Potential security vulnerabilities in the Intel® Quartus Prime Pro and Standard edition software may allow escalation of privilege or information disclosure. Intel is releasing software updates to mitigate these potential vulnerabilities.
CVEID: CVE-2022-33892
Description: Path traversal in the Intel® Quartus Prime Pro and Standard edition software may allow an authenticated user to potentially enable escalation of privilege via local access.
CVSS Base Score: 7.3 High
CVSS Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H
CVEID: CVE-2022-33902
Description: Insufficient control flow management in the Intel® Quartus Prime Pro and Standard edition software may allow an authenticated user to potentially enable escalation of privilege via local access.
CVSS Base Score: 7.3 High
CVSS Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H
CVEID: CVE-2022-26840
Description: Improper neutralization in the Intel® Quartus Prime Pro and Standard edition software may allow an authenticated user to potentially enable escalation of privilege via local access.
CVSS Base Score: 7.3 High
CVSS Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H****
** **CVEID: CVE-2022-32570
Description: Improper authentication in the Intel® Quartus Prime Pro and Standard edition software may allow an authenticated user to potentially enable escalation of privilege via local access.
CVSS Base Score: 6.7 Medium
CVSS Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H****
** **CVEID: CVE-2022-26888
Description: Cross-site scripting in the Intel® Quartus Prime Pro and Standard edition software may allow an authenticated user to potentially enable information disclosure via local access.
CVSS Base Score: 2.8 Low
CVSS Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:N
Intel® Quartus Prime Pro edition software before version 22.2.
Intel® Quartus Prime Standard edition software before version 22.1STD.
Intel recommends updating the Intel® Quartus Prime Pro edition software to version 22.2 or later.
Intel recommends updating the Intel® Quartus Prime Standard edition software to version 22.1STD or later.
Updates are available for download at these locations:
<http://fpgasoftware.intel.com/?edition=pro>
<http://fpgasoftware.intel.com/?edition=standard>
These issues were found externally. Intel would like to thank Julien Ahrens from RCE Security (CVE-2022-33892, CVE-2022-33902, CVE-2022-26840, CVE-2022-26888) for reporting these issues.
Intel, and nearly the entire technology industry, follows a disclosure practice called Coordinated Disclosure, under which a cybersecurity vulnerability is generally publicly disclosed only after mitigations are available.