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27504"
},
{
"name": "CVE-2023-48727",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-48727"
},
{
"name": "CVE-2021-33142",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33142"
},
{
"name": "CVE-2023-38420",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38420"
},
{
"name": "CVE-2024-22015",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-22015"
},
{
"name": "CVE-2023-45221",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45221"
},
{
"name": "CVE-2023-47855",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-47855"
},
{
"name": "CVE-2023-45217",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45217"
},
{
"name": "CVE-2024-22390",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-22390"
},
{
"name": "CVE-2024-21792",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21792"
},
{
"name": "CVE-2024-21837",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21837"
},
{
"name": "CVE-2023-38654",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38654"
},
{
"name": "CVE-2023-41092",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-41092"
},
{
"name": "CVE-2023-27305",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27305"
},
{
"name": "CVE-2023-49614",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-49614"
},
{
"name": "CVE-2024-22384",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-22384"
},
{
"name": "CVE-2023-40536",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40536"
},
{
"name": "CVE-2023-42773",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-42773"
},
{
"name": "CVE-2023-24460",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24460"
},
{
"name": "CVE-2024-23980",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-23980"
},
{
"name": "CVE-2023-47165",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-47165"
},
{
"name": "CVE-2023-41961",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-41961"
},
{
"name": "CVE-2023-43487",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-43487"
},
{
"name": "CVE-2023-22656",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22656"
},
{
"name": "CVE-2024-24981",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24981"
},
{
"name": "CVE-2024-21777",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21777"
},
{
"name": "CVE-2023-45745",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45745"
},
{
"name": "CVE-2024-21809",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21809"
},
{
"name": "CVE-2023-47210",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-47210"
},
{
"name": "CVE-2023-28402",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28402"
},
{
"name": "CVE-2024-21843",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21843"
},
{
"name": "CVE-2023-40071",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40071"
},
{
"name": "CVE-2023-25952",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-25952"
},
{
"name": "CVE-2023-46691",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-46691"
},
{
"name": "CVE-2023-45733",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45733"
},
{
"name": "CVE-2024-21841",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21841"
},
{
"name": "CVE-2023-43748",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-43748"
},
{
"name": "CVE-2024-21788",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21788"
},
{
"name": "CVE-2024-22095",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-22095"
},
{
"name": "CVE-2022-42879",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42879"
},
{
"name": "CVE-2021-33145",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33145"
}
],
"links": [],
"reference": "CERTFR-2024-AVI-0397",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2024-05-15T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits Intel.\nCertaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une\n\u00e9l\u00e9vation de privil\u00e8ges, un d\u00e9ni de service \u00e0 distance et une atteinte \u00e0\nla confidentialit\u00e9 des donn\u00e9es.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Intel",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01012 du 14 mai 2024",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01012.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01035 du 14 mai 2024",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01035.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-00983 du 14 mai 2024",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00983.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01036 du 14 mai 2024",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01036.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01037 du 14 mai 2024",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01037.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01034 du 14 mai 2024",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01034.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01067 du 14 mai 2024",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01067.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01042 du 14 mai 2024",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01042.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-00984 du 14 mai 2024",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00984.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01032 du 14 mai 2024",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01032.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-00756 du 14 mai 2024",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00756.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01020 du 14 mai 2024",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01020.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01021 du 14 mai 2024",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01021.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01054 du 14 mai 2024",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01054.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01051 du 14 mai 2024",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01051.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01066 du 14 mai 2024",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01066.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01056 du 14 mai 2024",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01056.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01039 du 14 mai 2024",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01039.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01007 du 14 mai 2024",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01007.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-00814 du 14 mai 2024",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00814.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01047 du 14 mai 2024",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01047.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01052 du 14 mai 2024",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01052.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01055 du 14 mai 2024",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01055.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01031 du 14 mai 2024",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01031.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-00996 du 14 mai 2024",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00996.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01013 du 14 mai 2024",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01013.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01059 du 14 mai 2024",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01059.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-00916 du 14 mai 2024",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00916.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01080 du 14 mai 2024",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01080.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01053 du 14 mai 2024",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01053.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-00935 du 14 mai 2024",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00935.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-00962 du 14 mai 2024",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00962.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-00965 du 14 mai 2024",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00965.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01041 du 14 mai 2024",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01041.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-00937 du 14 mai 2024",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00937.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01084 du 14 mai 2024",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01084.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01043 du 14 mai 2024",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01043.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01109 du 14 mai 2024",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01109.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01069 du 14 mai 2024",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01069.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-00831 du 14 mai 2024",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00831.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01050 du 14 mai 2024",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01050.html"
}
]
}
CERTFR-2024-AVI-0397
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans les produits Intel. Certaines d'entre elles permettent à un attaquant de provoquer une élévation de privilèges, un déni de service à distance et une atteinte à la confidentialité des données.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
- Bibliothèque Libva iotg-lin-gfx-libva toutes verions
- Bibliothèque Libva versions antérieures à 2.20.0
- Installateur Endurance Gaming Mode versions antérieures à 1.3.937.0
- Intel Advisor versions antérieures à 2024.0
- Intel Agilex 7 FPGA et SoC FPGA versions antérieures à 2.9.0
- Intel Arc & Iris Xe Graphics versions antérieures à 31.0.101.5081
- Intel Arc Control versions antérieures à 1.73.5335.2
- Intel Chipset Device Software versions antérieures à 10.1.19444.8378
- Intel Code Base Investigator (CBI) versions antérieures à 1.1.0
- Intel Computing Improvement Program versions antérieures à 2.4.10654
- Intel Context Sensing Technology (CST) versions antérieures à 2.1.10300
- Intel Data Center GPU Max Series 1100 and 1550 toutes versions
- Intel Distribution pour GDB versions antérieures à 2024.0
- Intel Dynamic Load Balancer versions antérieures à 8.5.0
- Intel Dynamic Tuning Technology (DTT) sans les derniers correctifs de sécurité
- Intel Ethernet Adapter Complete Driver Pack versions antérieures à 28.3
- Intel Ethernet Adapters versions antérieures à 29.0.1
- Intel Ethernet Connections Boot Utility, Preboot Images et EFI Drivers versions antérieures à 28.3
- Intel Extreme Tuning Utility (XTU) versions antérieures à 7.14.0.15
- Intel Graphics Command Center Service embarqué dans le pilote Intel Graphics Windows DCH versions antérieures à 31.0.101.3790 et 31.0.101.2114
- Intel Graphics Performance Analyzers (GPA) Framework versions antérieures à 2023.4.
- Intel Graphics Performance Analyzers (GPA) versions antérieures à 2023.4.
- Intel HPC Toolkit versions antérieures à 2024.0
- Intel Inspector versions antérieures à 2024.0
- Intel Media SDK toutes versions
- Intel Neural Compressor versions antérieures à 2.5.0
- Intel oneAPI Base Toolkit versions antérieures à 2024.0
- Intel oneAPI HPC Toolkit versions antérieures à 2024.0.1.
- Intel oneVPL versions antérieures à 23.3.5
- Intel Performance Counter Monitor (PCM) versions antérieures à 202311
- Intel Power Gadget toutes versions
- Intel Processor Diagnostic Tool versions antérieures à 4.1.9.41
- Intel Processor Identification Utility versions antérieures à 7.1.6
- Intel Processor Identification Utility-Legacy versions antérieures à 6.10.34.1129
- Intel Quartus Prime Lite, Standard et Pro Design versions antérieures à 23.1
- Intel Stratix 10 FPGA et SoC FPGA versions antérieures à 2.9.0
- Intel Trace Analyzer and Collector versions antérieures à 2022.0.0 publiées en novembre 2023
- Intel Trust Domain Extensions (TDX) module versions antérieures à TDX_1.5.05.46.698
- Intel VTune Profiler versions antérieures à 2024.0
- Logiciels Intel PROSet/Wireless WiFi et Bluetooth versions antérieures à 23.20
- Micrologiciel Intel Bios Guard sans les derniers correctifs de sécurité
- Micrologiciel Intel Bios PPAM sans les derniers correctifs de sécurité
- Micrologiciel Intel Ethernet Controller I225 Manageability versions antérieures à NVM 1.87
- Micrologiciel UEFI pour Intel Server Board S2600BP toutes versions
- Micrologiciel UEFI pour Intel Server D50DNP sans les derniers correctifs de sécurité
- Micrologiciel UEFI pour Intel Server M50FCP sans les derniers correctifs de sécurité
- Micrologiciels pour Intel Agilex 7 FPGA et SoC FPGA versions antérieures à 23.3
- Micrologiciels pour Intel Stratix 10 FPGA et SoC FPGA versions antérieures à 23.3
- Pilote Intel Thunderbolt versions antérieures à 89
- Pilote Onboard vidéo versions antérieures à 1.14 pour Intel Server Boards basés sur des puces Intel 62X
- Processeurs Intel Core Ultra, plateforme Meteor Lake sans les derniers correctifs de sécurité
- Programme de désinstallation Intel Driver & Support Assistant (DSA) versions antérieures à 23.4.39.10
Intel a indiqué qu'aucun correctif de sécurité ne sera fourni pour Intel Power Gadget et pour le micrologiciel UEFI pour Intel Server Board S2600BP. Se référer au bulletin de sécurité de l'éditeur pour l'obtention des produits affectés par les vulnérabilité CVE-2023-45733 et CVE-2024-21823 (cf. section Documentation).
| Vendor | Product | Description |
|---|
| Title | Publication Time | Tags | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [],
"affected_systems_content": "\u003cul\u003e \u003cli\u003eBiblioth\u00e8que Libva iotg-lin-gfx-libva toutes verions\u003c/li\u003e \u003cli\u003eBiblioth\u00e8que Libva versions ant\u00e9rieures \u00e0 2.20.0\u003c/li\u003e \u003cli\u003eInstallateur Endurance Gaming Mode versions ant\u00e9rieures \u00e0 1.3.937.0\u003c/li\u003e \u003cli\u003eIntel Advisor versions ant\u00e9rieures \u00e0 2024.0\u003c/li\u003e \u003cli\u003eIntel Agilex 7 FPGA et SoC FPGA versions ant\u00e9rieures \u00e0 2.9.0\u003c/li\u003e \u003cli\u003eIntel Arc \u0026amp; Iris Xe Graphics versions ant\u00e9rieures \u00e0 31.0.101.5081\u003c/li\u003e \u003cli\u003eIntel Arc Control versions ant\u00e9rieures \u00e0 1.73.5335.2\u003c/li\u003e \u003cli\u003eIntel Chipset Device Software versions ant\u00e9rieures \u00e0 10.1.19444.8378\u003c/li\u003e \u003cli\u003eIntel Code Base Investigator (CBI) versions ant\u00e9rieures \u00e0 1.1.0\u003c/li\u003e \u003cli\u003eIntel Computing Improvement Program versions ant\u00e9rieures \u00e0 2.4.10654\u003c/li\u003e \u003cli\u003eIntel Context Sensing Technology (CST) versions ant\u00e9rieures \u00e0 2.1.10300\u003c/li\u003e \u003cli\u003eIntel Data Center GPU Max Series 1100 and 1550 toutes versions\u003c/li\u003e \u003cli\u003eIntel Distribution pour GDB versions ant\u00e9rieures \u00e0 2024.0\u003c/li\u003e \u003cli\u003eIntel Dynamic Load Balancer versions ant\u00e9rieures \u00e0 8.5.0\u003c/li\u003e \u003cli\u003eIntel Dynamic Tuning Technology (DTT) sans les derniers correctifs de s\u00e9curit\u00e9\u003c/li\u003e \u003cli\u003eIntel Ethernet Adapter Complete Driver Pack versions ant\u00e9rieures \u00e0 28.3\u003c/li\u003e \u003cli\u003eIntel Ethernet Adapters versions ant\u00e9rieures \u00e0 29.0.1\u003c/li\u003e \u003cli\u003eIntel Ethernet Connections Boot Utility, Preboot Images et EFI Drivers versions ant\u00e9rieures \u00e0 28.3\u003c/li\u003e \u003cli\u003eIntel Extreme Tuning Utility (XTU) versions ant\u00e9rieures \u00e0 7.14.0.15\u003c/li\u003e \u003cli\u003eIntel Graphics Command Center Service embarqu\u00e9 dans le pilote Intel Graphics Windows DCH versions ant\u00e9rieures \u00e0 31.0.101.3790 et 31.0.101.2114\u003c/li\u003e \u003cli\u003eIntel Graphics Performance Analyzers (GPA) Framework versions ant\u00e9rieures \u00e0 2023.4.\u003c/li\u003e \u003cli\u003eIntel Graphics Performance Analyzers (GPA) versions ant\u00e9rieures \u00e0 2023.4.\u003c/li\u003e \u003cli\u003eIntel HPC Toolkit versions ant\u00e9rieures \u00e0 2024.0\u003c/li\u003e \u003cli\u003eIntel Inspector versions ant\u00e9rieures \u00e0 2024.0\u003c/li\u003e \u003cli\u003eIntel Media SDK toutes versions\u003c/li\u003e \u003cli\u003eIntel Neural Compressor versions ant\u00e9rieures \u00e0 2.5.0\u003c/li\u003e \u003cli\u003eIntel oneAPI Base Toolkit versions ant\u00e9rieures \u00e0 2024.0\u003c/li\u003e \u003cli\u003eIntel oneAPI HPC Toolkit versions ant\u00e9rieures \u00e0 2024.0.1.\u003c/li\u003e \u003cli\u003eIntel oneVPL versions ant\u00e9rieures \u00e0 23.3.5\u003c/li\u003e \u003cli\u003eIntel Performance Counter Monitor (PCM) versions ant\u00e9rieures \u00e0 202311\u003c/li\u003e \u003cli\u003eIntel Power Gadget toutes versions\u003c/li\u003e \u003cli\u003eIntel Processor Diagnostic Tool versions ant\u00e9rieures \u00e0 4.1.9.41\u003c/li\u003e \u003cli\u003eIntel Processor Identification Utility versions ant\u00e9rieures \u00e0 7.1.6\u003c/li\u003e \u003cli\u003eIntel Processor Identification Utility-Legacy versions ant\u00e9rieures \u00e0 6.10.34.1129\u003c/li\u003e \u003cli\u003eIntel Quartus Prime Lite, Standard et Pro Design versions ant\u00e9rieures \u00e0 23.1\u003c/li\u003e \u003cli\u003eIntel Stratix 10 FPGA et SoC FPGA versions ant\u00e9rieures \u00e0 2.9.0\u003c/li\u003e \u003cli\u003eIntel Trace Analyzer and Collector versions ant\u00e9rieures \u00e0 2022.0.0 publi\u00e9es en novembre 2023\u003c/li\u003e \u003cli\u003eIntel Trust Domain Extensions (TDX) module versions ant\u00e9rieures \u00e0 TDX_1.5.05.46.698\u003c/li\u003e \u003cli\u003eIntel VTune Profiler versions ant\u00e9rieures \u00e0 2024.0\u003c/li\u003e \u003cli\u003eLogiciels Intel PROSet/Wireless WiFi et Bluetooth versions ant\u00e9rieures \u00e0 23.20\u003c/li\u003e \u003cli\u003eMicrologiciel Intel Bios Guard sans les derniers correctifs de s\u00e9curit\u00e9\u003c/li\u003e \u003cli\u003eMicrologiciel Intel Bios PPAM sans les derniers correctifs de s\u00e9curit\u00e9\u003c/li\u003e \u003cli\u003eMicrologiciel Intel Ethernet Controller I225 Manageability versions ant\u00e9rieures \u00e0 NVM 1.87\u003c/li\u003e \u003cli\u003eMicrologiciel UEFI pour Intel Server Board S2600BP toutes versions\u003c/li\u003e \u003cli\u003eMicrologiciel UEFI pour Intel Server D50DNP sans les derniers correctifs de s\u00e9curit\u00e9\u003c/li\u003e \u003cli\u003eMicrologiciel UEFI pour Intel Server M50FCP sans les derniers correctifs de s\u00e9curit\u00e9\u003c/li\u003e \u003cli\u003eMicrologiciels pour Intel Agilex 7 FPGA et SoC FPGA versions ant\u00e9rieures \u00e0 23.3\u003c/li\u003e \u003cli\u003eMicrologiciels pour Intel Stratix 10 FPGA et SoC FPGA versions ant\u00e9rieures \u00e0 23.3\u003c/li\u003e \u003cli\u003ePilote Intel Thunderbolt versions ant\u00e9rieures \u00e0 89\u003c/li\u003e \u003cli\u003ePilote Onboard vid\u00e9o versions ant\u00e9rieures \u00e0 1.14 pour Intel Server Boards bas\u00e9s sur des puces Intel 62X\u003c/li\u003e \u003cli\u003eProcesseurs Intel Core Ultra, plateforme Meteor Lake sans les derniers correctifs de s\u00e9curit\u00e9\u003c/li\u003e \u003cli\u003eProgramme de d\u00e9sinstallation Intel Driver \u0026amp; Support Assistant (DSA) versions ant\u00e9rieures \u00e0 23.4.39.10\u003c/li\u003e \u003c/ul\u003e \u003cp\u003eIntel a indiqu\u00e9 qu\u0027aucun correctif de s\u00e9curit\u00e9 ne sera fourni pour Intel Power Gadget et pour le micrologiciel UEFI pour Intel Server Board S2600BP. Se r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des produits affect\u00e9s par les vuln\u00e9rabilit\u00e9 CVE-2023-45733 et CVE-2024-21823 (cf. section Documentation).\u003c/p\u003e ",
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2024-22379",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-22379"
},
{
"name": "CVE-2023-35192",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-35192"
},
{
"name": "CVE-2024-24971",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24971"
},
{
"name": "CVE-2024-21864",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21864"
},
{
"name": "CVE-2023-46103",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-46103"
},
{
"name": "CVE-2023-47859",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-47859"
},
{
"name": "CVE-2024-21862",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21862"
},
{
"name": "CVE-2021-33146",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33146"
},
{
"name": "CVE-2023-48368",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-48368"
},
{
"name": "CVE-2023-46689",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-46689"
},
{
"name": "CVE-2023-45845",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45845"
},
{
"name": "CVE-2024-21823",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21823"
},
{
"name": "CVE-2024-21818",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21818"
},
{
"name": "CVE-2021-33161",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33161"
},
{
"name": "CVE-2023-45846",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45846"
},
{
"name": "CVE-2024-21861",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21861"
},
{
"name": "CVE-2021-33157",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33157"
},
{
"name": "CVE-2023-42433",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-42433"
},
{
"name": "CVE-2021-33162",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33162"
},
{
"name": "CVE-2021-33158",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33158"
},
{
"name": "CVE-2023-38581",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38581"
},
{
"name": "CVE-2022-37341",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-37341"
},
{
"name": "CVE-2024-23487",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-23487"
},
{
"name": "CVE-2023-41082",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-41082"
},
{
"name": "CVE-2023-43629",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-43629"
},
{
"name": "CVE-2024-22382",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-22382"
},
{
"name": "CVE-2023-43745",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-43745"
},
{
"name": "CVE-2021-33141",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33141"
},
{
"name": "CVE-2023-28383",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28383"
},
{
"name": "CVE-2023-45736",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45736"
},
{
"name": "CVE-2024-21835",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21835"
},
{
"name": "CVE-2023-22662",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22662"
},
{
"name": "CVE-2024-21813",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21813"
},
{
"name": "CVE-2024-21831",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21831"
},
{
"name": "CVE-2023-41234",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-41234"
},
{
"name": "CVE-2023-45743",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45743"
},
{
"name": "CVE-2023-39433",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39433"
},
{
"name": "CVE-2023-43751",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-43751"
},
{
"name": "CVE-2023-45315",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45315"
},
{
"name": "CVE-2023-42668",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-42668"
},
{
"name": "CVE-2024-21828",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21828"
},
{
"name": "CVE-2023-47282",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-47282"
},
{
"name": "CVE-2023-38417",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38417"
},
{
"name": "CVE-2023-40070",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40070"
},
{
"name": "CVE-2023-39929",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39929"
},
{
"name": "CVE-2024-22476",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-22476"
},
{
"name": "CVE-2023-40155",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40155"
},
{
"name": "CVE-2024-21774",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21774"
},
{
"name": "CVE-2024-21772",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21772"
},
{
"name": "CVE-2024-21814",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21814"
},
{
"name": "CVE-2023-45320",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45320"
},
{
"name": "CVE-2022-37410",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-37410"
},
{
"name": "CVE-2023-29165",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29165"
},
{
"name": "CVE-2023-47169",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-47169"
},
{
"name": "CVE-2023-27504",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27504"
},
{
"name": "CVE-2023-48727",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-48727"
},
{
"name": "CVE-2021-33142",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33142"
},
{
"name": "CVE-2023-38420",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38420"
},
{
"name": "CVE-2024-22015",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-22015"
},
{
"name": "CVE-2023-45221",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45221"
},
{
"name": "CVE-2023-47855",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-47855"
},
{
"name": "CVE-2023-45217",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45217"
},
{
"name": "CVE-2024-22390",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-22390"
},
{
"name": "CVE-2024-21792",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21792"
},
{
"name": "CVE-2024-21837",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21837"
},
{
"name": "CVE-2023-38654",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38654"
},
{
"name": "CVE-2023-41092",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-41092"
},
{
"name": "CVE-2023-27305",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27305"
},
{
"name": "CVE-2023-49614",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-49614"
},
{
"name": "CVE-2024-22384",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-22384"
},
{
"name": "CVE-2023-40536",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40536"
},
{
"name": "CVE-2023-42773",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-42773"
},
{
"name": "CVE-2023-24460",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24460"
},
{
"name": "CVE-2024-23980",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-23980"
},
{
"name": "CVE-2023-47165",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-47165"
},
{
"name": "CVE-2023-41961",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-41961"
},
{
"name": "CVE-2023-43487",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-43487"
},
{
"name": "CVE-2023-22656",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22656"
},
{
"name": "CVE-2024-24981",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24981"
},
{
"name": "CVE-2024-21777",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21777"
},
{
"name": "CVE-2023-45745",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45745"
},
{
"name": "CVE-2024-21809",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21809"
},
{
"name": "CVE-2023-47210",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-47210"
},
{
"name": "CVE-2023-28402",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28402"
},
{
"name": "CVE-2024-21843",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21843"
},
{
"name": "CVE-2023-40071",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40071"
},
{
"name": "CVE-2023-25952",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-25952"
},
{
"name": "CVE-2023-46691",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-46691"
},
{
"name": "CVE-2023-45733",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45733"
},
{
"name": "CVE-2024-21841",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21841"
},
{
"name": "CVE-2023-43748",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-43748"
},
{
"name": "CVE-2024-21788",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21788"
},
{
"name": "CVE-2024-22095",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-22095"
},
{
"name": "CVE-2022-42879",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42879"
},
{
"name": "CVE-2021-33145",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33145"
}
],
"links": [],
"reference": "CERTFR-2024-AVI-0397",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2024-05-15T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits Intel.\nCertaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une\n\u00e9l\u00e9vation de privil\u00e8ges, un d\u00e9ni de service \u00e0 distance et une atteinte \u00e0\nla confidentialit\u00e9 des donn\u00e9es.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Intel",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01012 du 14 mai 2024",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01012.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01035 du 14 mai 2024",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01035.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-00983 du 14 mai 2024",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00983.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01036 du 14 mai 2024",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01036.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01037 du 14 mai 2024",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01037.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01034 du 14 mai 2024",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01034.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01067 du 14 mai 2024",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01067.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01042 du 14 mai 2024",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01042.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-00984 du 14 mai 2024",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00984.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01032 du 14 mai 2024",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01032.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-00756 du 14 mai 2024",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00756.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01020 du 14 mai 2024",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01020.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01021 du 14 mai 2024",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01021.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01054 du 14 mai 2024",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01054.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01051 du 14 mai 2024",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01051.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01066 du 14 mai 2024",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01066.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01056 du 14 mai 2024",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01056.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01039 du 14 mai 2024",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01039.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01007 du 14 mai 2024",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01007.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-00814 du 14 mai 2024",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00814.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01047 du 14 mai 2024",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01047.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01052 du 14 mai 2024",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01052.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01055 du 14 mai 2024",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01055.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01031 du 14 mai 2024",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01031.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-00996 du 14 mai 2024",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00996.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01013 du 14 mai 2024",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01013.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01059 du 14 mai 2024",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01059.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-00916 du 14 mai 2024",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00916.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01080 du 14 mai 2024",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01080.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01053 du 14 mai 2024",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01053.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-00935 du 14 mai 2024",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00935.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-00962 du 14 mai 2024",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00962.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-00965 du 14 mai 2024",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00965.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01041 du 14 mai 2024",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01041.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-00937 du 14 mai 2024",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00937.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01084 du 14 mai 2024",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01084.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01043 du 14 mai 2024",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01043.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01109 du 14 mai 2024",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01109.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01069 du 14 mai 2024",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01069.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-00831 du 14 mai 2024",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00831.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01050 du 14 mai 2024",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01050.html"
}
]
}
WID-SEC-W-2024-1135
Vulnerability from csaf_certbund - Published: 2024-05-14 22:00 - Updated: 2024-05-14 22:00Notes
{
"document": {
"aggregate_severity": {
"text": "mittel"
},
"category": "csaf_base",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "de-DE",
"notes": [
{
"category": "legal_disclaimer",
"text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen."
},
{
"category": "description",
"text": "Die Firmware ist eine in die Ger\u00e4te fest eingebettete Software, die dort grundlegende Funktionen leistet.",
"title": "Produktbeschreibung"
},
{
"category": "summary",
"text": "Ein lokaler Angreifer kann mehrere Schwachstellen in der Intel Firmware verschiedener Server-Produkte ausnutzen, um seine Privilegien zu erh\u00f6hen oder einen Denial-of-Service-Zustand zu verursachen.",
"title": "Angriff"
},
{
"category": "general",
"text": "- BIOS/Firmware",
"title": "Betroffene Betriebssysteme"
}
],
"publisher": {
"category": "other",
"contact_details": "csaf-provider@cert-bund.de",
"name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"namespace": "https://www.bsi.bund.de"
},
"references": [
{
"category": "self",
"summary": "WID-SEC-W-2024-1135 - CSAF Version",
"url": "https://wid.cert-bund.de/.well-known/csaf/white/2024/wid-sec-w-2024-1135.json"
},
{
"category": "self",
"summary": "WID-SEC-2024-1135 - Portal Version",
"url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2024-1135"
},
{
"category": "external",
"summary": "Intel Security Advisory INTEL-SA-01080 vom 2024-05-14",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01080.html"
}
],
"source_lang": "en-US",
"title": "Intel Server Products UEFI Firmware: Mehrere Schwachstellen",
"tracking": {
"current_release_date": "2024-05-14T22:00:00.000+00:00",
"generator": {
"date": "2024-08-15T18:08:57.929+00:00",
"engine": {
"name": "BSI-WID",
"version": "1.3.5"
}
},
"id": "WID-SEC-W-2024-1135",
"initial_release_date": "2024-05-14T22:00:00.000+00:00",
"revision_history": [
{
"date": "2024-05-14T22:00:00.000+00:00",
"number": "1",
"summary": "Initiale Fassung"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "Server D50DNP UEFI",
"product": {
"name": "Intel Firmware Server D50DNP UEFI",
"product_id": "T034780",
"product_identification_helper": {
"cpe": "cpe:/a:intel:firmware:server_d50dnp_uefi"
}
}
},
{
"category": "product_version",
"name": "Server M50FCP UEFI",
"product": {
"name": "Intel Firmware Server M50FCP UEFI",
"product_id": "T034781",
"product_identification_helper": {
"cpe": "cpe:/a:intel:firmware:server_m50fcp_uefi"
}
}
},
{
"category": "product_version",
"name": "Server Board S2600BP",
"product": {
"name": "Intel Firmware Server Board S2600BP",
"product_id": "T034782",
"product_identification_helper": {
"cpe": "cpe:/a:intel:firmware:server_board_s2600bp"
}
}
}
],
"category": "product_name",
"name": "Firmware"
}
],
"category": "vendor",
"name": "Intel"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2023-22662",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in der UEFI-Firmware mehrerer Intel Server-Produkte. Diese bestehen aufgrund einer unsachgem\u00e4\u00dfen Eingabevalidierung. Ein lokaler Angreifer mit bestimmten Privilegien kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern oder einen Denial-of-Service-Zustand zu verursachen. Einige dieser Schwachstellen erfordern eine Benutzerinteraktion, um erfolgreich ausgenutzt zu werden."
}
],
"product_status": {
"known_affected": [
"T034781",
"T034780",
"T034782"
]
},
"release_date": "2024-05-14T22:00:00.000+00:00",
"title": "CVE-2023-22662"
},
{
"cve": "CVE-2024-22095",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in der UEFI-Firmware mehrerer Intel Server-Produkte. Diese bestehen aufgrund einer unsachgem\u00e4\u00dfen Eingabevalidierung. Ein lokaler Angreifer mit bestimmten Privilegien kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern oder einen Denial-of-Service-Zustand zu verursachen. Einige dieser Schwachstellen erfordern eine Benutzerinteraktion, um erfolgreich ausgenutzt zu werden."
}
],
"product_status": {
"known_affected": [
"T034781",
"T034780",
"T034782"
]
},
"release_date": "2024-05-14T22:00:00.000+00:00",
"title": "CVE-2024-22095"
},
{
"cve": "CVE-2024-22382",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in der UEFI-Firmware mehrerer Intel Server-Produkte. Diese bestehen aufgrund einer unsachgem\u00e4\u00dfen Eingabevalidierung. Ein lokaler Angreifer mit bestimmten Privilegien kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern oder einen Denial-of-Service-Zustand zu verursachen. Einige dieser Schwachstellen erfordern eine Benutzerinteraktion, um erfolgreich ausgenutzt zu werden."
}
],
"product_status": {
"known_affected": [
"T034781",
"T034780",
"T034782"
]
},
"release_date": "2024-05-14T22:00:00.000+00:00",
"title": "CVE-2024-22382"
},
{
"cve": "CVE-2024-23487",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in der UEFI-Firmware mehrerer Intel Server-Produkte. Diese bestehen aufgrund einer unsachgem\u00e4\u00dfen Eingabevalidierung. Ein lokaler Angreifer mit bestimmten Privilegien kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern oder einen Denial-of-Service-Zustand zu verursachen. Einige dieser Schwachstellen erfordern eine Benutzerinteraktion, um erfolgreich ausgenutzt zu werden."
}
],
"product_status": {
"known_affected": [
"T034781",
"T034780",
"T034782"
]
},
"release_date": "2024-05-14T22:00:00.000+00:00",
"title": "CVE-2024-23487"
},
{
"cve": "CVE-2024-23980",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in der UEFI-Firmware mehrerer Intel Server-Produkte. Diese bestehen aufgrund einer unsachgem\u00e4\u00dfen Eingabevalidierung. Ein lokaler Angreifer mit bestimmten Privilegien kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern oder einen Denial-of-Service-Zustand zu verursachen. Einige dieser Schwachstellen erfordern eine Benutzerinteraktion, um erfolgreich ausgenutzt zu werden."
}
],
"product_status": {
"known_affected": [
"T034781",
"T034780",
"T034782"
]
},
"release_date": "2024-05-14T22:00:00.000+00:00",
"title": "CVE-2024-23980"
},
{
"cve": "CVE-2024-24981",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in der UEFI-Firmware mehrerer Intel Server-Produkte. Diese bestehen aufgrund einer unsachgem\u00e4\u00dfen Eingabevalidierung. Ein lokaler Angreifer mit bestimmten Privilegien kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern oder einen Denial-of-Service-Zustand zu verursachen. Einige dieser Schwachstellen erfordern eine Benutzerinteraktion, um erfolgreich ausgenutzt zu werden."
}
],
"product_status": {
"known_affected": [
"T034781",
"T034780",
"T034782"
]
},
"release_date": "2024-05-14T22:00:00.000+00:00",
"title": "CVE-2024-24981"
}
]
}
GHSA-W6Q8-GFMF-9PCF
Vulnerability from github – Published: 2024-05-16 21:31 – Updated: 2024-05-16 21:31Improper input validation of EpsdSrMgmtConfig in UEFI firmware for some Intel(R) Server Board S2600BP products may allow a privileged user to potentially enable denial of service via local access.
{
"affected": [],
"aliases": [
"CVE-2023-22662"
],
"database_specific": {
"cwe_ids": [
"CWE-20"
],
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2024-05-16T21:15:50Z",
"severity": "MODERATE"
},
"details": "Improper input validation of EpsdSrMgmtConfig in UEFI firmware for some Intel(R) Server Board S2600BP products may allow a privileged user to potentially enable denial of service via local access.",
"id": "GHSA-w6q8-gfmf-9pcf",
"modified": "2024-05-16T21:31:58Z",
"published": "2024-05-16T21:31:58Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-22662"
},
{
"type": "WEB",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01080.html"
}
],
"schema_version": "1.4.0",
"severity": [
{
"score": "CVSS:3.1/AV:L/AC:H/PR:H/UI:R/S:C/C:N/I:L/A:H",
"type": "CVSS_V3"
}
]
}
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.