Lucene search

K
cvelistIntelCVELIST:CVE-2022-36392
HistoryAug 11, 2023 - 2:36 a.m.

CVE-2022-36392

2023-08-1102:36:55
CWE-20
intel
www.cve.org
improper input validation
intel(r) amt
standard manageability firmware
denial of service
network access

8.6 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H

8.5 High

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

20.7%

Improper input validation in some firmware for Intelยฎ AMT and Intelยฎ Standard Manageability before versions 11.8.94, 11.12.94, 11.22.94, 12.0.93, 14.1.70, 15.0.45, and 16.1.27 in Intel ยฎ CSME may allow an unauthenticated user to potentially enable denial of service via network access.

CNA Affected

[
  {
    "vendor": "n/a",
    "product": "Intel(R) AMT and Intel(R) Standard Manageability in Intel (R) CSME",
    "versions": [
      {
        "version": "before versions 11.8.94, 11.12.94, 11.22.94, 12.0.93, 14.1.70, 15.0.45, and 16.1.27",
        "status": "affected"
      }
    ],
    "defaultStatus": "unaffected"
  }
]

8.6 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H

8.5 High

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

20.7%

Related for CVELIST:CVE-2022-36392