Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2022-21198 (GCVE-0-2022-21198)
Vulnerability from cvelistv5
Published
2022-11-11 15:49
Modified
2025-02-04 17:58
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- escalation of privilege
Summary
Time-of-check time-of-use race condition in the BIOS firmware for some Intel(R) Processors may allow a privileged user to potentially enable escalation of privilege via local access.
References
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| n/a | Intel(R) Processors |
Version: See references |
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-03T02:31:59.787Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00688.html",
"tags": [
"x_transferred"
],
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00688.html"
}
],
"title": "CVE Program Container"
},
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2022-21198",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-01-29T20:38:21.227981Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-367",
"description": "CWE-367 Time-of-check Time-of-use (TOCTOU) Race Condition",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-02-04T17:58:34.848Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"product": "Intel(R) Processors",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "See references"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "Time-of-check time-of-use race condition in the BIOS firmware for some Intel(R) Processors may allow a privileged user to potentially enable escalation of privilege via local access."
}
],
"metrics": [
{
"cvssV3_1": {
"baseScore": 7.9,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:H/A:H",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "escalation of privilege",
"lang": "en"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2022-11-14T17:46:28.257Z",
"orgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
"shortName": "intel"
},
"references": [
{
"name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00688.html",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00688.html"
}
]
}
},
"cveMetadata": {
"assignerOrgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
"assignerShortName": "intel",
"cveId": "CVE-2022-21198",
"datePublished": "2022-11-11T15:49:10.831Z",
"dateReserved": "2022-02-18T21:23:59.775Z",
"dateUpdated": "2025-02-04T17:58:34.848Z",
"requesterUserId": "524a9a6b-3515-4b97-ab85-1a9a79493852",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"vulnrichment": {
"containers": "{\"adp\": [{\"title\": \"CVE Program Container\", \"references\": [{\"url\": \"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00688.html\", \"name\": \"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00688.html\", \"tags\": [\"x_transferred\"]}], \"providerMetadata\": {\"orgId\": \"af854a3a-2127-422b-91ae-364da2661108\", \"shortName\": \"CVE\", \"dateUpdated\": \"2024-08-03T02:31:59.787Z\"}}, {\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2022-21198\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"partial\"}], \"version\": \"2.0.3\", \"timestamp\": \"2025-01-29T20:38:21.227981Z\"}}}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-367\", \"description\": \"CWE-367 Time-of-check Time-of-use (TOCTOU) Race Condition\"}]}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2025-01-29T20:38:22.520Z\"}}], \"cna\": {\"metrics\": [{\"format\": \"CVSS\", \"cvssV3_1\": {\"version\": \"3.1\", \"baseScore\": 7.9, \"baseSeverity\": \"HIGH\", \"vectorString\": \"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:H/A:H\"}, \"scenarios\": [{\"lang\": \"en\", \"value\": \"GENERAL\"}]}], \"affected\": [{\"vendor\": \"n/a\", \"product\": \"Intel(R) Processors\", \"versions\": [{\"status\": \"affected\", \"version\": \"See references\"}], \"defaultStatus\": \"unaffected\"}], \"references\": [{\"url\": \"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00688.html\", \"name\": \"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00688.html\"}], \"descriptions\": [{\"lang\": \"en\", \"value\": \"Time-of-check time-of-use race condition in the BIOS firmware for some Intel(R) Processors may allow a privileged user to potentially enable escalation of privilege via local access.\"}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"description\": \"escalation of privilege\"}]}], \"providerMetadata\": {\"orgId\": \"6dda929c-bb53-4a77-a76d-48e79601a1ce\", \"shortName\": \"intel\", \"dateUpdated\": \"2022-11-14T17:46:28.257Z\"}}}",
"cveMetadata": "{\"cveId\": \"CVE-2022-21198\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2025-02-04T17:58:34.848Z\", \"dateReserved\": \"2022-02-18T21:23:59.775Z\", \"assignerOrgId\": \"6dda929c-bb53-4a77-a76d-48e79601a1ce\", \"datePublished\": \"2022-11-11T15:49:10.831Z\", \"requesterUserId\": \"524a9a6b-3515-4b97-ab85-1a9a79493852\", \"assignerShortName\": \"intel\"}",
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
}
}
CERTFR-2023-AVI-0121
Vulnerability from certfr_avis
De multiples vulnérabilités ont été corrigées dans les produits Siemens. Elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, un déni de service à distance et un contournement de la politique de sécurité.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
NoneImpacted products
| Vendor | Product | Description | ||
|---|---|---|---|---|
| Siemens | N/A | JT Utilities versions antérieures à V13.2.3.0 | ||
| Siemens | N/A | Parasolid V35.0 versions antérieures à V35.0.170 | ||
| Siemens | N/A | TIA Project-Server versions antérieures à V1.1 | ||
| Siemens | N/A | COMOS V10.3.3.4 versions antérieures à V10.3.3.4.6 | ||
| Siemens | N/A | SCALANCE X204IRT (6GK5204-0BA00-2BA3) versions antérieures à V5.5.0 | ||
| Siemens | N/A | Parasolid V34.1 versions antérieures à V34.1.242 | ||
| Siemens | N/A | TIA Multiuser Server V16 toutes les versions | ||
| Siemens | N/A | COMOS V10.2 toutes les versions | ||
| Siemens | N/A | Simcenter Femap versions antérieures à V2023.1 | ||
| Siemens | N/A | Applications utilisant Mendix versions 9 (V9.12) antérieures à V9.12.10 | ||
| Siemens | N/A | Parasolid V35.1 versions antérieures à V35.1.150 | ||
| Siemens | N/A | COMOS V10.3.3.3 versions antérieures à V10.3.3.3.9 | ||
| Siemens | N/A | SCALANCE XF204IRT (6GK5204-0BA00-2BF2) versions antérieures à V5.5.0 | ||
| Siemens | N/A | Brownfield Connectivity - Client versions antérieures à V2.15 | ||
| Siemens | N/A | COMOS V10.4.2.0 versions antérieures à V10.4.2.0.25 | ||
| Siemens | N/A | TIA Multiuser Server V14 toutes les versions | ||
| Siemens | N/A | COMOS V10.3.3.1 versions antérieures à V10.3.3.1.45 | ||
| Siemens | N/A | Parasolid V34.0 versions antérieures à V34.0.254 | ||
| Siemens | N/A | SiPass integrated AC5102 (ACC-G2) versions antérieures à V2.85.44 | ||
| Siemens | N/A | Solid Edge SE2023 versions antérieures à V2023Update2 | ||
| Siemens | N/A | SiPass integrated ACC-AP versions antérieures à V2.85.43 | ||
| Siemens | N/A | SCALANCE XF204-2BA IRT (6GK5204-2AA00-2BD2) versions antérieures à V5.5.0 | ||
| Siemens | N/A | COMOS V10.4.0.0 versions antérieures à V10.4.0.0.31 | ||
| Siemens | N/A | Applications utilisant Mendix versions 7 antérieures à V7.23.34 | ||
| Siemens | N/A | Applications utilisant Mendix versions 9 (V9.18) antérieures à V9.18.4 | ||
| Siemens | N/A | SCALANCE X202-2P IRT PRO (6GK5202-2JR00-2BA6) versions antérieures à V5.5.0 | ||
| Siemens | N/A | SCALANCE X204IRT PRO (6GK5204-0JA00-2BA6) versions antérieures à V5.5.0 | ||
| Siemens | N/A | SIPLUS NET SCALANCE X202-2P IRT (6AG1202-2BH00-2BA3) versions antérieures à V5.5.0 | ||
| Siemens | N/A | SCALANCE XF201-3P IRT (6GK5201-3BH00-2BD2) versions antérieures à V5.5.0 | ||
| Siemens | N/A | TIA Multiuser Server V15 versions antérieures à V15.1 Update 8 | ||
| Siemens | N/A | SCALANCE X201-3P IRT PRO (6GK5201-3JR00-2BA6) versions antérieures à V5.5.0 | ||
| Siemens | N/A | SCALANCE X202-2IRT (6GK5202-2BB00-2BA3) versions antérieures à V5.5.0 | ||
| Siemens | N/A | Applications utilisant Mendix versions 8 antérieures à V8.18.23 | ||
| Siemens | N/A | Famille de produits SIMATIC Field PG, SIMATIC IPC et SIMATIC ITP toutes les versions | ||
| Siemens | N/A | SCALANCE X200-4P IRT (6GK5200-4AH00-2BA3) versions antérieures à V5.5.0 | ||
| Siemens | N/A | Brownfield Connectivity - Gateway versions antérieures à V1.11 | ||
| Siemens | N/A | SCALANCE X201-3P IRT (6GK5201-3BH00-2BA3) versions antérieures à V5.5.0 | ||
| Siemens | N/A | TIA Multiuser Server V17 toutes les versions | ||
| Siemens | N/A | Famille de produits RUGGEDCOM APE1808 toutes les versions | ||
| Siemens | N/A | SCALANCE X202-2P IRT (6GK5202-2BH00-2BA3) versions antérieures à V5.5.0 | ||
| Siemens | N/A | Applications utilisant Mendix versions 9 (V9.6) antérieures à V9.6.15 | ||
| Siemens | N/A | COMOS V10.4.1.0 versions antérieures à V10.4.1.0.32 | ||
| Siemens | N/A | SCALANCE XF202-2P IRT (6GK5202-2BH00-2BD2) versions antérieures à V5.5.0 | ||
| Siemens | N/A | COMOS V10.3.3.2 versions antérieures à V10.3.3.2.33 | ||
| Siemens | N/A | Tecnomatix Plant Simulation versions antérieures à V2201.0006 | ||
| Siemens | N/A | JT Open versions antérieures à V11.2.3.0 | ||
| Siemens | N/A | Applications utilisant Mendix versions 9 antérieures à V9.22.0 |
References
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "JT Utilities versions ant\u00e9rieures \u00e0 V13.2.3.0",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "Parasolid V35.0 versions ant\u00e9rieures \u00e0 V35.0.170",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "TIA Project-Server versions ant\u00e9rieures \u00e0 V1.1",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "COMOS V10.3.3.4 versions ant\u00e9rieures \u00e0 V10.3.3.4.6",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE X204IRT (6GK5204-0BA00-2BA3) versions ant\u00e9rieures \u00e0 V5.5.0",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "Parasolid V34.1 versions ant\u00e9rieures \u00e0 V34.1.242",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "TIA Multiuser Server V16 toutes les versions",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "COMOS V10.2 toutes les versions",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "Simcenter Femap versions ant\u00e9rieures \u00e0 V2023.1",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "Applications utilisant Mendix versions 9 (V9.12) ant\u00e9rieures \u00e0 V9.12.10",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "Parasolid V35.1 versions ant\u00e9rieures \u00e0 V35.1.150",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "COMOS V10.3.3.3 versions ant\u00e9rieures \u00e0 V10.3.3.3.9",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE XF204IRT (6GK5204-0BA00-2BF2) versions ant\u00e9rieures \u00e0 V5.5.0",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "Brownfield Connectivity - Client versions ant\u00e9rieures \u00e0 V2.15",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "COMOS V10.4.2.0 versions ant\u00e9rieures \u00e0 V10.4.2.0.25",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "TIA Multiuser Server V14 toutes les versions",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "COMOS V10.3.3.1 versions ant\u00e9rieures \u00e0 V10.3.3.1.45",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "Parasolid V34.0 versions ant\u00e9rieures \u00e0 V34.0.254",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SiPass integrated AC5102 (ACC-G2) versions ant\u00e9rieures \u00e0 V2.85.44",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "Solid Edge SE2023 versions ant\u00e9rieures \u00e0 V2023Update2",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SiPass integrated ACC-AP versions ant\u00e9rieures \u00e0 V2.85.43",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE XF204-2BA IRT (6GK5204-2AA00-2BD2) versions ant\u00e9rieures \u00e0 V5.5.0",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "COMOS V10.4.0.0 versions ant\u00e9rieures \u00e0 V10.4.0.0.31",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "Applications utilisant Mendix versions 7 ant\u00e9rieures \u00e0 V7.23.34",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "Applications utilisant Mendix versions 9 (V9.18) ant\u00e9rieures \u00e0 V9.18.4",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE X202-2P IRT PRO (6GK5202-2JR00-2BA6) versions ant\u00e9rieures \u00e0 V5.5.0",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE X204IRT PRO (6GK5204-0JA00-2BA6) versions ant\u00e9rieures \u00e0 V5.5.0",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIPLUS NET SCALANCE X202-2P IRT (6AG1202-2BH00-2BA3) versions ant\u00e9rieures \u00e0 V5.5.0",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE XF201-3P IRT (6GK5201-3BH00-2BD2) versions ant\u00e9rieures \u00e0 V5.5.0",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "TIA Multiuser Server V15 versions ant\u00e9rieures \u00e0 V15.1 Update 8",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE X201-3P IRT PRO (6GK5201-3JR00-2BA6) versions ant\u00e9rieures \u00e0 V5.5.0",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE X202-2IRT (6GK5202-2BB00-2BA3) versions ant\u00e9rieures \u00e0 V5.5.0",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "Applications utilisant Mendix versions 8 ant\u00e9rieures \u00e0 V8.18.23",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "Famille de produits SIMATIC Field PG, SIMATIC IPC et SIMATIC ITP toutes les versions",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE X200-4P IRT (6GK5200-4AH00-2BA3) versions ant\u00e9rieures \u00e0 V5.5.0",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "Brownfield Connectivity - Gateway versions ant\u00e9rieures \u00e0 V1.11",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE X201-3P IRT (6GK5201-3BH00-2BA3) versions ant\u00e9rieures \u00e0 V5.5.0",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "TIA Multiuser Server V17 toutes les versions",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "Famille de produits RUGGEDCOM APE1808 toutes les versions",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE X202-2P IRT (6GK5202-2BH00-2BA3) versions ant\u00e9rieures \u00e0 V5.5.0",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "Applications utilisant Mendix versions 9 (V9.6) ant\u00e9rieures \u00e0 V9.6.15",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "COMOS V10.4.1.0 versions ant\u00e9rieures \u00e0 V10.4.1.0.32",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE XF202-2P IRT (6GK5202-2BH00-2BD2) versions ant\u00e9rieures \u00e0 V5.5.0",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "COMOS V10.3.3.2 versions ant\u00e9rieures \u00e0 V10.3.3.2.33",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "Tecnomatix Plant Simulation versions ant\u00e9rieures \u00e0 V2201.0006",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "JT Open versions ant\u00e9rieures \u00e0 V11.2.3.0",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "Applications utilisant Mendix versions 9 ant\u00e9rieures \u00e0 V9.22.0",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2023-24556",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24556"
},
{
"name": "CVE-2022-1343",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1343"
},
{
"name": "CVE-2022-1473",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1473"
},
{
"name": "CVE-2023-24990",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24990"
},
{
"name": "CVE-2022-39157",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-39157"
},
{
"name": "CVE-2022-46345",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-46345"
},
{
"name": "CVE-2023-22669",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22669"
},
{
"name": "CVE-2023-24549",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24549"
},
{
"name": "CVE-2023-24560",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24560"
},
{
"name": "CVE-2022-31808",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-31808"
},
{
"name": "CVE-2022-46347",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-46347"
},
{
"name": "CVE-2022-27536",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27536"
},
{
"name": "CVE-2022-46349",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-46349"
},
{
"name": "CVE-2022-24921",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-24921"
},
{
"name": "CVE-2022-28327",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28327"
},
{
"name": "CVE-2022-1292",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1292"
},
{
"name": "CVE-2023-24552",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24552"
},
{
"name": "CVE-2021-43391",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-43391"
},
{
"name": "CVE-2023-24980",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24980"
},
{
"name": "CVE-2021-32936",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-32936"
},
{
"name": "CVE-2022-33984",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-33984"
},
{
"name": "CVE-2023-24551",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24551"
},
{
"name": "CVE-2022-46346",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-46346"
},
{
"name": "CVE-2023-24992",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24992"
},
{
"name": "CVE-2022-21198",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21198"
},
{
"name": "CVE-2007-5846",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-5846"
},
{
"name": "CVE-2022-33906",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-33906"
},
{
"name": "CVE-2023-24562",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24562"
},
{
"name": "CVE-2023-24482",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24482"
},
{
"name": "CVE-2023-24994",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24994"
},
{
"name": "CVE-2021-41771",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-41771"
},
{
"name": "CVE-2022-43397",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43397"
},
{
"name": "CVE-2023-24561",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24561"
},
{
"name": "CVE-2023-24995",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24995"
},
{
"name": "CVE-2022-30774",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30774"
},
{
"name": "CVE-2023-24553",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24553"
},
{
"name": "CVE-2023-24984",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24984"
},
{
"name": "CVE-2021-32938",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-32938"
},
{
"name": "CVE-2023-24993",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24993"
},
{
"name": "CVE-2023-24558",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24558"
},
{
"name": "CVE-2022-46348",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-46348"
},
{
"name": "CVE-2023-22295",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22295"
},
{
"name": "CVE-2021-32948",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-32948"
},
{
"name": "CVE-2022-33982",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-33982"
},
{
"name": "CVE-2023-22846",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22846"
},
{
"name": "CVE-2023-24983",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24983"
},
{
"name": "CVE-2022-47936",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-47936"
},
{
"name": "CVE-2022-47977",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-47977"
},
{
"name": "CVE-2023-24550",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24550"
},
{
"name": "CVE-2023-24565",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24565"
},
{
"name": "CVE-2023-25140",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-25140"
},
{
"name": "CVE-2023-24988",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24988"
},
{
"name": "CVE-2022-35868",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-35868"
},
{
"name": "CVE-2023-24554",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24554"
},
{
"name": "CVE-2022-33907",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-33907"
},
{
"name": "CVE-2021-43336",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-43336"
},
{
"name": "CVE-2023-24581",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24581"
},
{
"name": "CVE-2023-22321",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22321"
},
{
"name": "CVE-2022-24675",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-24675"
},
{
"name": "CVE-2023-24557",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24557"
},
{
"name": "CVE-2023-24566",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24566"
},
{
"name": "CVE-2023-24978",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24978"
},
{
"name": "CVE-2023-24555",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24555"
},
{
"name": "CVE-2023-24979",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24979"
},
{
"name": "CVE-2023-22354",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22354"
},
{
"name": "CVE-2021-41772",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-41772"
},
{
"name": "CVE-2023-24987",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24987"
},
{
"name": "CVE-2023-24986",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24986"
},
{
"name": "CVE-2021-44716",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-44716"
},
{
"name": "CVE-2023-23579",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23579"
},
{
"name": "CVE-2023-24564",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24564"
},
{
"name": "CVE-2023-24982",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24982"
},
{
"name": "CVE-2023-24996",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24996"
},
{
"name": "CVE-2022-31243",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-31243"
},
{
"name": "CVE-2023-24563",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24563"
},
{
"name": "CVE-2023-24985",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24985"
},
{
"name": "CVE-2023-24991",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24991"
},
{
"name": "CVE-2023-24981",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24981"
},
{
"name": "CVE-2021-44717",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-44717"
},
{
"name": "CVE-2022-1434",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1434"
},
{
"name": "CVE-2022-33908",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-33908"
},
{
"name": "CVE-2023-23835",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23835"
},
{
"name": "CVE-2023-24559",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24559"
},
{
"name": "CVE-2023-24989",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24989"
},
{
"name": "CVE-2023-22670",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22670"
}
],
"initial_release_date": "2023-02-14T00:00:00",
"last_revision_date": "2023-02-14T00:00:00",
"links": [
{
"title": "Bulletin de s\u00e9curit\u00e9 [SCADA] Siemens du 14 f\u00e9vrier 2023",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-836777.pdf"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 [SCADA] Siemens du 14 f\u00e9vrier 2023",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-953464.pdf"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 [SCADA] Siemens du 14 f\u00e9vrier 2023",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-617755.pdf"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 [SCADA] Siemens du 14 f\u00e9vrier 2023",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-658793.pdf"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 [SCADA] Siemens du 14 f\u00e9vrier 2023",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-686975.pdf"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 [SCADA] Siemens du 14 f\u00e9vrier 2023",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-491245.pdf"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 [SCADA] Siemens du 14 f\u00e9vrier 2023",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-744259.pdf"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 [SCADA] Siemens du 14 f\u00e9vrier 2023",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-693110.pdf"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 [SCADA] Siemens du 14 f\u00e9vrier 2023",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-565356.pdf"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 [SCADA] Siemens du 14 f\u00e9vrier 2023",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-640968.pdf"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 [SCADA] Siemens du 14 f\u00e9vrier 2023",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-847261.pdf"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 [SCADA] Siemens du 14 f\u00e9vrier 2023",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-450613.pdf"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 [SCADA] Siemens du 14 f\u00e9vrier 2023",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-252808.pdf"
}
],
"reference": "CERTFR-2023-AVI-0121",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2023-02-14T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 corrig\u00e9es dans \u003cspan\nclass=\"textit\"\u003eles produits Siemens\u003c/span\u003e. Elles permettent \u00e0 un\nattaquant de provoquer une ex\u00e9cution de code arbitraire \u00e0 distance, un\nd\u00e9ni de service \u00e0 distance et un contournement de la politique de\ns\u00e9curit\u00e9.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Siemens",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 [SCADA] Siemens SSA-847261 du 14 f\u00e9vrier 2023",
"url": null
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 [SCADA] Siemens SSA-693110 du 14 f\u00e9vrier 2023",
"url": null
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 [SCADA] Siemens SSA-953464 du 14 f\u00e9vrier 2023",
"url": null
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 [SCADA] Siemens SSA-744259 du 14 f\u00e9vrier 2023",
"url": null
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 [SCADA] Siemens SSA-617755 du 14 f\u00e9vrier 2023",
"url": null
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 [SCADA] Siemens SSA-658793 du 14 f\u00e9vrier 2023",
"url": null
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 [SCADA] Siemens SSA-450613 du 14 f\u00e9vrier 2023",
"url": null
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 [SCADA] Siemens SSA-491245 du 14 f\u00e9vrier 2023",
"url": null
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 [SCADA] Siemens SSA-686975 du 14 f\u00e9vrier 2023",
"url": null
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 [SCADA] Siemens SSA-836777 du 14 f\u00e9vrier 2023",
"url": null
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 [SCADA] Siemens SSA-565356 du 14 f\u00e9vrier 2023",
"url": null
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 [SCADA] Siemens SSA-252808 du 14 f\u00e9vrier 2023",
"url": null
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 [SCADA] Siemens SSA-640968 du 14 f\u00e9vrier 2023",
"url": null
}
]
}
CERTFR-2022-AVI-1009
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans les produits Intel. Elles permettent à un attaquant de provoquer un déni de service, une atteinte à la confidentialité des données et une élévation de privilèges.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
NoneImpacted products
| Vendor | Product | Description | ||
|---|---|---|---|---|
| Intel | N/A | Intel MC versions antérieures à 2.3.2 | ||
| Intel | N/A | Intel EMA versions antérieures à 1.7.1 | ||
| Intel | N/A | Intel Quartus Prime Pro edition software versions antérieures à 22.1 | ||
| Intel | N/A | Intel CSME versions antérieures à 11.8.93, 11.22.93, 11.12.93, 12.0.92, 14.1.67, 15.0.42, 16.1.25 | ||
| Intel | N/A | Intel PROSet/Wireless WiFi UEFI drivers versions antérieures à 2.2.14.22176 | ||
| Intel | N/A | Intel SPS versions antérieures à SPS_E3_04.01.04.700.0, SPS_E3_06.00.03.035.0 | ||
| Intel | N/A | Intel SDP Tool versions antérieures à 3.0.0 | ||
| Intel | N/A | Intel NUC HDMI Firmware Update Tool pour NUC7i3DN, NUC7i5DN et NUC7i7DN versions antérieures à 1.78.2.0.7. | ||
| Intel | N/A | Intel Advanced Link Analyzer Pro versions antérieures à 22.2 | ||
| Intel | N/A | PresentMon versions antérieures à 1.7.1 | ||
| Intel | N/A | Intel NUC Kit Wireless Adapter driver installer software versions antérieures à 22.40.0 | ||
| Intel | N/A | Intel SGX SDK software pour Linux versions antérieures à 2.18.100.1 | ||
| Intel | N/A | Intel Glorp gaming particle physics demonstration software version 1.0.0 | ||
| Intel | N/A | Les produits Intel vPRO CSME WiFi sans la dernière mise à jour | ||
| Intel | N/A | Intel Advanced Link Analyzer Standrad versions antérieures à 22.1.1 STD | ||
| Intel | N/A | Intel XMM 7560 Modem M.2 sans la dernière mise à jour | ||
| Intel | N/A | Intel Server System R1000WF, R200WF et Intel Server Board S2600WF sans la dernière mise à jour | ||
| Intel | N/A | Intel EMA versions antérieures à 1.8.0 | ||
| Intel | N/A | Intel Server Board M50CYP sans la dernière mise à jour | ||
| Intel | N/A | Intel PROSet/Wireless WiFi versions antérieures à 22.140 | ||
| Intel | N/A | Intel Processors sans la dernière mise à jour | ||
| Intel | N/A | Intel VTune Profiler software versions antérieures à 2022.2.0 | ||
| Intel | N/A | Intel NUC BIOS Firmware sans la dernière mise à jour | ||
| Intel | N/A | Intel Quartus Prime Standard edition software versions antérieures à 21.1 Patch 0.02std | ||
| Intel | N/A | Intel Server Board M10JNP sans la dernière mise à jour | ||
| Intel | N/A | Intel AMT versions antérieures à 11.8.93, 11.22.93, 12.0.92, 14.1.67, 15.0.42, 16.0 | ||
| Intel | N/A | Killer WiFi versions antérieures à 3.1122.3158 | ||
| Intel | N/A | Intel Distribution of OpenVINO Toolkit versions antérieures à 2021.4.2 | ||
| Intel | N/A | Intel SGX SDK software pour Windows versions antérieures à 2.17.100.1 | ||
| Intel | N/A | Intel AMT SDK versions antérieures à 16.0.4.1 | ||
| Intel | N/A | Hyperscan library versions antérieures à 5.4.0 | ||
| Intel | N/A | Intel System Studio toutes versions | ||
| Intel | N/A | Intel WAPI Security sans la dernière mise à jour | ||
| Intel | N/A | Intel DCM versions antérieures à 5.0 | ||
| Intel | N/A | Intel Support Android application versions antérieures à 22.02.28 |
References
| Title | Publication Time | Tags | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Intel MC versions ant\u00e9rieures \u00e0 2.3.2",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel EMA versions ant\u00e9rieures \u00e0 1.7.1",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel Quartus Prime Pro edition software versions ant\u00e9rieures \u00e0 22.1",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel CSME versions ant\u00e9rieures \u00e0 11.8.93, 11.22.93, 11.12.93, 12.0.92, 14.1.67, 15.0.42, 16.1.25",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel PROSet/Wireless WiFi UEFI drivers versions ant\u00e9rieures \u00e0 2.2.14.22176",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel SPS versions ant\u00e9rieures \u00e0 SPS_E3_04.01.04.700.0, SPS_E3_06.00.03.035.0",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel SDP Tool versions ant\u00e9rieures \u00e0 3.0.0",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel NUC HDMI Firmware Update Tool pour NUC7i3DN, NUC7i5DN et NUC7i7DN versions ant\u00e9rieures \u00e0 1.78.2.0.7.",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel Advanced Link Analyzer Pro versions ant\u00e9rieures \u00e0 22.2",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "PresentMon versions ant\u00e9rieures \u00e0 1.7.1",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel NUC Kit Wireless Adapter driver installer software versions ant\u00e9rieures \u00e0 22.40.0",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel SGX SDK software pour Linux versions ant\u00e9rieures \u00e0 2.18.100.1",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel Glorp gaming particle physics demonstration software version 1.0.0",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Les produits Intel vPRO CSME WiFi sans la derni\u00e8re mise \u00e0 jour",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel Advanced Link Analyzer Standrad versions ant\u00e9rieures \u00e0 22.1.1 STD",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel XMM 7560 Modem M.2 sans la derni\u00e8re mise \u00e0 jour",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel Server System R1000WF, R200WF et Intel Server Board S2600WF sans la derni\u00e8re mise \u00e0 jour",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel EMA versions ant\u00e9rieures \u00e0 1.8.0",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel Server Board M50CYP sans la derni\u00e8re mise \u00e0 jour",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel PROSet/Wireless WiFi versions ant\u00e9rieures \u00e0 22.140",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel Processors sans la derni\u00e8re mise \u00e0 jour",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel VTune Profiler software versions ant\u00e9rieures \u00e0 2022.2.0",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel NUC BIOS Firmware sans la derni\u00e8re mise \u00e0 jour",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel Quartus Prime Standard edition software versions ant\u00e9rieures \u00e0 21.1 Patch 0.02std",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel Server Board M10JNP sans la derni\u00e8re mise \u00e0 jour",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel AMT versions ant\u00e9rieures \u00e0 11.8.93, 11.22.93, 12.0.92, 14.1.67, 15.0.42, 16.0",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Killer WiFi versions ant\u00e9rieures \u00e0 3.1122.3158",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel Distribution of OpenVINO Toolkit versions ant\u00e9rieures \u00e0 2021.4.2",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel SGX SDK software pour Windows versions ant\u00e9rieures \u00e0 2.17.100.1",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel AMT SDK versions ant\u00e9rieures \u00e0 16.0.4.1",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Hyperscan library versions ant\u00e9rieures \u00e0 5.4.0",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel System Studio toutes versions",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel WAPI Security sans la derni\u00e8re mise \u00e0 jour",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel DCM versions ant\u00e9rieures \u00e0 5.0",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel Support Android application versions ant\u00e9rieures \u00e0 22.02.28",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2022-27233",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27233"
},
{
"name": "CVE-2022-27874",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27874"
},
{
"name": "CVE-2022-36789",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-36789"
},
{
"name": "CVE-2022-36380",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-36380"
},
{
"name": "CVE-2022-33942",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-33942"
},
{
"name": "CVE-2022-37334",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-37334"
},
{
"name": "CVE-2022-36349",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-36349"
},
{
"name": "CVE-2022-38099",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-38099"
},
{
"name": "CVE-2022-27187",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27187"
},
{
"name": "CVE-2022-30548",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30548"
},
{
"name": "CVE-2022-26513",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-26513"
},
{
"name": "CVE-2022-27497",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27497"
},
{
"name": "CVE-2021-0185",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0185"
},
{
"name": "CVE-2021-33064",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33064"
},
{
"name": "CVE-2022-21198",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21198"
},
{
"name": "CVE-2022-30691",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30691"
},
{
"name": "CVE-2022-36384",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-36384"
},
{
"name": "CVE-2022-26028",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-26028"
},
{
"name": "CVE-2022-32569",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32569"
},
{
"name": "CVE-2022-25917",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-25917"
},
{
"name": "CVE-2022-26086",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-26086"
},
{
"name": "CVE-2022-28126",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28126"
},
{
"name": "CVE-2022-34152",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-34152"
},
{
"name": "CVE-2022-26341",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-26341"
},
{
"name": "CVE-2022-26367",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-26367"
},
{
"name": "CVE-2022-26006",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-26006"
},
{
"name": "CVE-2022-21794",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21794"
},
{
"name": "CVE-2022-26508",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-26508"
},
{
"name": "CVE-2022-33176",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-33176"
},
{
"name": "CVE-2022-26369",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-26369"
},
{
"name": "CVE-2022-33973",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-33973"
},
{
"name": "CVE-2022-26845",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-26845"
},
{
"name": "CVE-2021-33164",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33164"
},
{
"name": "CVE-2021-33159",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33159"
},
{
"name": "CVE-2022-37345",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-37345"
},
{
"name": "CVE-2022-27638",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27638"
},
{
"name": "CVE-2022-36367",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-36367"
},
{
"name": "CVE-2022-36370",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-36370"
},
{
"name": "CVE-2022-26045",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-26045"
},
{
"name": "CVE-2022-26124",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-26124"
},
{
"name": "CVE-2022-36400",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-36400"
},
{
"name": "CVE-2022-28611",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28611"
},
{
"name": "CVE-2022-35276",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-35276"
},
{
"name": "CVE-2022-36377",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-36377"
},
{
"name": "CVE-2022-28667",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28667"
},
{
"name": "CVE-2022-26079",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-26079"
},
{
"name": "CVE-2021-26251",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-26251"
},
{
"name": "CVE-2022-29486",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29486"
},
{
"name": "CVE-2022-26047",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-26047"
},
{
"name": "CVE-2022-27639",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27639"
},
{
"name": "CVE-2022-29515",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29515"
},
{
"name": "CVE-2022-29893",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29893"
},
{
"name": "CVE-2022-27499",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27499"
},
{
"name": "CVE-2022-30297",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30297"
},
{
"name": "CVE-2022-30542",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30542"
},
{
"name": "CVE-2022-29466",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29466"
},
{
"name": "CVE-2022-26024",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-26024"
}
],
"initial_release_date": "2022-11-09T00:00:00",
"last_revision_date": "2022-11-09T00:00:00",
"links": [
{
"title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00676 du 08 novembre 2022",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00676.html"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00715 du 08 novembre 2022",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00715.html"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00687 du 08 novembre 2022",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00687.html"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00691 du 08 novembre 2022",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00691.html"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00695 du 08 novembre 2022",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00695.html"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00713 du 08 novembre 2022",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00713.html"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00558 du 08 novembre 2022",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00558.html"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00711 du 08 novembre 2022",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00711.html"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00720 du 08 novembre 2022",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00720.html"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00642 du 08 novembre 2022",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00642.html"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00716 du 08 novembre 2022",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00716.html"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00747 du 08 novembre 2022",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00747.html"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00680 du 08 novembre 2022",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00680.html"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00699 du 08 novembre 2022",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00699.html"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00659 du 08 novembre 2022",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00659.html"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00683 du 08 novembre 2022",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00683.html"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00708 du 08 novembre 2022",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00708.html"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00688 du 08 novembre 2022",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00688.html"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00710 du 08 novembre 2022",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00710.html"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00689 du 08 novembre 2022",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00689.html"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00673 du 08 novembre 2022",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00673.html"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00740 du 08 novembre 2022",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00740.html"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00610 du 08 novembre 2022",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00610.html"
}
],
"reference": "CERTFR-2022-AVI-1009",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2022-11-09T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits Intel.\nElles permettent \u00e0 un attaquant de provoquer un d\u00e9ni de service, une\natteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es et une \u00e9l\u00e9vation de\nprivil\u00e8ges.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Intel",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00752 du 08 novembre 2022",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00752.html"
}
]
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…
Loading…