Lucene search

K
intelIntel Security CenterINTEL:INTEL-SA-00610
HistoryNov 30, 2022 - 12:00 a.m.

2022.3 IPU - Intel® Chipset Firmware Advisory

2022-11-3000:00:00
Intel Security Center
www.intel.com
116
intel
chipset firmware
vulnerabilities
privilege escalation
denial of service

0.001 Low

EPSS

Percentile

50.2%

Summary:

Potential security vulnerabilities in some Intel® Chipset Firmware in Intel® Converged Security and Manageability Engine (CSME), Intel® Active Management Technology (AMT) and Intel® Server Platform Services (SPS) may allow escalation of privilege or denial of service. Intel is releasing firmware updates to mitigate these potential vulnerabilities.

Vulnerability Details:

CVEID: CVE-2022-26845

Description: Improper authentication in firmware for Intel® AMT before versions 11.8.93, 11.22.93, 11.12.93, 12.0.92, 14.1.67, 15.0.42, 16.1.25 may allow an unauthenticated user to potentially enable escalation of privilege via network access.

CVSS Base Score: 8.7 High

CVSS Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:N

CVEID: CVE-2022-27497

Description: Null pointer dereference in firmware for Intel® AMT before version 11.8.93, 11.22.93, 11.12.93, 12.0.92, 14.1.67, 15.0.42, 16.1.25 may allow an unauthenticated user to potentially enable denial of service via network access.

CVSS Base Score: 8.6 High

CVSS Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H

CVEID: CVE-2022-29893

Description: Improper authentication in firmware for Intel® AMT before versions 11.8.93, 11.22.93, 11.12.93, 12.0.92, 14.1.67, 15.0.42, 16.1.25 may allow an authenticated user to potentially enable escalation of privilege via network access.

CVSS Base Score: 8.1 High

CVSS Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N

CVEID: CVE-2021-33159

Description: Improper authentication in subsystem for Intel® AMT before versions 11.8.93, 11.22.93, 11.12.93, 12.0.92, 14.1.67, 15.0.42, 16.1.25 may allow a privileged user to potentially enable escalation of privilege via local access.

CVSS Base Score: 7.4 High

CVSS Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:C/C:N/I:H/A:H****

CVEID: CVE-2022-29466

Description: Improper input validation in firmware for Intel® SPS before version SPS_E3_04.01.04.700.0 may allow an authenticated user to potentially enable denial of service via local access.

CVSS Base Score: 7.3 High

CVSS Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:L/A:H

CVEID: CVE-2022-29515

Description: Missing release of memory after effective lifetime in firmware for Intel® SPS before versions SPS_E3_06.00.03.035.0 may allow a privileged user to potentially enable denial of service via local access.

CVSS Base Score: 6.0 Medium

CVSS Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H

Affected Products:

Intel® CSME before versions 11.8.93, 11.22.93, 11.12.93, 12.0.92, 14.1.67, 15.0.42, 16.1.25.

Intel® AMT before versions 11.8.93, 11.22.93, 12.0.92, 14.1.67, 15.0.42, 16.0.

Intel® SPS before versions SPS_E3_04.01.04.700.0, SPS_E3_06.00.03.035.0.

Recommendations:

Intel recommends that users of Intel® CSME, Intel® AMT and Intel® SPS update to the latest version provided by the system manufacturer that addresses these issues.__

Acknowledgements:

These issues were found internally by Intel employees. Intel would like to thank Yanai Moyal and Yossef Kuszer.

Intel, and nearly the entire technology industry, follows a disclosure practice called Coordinated Disclosure, under which a cybersecurity vulnerability is generally publicly disclosed only after mitigations are available.

0.001 Low

EPSS

Percentile

50.2%

Related for INTEL:INTEL-SA-00610