A potential security vulnerability in some Intel® Field Programmable Gate Array (FPGA) products may allow escalation of privilege. Intel is releasing firmware updates to mitigate this potential vulnerability.
CVEID: CVE-2022-38787
Description: Improper input validation in firmware for some Intel® FPGA products before version 2.7.0 Hotfix may allow an authenticated user to potentially enable escalation of privilege via local access.
CVSS Base Score: 5.7 Medium
CVSS Vector: CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:N
Intel® Agilex™ 7 FPGA and SoC FPGA product families.
Intel® Stratix® 10 FPGA and SoC FPGA product families.
Intel recommends updating the affected FPGA product families above to version 2.7.0 HotFix or later.
Updates are available for download at this location:
https://github.com/altera-opensource/arm-trustedfirmware
Intel would like to thank Christian Lindenmeier and Marcel Busch for reporting this issue.
Intel, and nearly the entire technology industry, follows a disclosure practice called Coordinated Disclosure, under which a cybersecurity vulnerability is generally publicly disclosed only after mitigations are available.