Lucene search

K
cve[email protected]CVE-2022-38102
HistoryAug 11, 2023 - 3:15 a.m.

CVE-2022-38102

2023-08-1103:15:14
CWE-20
web.nvd.nist.gov
23
cve-2022-38102
intel
firmware
input validation
denial of service
nvd

7.2 High

CVSS3

Attack Vector

LOCAL

Attack Complexity

HIGH

Privileges Required

HIGH

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

NONE

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:H/A:H

4.5 Medium

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

9.1%

Improper Input validation in firmware for some Intelยฎ Converged Security and Management Engine before versions 15.0.45, and 16.1.27 may allow a privileged user to potentially enable denial of service via local access.

Affected configurations

NVD
Node
intelconverged_security_management_engine_firmwareRange<16.1.27
AND
intelb660Match-
OR
intelh610Match-
OR
intelh610eMatch-
OR
intelh670Match-
OR
intelhm670Match-
OR
intelq670Match-
OR
intelq670eMatch-
OR
intelr680eMatch-
OR
intelw680Match-
OR
intelwm690Match-
OR
intelz690Match-
Node
intelconverged_security_management_engine_firmwareRange<15.0.45
AND
intelatom_x6200feMatch-
OR
intelatom_x6211eMatch-
OR
intelatom_x6212reMatch-
OR
intelatom_x6214reMatch-
OR
intelatom_x6413eMatch-
OR
intelatom_x6414reMatch-
OR
intelatom_x6416reMatch-
OR
intelatom_x6425eMatch-
OR
intelatom_x6425reMatch-
OR
intelatom_x6427feMatch-
OR
intelb560Match-
OR
intelc252Match-
OR
intelc256Match-
OR
intelceleron_j1750Match-
OR
intelceleron_j1800Match-
OR
intelceleron_j1850Match-
OR
intelceleron_j1900Match-
OR
intelceleron_j3060Match-
OR
intelceleron_j3160Match-
OR
intelceleron_j3355Match-
OR
intelceleron_j3355eMatch-
OR
intelceleron_j3455Match-
OR
intelceleron_j3455eMatch-
OR
intelceleron_j4005Match-
OR
intelceleron_j4025Match-
OR
intelceleron_j4105Match-
OR
intelceleron_j4125Match-
OR
intelceleron_j6412Match-
OR
intelceleron_j6413Match-
OR
intelceleron_n2805Match-
OR
intelceleron_n2806Match-
OR
intelceleron_n2807Match-
OR
intelceleron_n2808Match-
OR
intelceleron_n2810Match-
OR
intelceleron_n2815Match-
OR
intelceleron_n2820Match-
OR
intelceleron_n2830Match-
OR
intelceleron_n2840Match-
OR
intelceleron_n2910Match-
OR
intelceleron_n2920Match-
OR
intelceleron_n2930Match-
OR
intelceleron_n2940Match-
OR
intelceleron_n3000Match-
OR
intelceleron_n3010Match-
OR
intelceleron_n3050Match-
OR
intelceleron_n3060Match-
OR
intelceleron_n3150Match-
OR
intelceleron_n3160Match-
OR
intelceleron_n3350Match-
OR
intelceleron_n3350eMatch-
OR
intelceleron_n3450Match-
OR
intelceleron_n4000Match-
OR
intelceleron_n4020Match-
OR
intelceleron_n4100Match-
OR
intelceleron_n4120Match-
OR
intelceleron_n4500Match-
OR
intelceleron_n4505Match-
OR
intelceleron_n5100Match-
OR
intelceleron_n5105Match-
OR
intelceleron_n6210Match-
OR
intelceleron_n6211Match-
OR
intelh510Match-
OR
intelh570Match-
OR
intelhm570Match-
OR
intelhm570eMatch-
OR
intelpentium_j2850Match-
OR
intelpentium_j2900Match-
OR
intelpentium_j3710Match-
OR
intelpentium_j4205Match-
OR
intelpentium_j6426Match-
OR
intelpentium_n3510Match-
OR
intelpentium_n3520Match-
OR
intelpentium_n3530Match-
OR
intelpentium_n3540Match-
OR
intelpentium_n3700Match-
OR
intelpentium_n3710Match-
OR
intelpentium_n4200Match-
OR
intelpentium_n4200eMatch-
OR
intelpentium_n6415Match-
OR
intelq570Match-
OR
intelqm580Match-
OR
intelqm580eMatch-
OR
intelrm590eMatch-
OR
intelw580Match-
OR
intelwm590Match-
OR
intelz590Match-

CNA Affected

[
  {
    "vendor": "n/a",
    "product": "Intel(R) Converged Security and Management Engine",
    "versions": [
      {
        "version": "before versions 15.0.45, and 16.1.27",
        "status": "affected"
      }
    ],
    "defaultStatus": "unaffected"
  }
]

7.2 High

CVSS3

Attack Vector

LOCAL

Attack Complexity

HIGH

Privileges Required

HIGH

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

NONE

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:H/A:H

4.5 Medium

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

9.1%

Related for CVE-2022-38102