Lucene search

K
nessusThis script is Copyright (C) 2023 and is owned by Tenable, Inc. or an Affiliate thereof.INTEL_SA_00813_CVE-2022-43505.NASL
HistoryAug 18, 2023 - 12:00 a.m.

Intel BIOS Firmware DoS (INTEL-SA-00813) (CVE-2022-43505)

2023-08-1800:00:00
This script is Copyright (C) 2023 and is owned by Tenable, Inc. or an Affiliate thereof.
www.tenable.com
33
bios firmware
denial of service
intel processors
vulnerability
firmware update
local access

4.4 Medium

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

HIGH

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H

0.0004 Low

EPSS

Percentile

9.0%

Insufficient control flow management in the BIOS firmware for some Intel® Processors may allow a privileged user to potentially enable denial of service via local access. (CVE-2022-43505)

Note that Nessus has not tested for this issue but has instead relied only on the application’s self-reported version number.

#%NASL_MIN_LEVEL 80900
##
# (C) Tenable, Inc.
##

include('compat.inc');

if (description)
{
  script_id(179946);
  script_version("1.1");
  script_set_attribute(attribute:"plugin_modification_date", value:"2023/08/21");

  script_cve_id("CVE-2022-43505");
  script_xref(name:"IAVA", value:"2023-A-0426");

  script_name(english:"Intel BIOS Firmware DoS (INTEL-SA-00813) (CVE-2022-43505)");

  script_set_attribute(attribute:"synopsis", value:
"The BIOS firmware on the remote host is affected by a denial of service vulnerability.");
  script_set_attribute(attribute:"description", value:
"Insufficient control flow management in the BIOS firmware for some Intel(R) Processors may allow a privileged user 
to potentially enable denial of service via local access. (CVE-2022-43505)

Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version
number.");
  # https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00813.html
  script_set_attribute(attribute:"see_also", value:"http://www.nessus.org/u?3f552fd5");
  script_set_attribute(attribute:"solution", value:
"Contact your system OEM for updated firmware per the vendor advisory.");
  script_set_cvss_base_vector("CVSS2#AV:L/AC:L/Au:M/C:N/I:N/A:C");
  script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
  script_set_cvss3_base_vector("CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H");
  script_set_cvss3_temporal_vector("CVSS:3.0/E:U/RL:O/RC:C");
  script_set_attribute(attribute:"cvss_score_source", value:"CVE-2022-43505");

  script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
  script_set_attribute(attribute:"exploit_available", value:"false");

  script_set_attribute(attribute:"vuln_publication_date", value:"2022/08/08");
  script_set_attribute(attribute:"patch_publication_date", value:"2022/08/08");
  script_set_attribute(attribute:"plugin_publication_date", value:"2023/08/18");

  script_set_attribute(attribute:"potential_vulnerability", value:"true");
  script_set_attribute(attribute:"plugin_type", value:"remote");
  script_set_attribute(attribute:"cpe", value:"cpe:/a:intel");
  script_set_attribute(attribute:"cpe", value:"cpe:/h:intel");
  script_set_attribute(attribute:"cpe", value:"cpe:/o:intel");
  script_set_attribute(attribute:"stig_severity", value:"I");
  script_end_attributes();

  script_category(ACT_GATHER_INFO);
  script_family(english:"Misc.");

  script_copyright(english:"This script is Copyright (C) 2023 and is owned by Tenable, Inc. or an Affiliate thereof.");

  script_dependencies("intel_cpuid_detection.nbin");
  script_require_keys("SMB/WMI/Available", "Settings/ParanoidReport");

  exit(0);
}

if (report_paranoia < 2) audit(AUDIT_PARANOID);

var processor_id = get_kb_item_or_exit('Host/cpu/cpuid');

var vuln_processors = [
  {
    'Product Collection': 'Intel® Pentium® Processor J Series, Intel® Pentium® Processor N Series, Intel® Celeron® Processor J Series, Intel® Celeron® Processor N Series, Intel® Atom® Processor A Series, Intel® Atom® Processor E3900 Series',
    'Vertical Segment': 'Desktop, Mobile',
    'CPU ID': ['506C9'],
    'Platform ID': '03'
  },
  {
    'Product Collection': 'Intel® Pentium® Processor J Series, Intel® Pentium® Processor N Series, Intel® Celeron® Processor J Series, Intel® Celeron® Processor N Series, Intel® Atom® Processor A Series, Intel® Atom® Processor E3900 Series',
    'Vertical Segment': 'Embedded',
    'CPU ID': ['506C9'],
    'Platform ID': '03'
  },
  {
    'Product Collection': 'Intel® Pentium® Processor J Series, Intel® Pentium® Processor N Series, Intel® Celeron® Processor J Series, Intel® Celeron® Processor N Series, Intel® Atom® Processor A Series, Intel® Atom® Processor E3900 Series',
    'Vertical Segment': 'Embedded',
    'CPU ID': ['506CA'],
    'Platform ID': '03'
  },
  {
    'Product Collection': '3rd Generation Intel® Xeon® Scalable Processor Family',
    'Vertical Segment': 'Server',
    'CPU ID': ['5065B'],
    'Platform ID': 'BF'
  },
  {
    'Product Collection': 'Intel® Denverton Atom® Processor C3XXX',
    'Vertical Segment': 'Server',
    'CPU ID': ['506F1'],
    'Platform ID': '01'
  },
  {
    'Product Collection': 'Intel® Xeon® Processor D Family',
    'Vertical Segment': 'Server',
    'CPU ID': ['50665'],
    'Platform ID': '10'
  },
  {
    'Product Collection': 'Intel® Xeon® Processor D Family',
    'Vertical Segment': 'Server',
    'CPU ID': ['50663'],
    'Platform ID': '10'
  },
  {
    'Product Collection': 'Intel® Xeon® D-1633N Processor',
    'Vertical Segment': 'Server',
    'CPU ID': ['50665'],
    'Platform ID': '10'
  },
  {
    'Product Collection': 'Intel® Xeon® Processor E3 v6 Family',
    'Vertical Segment': 'Server, Workstation, AMT Server',
    'CPU ID': ['906E9'],
    'Platform ID': '2A'
  },
  {
    'Product Collection': '10th Generation Intel® Core™ Processor Family',
    'Vertical Segment': 'Desktop, Mobile, Embedded',
    'CPU ID': ['A0652', 'A0653', 'A0655', 'A0660', 'A0661', '806EC'],
    'Platform ID': '20 01 22 02 80 94'
  },
  {
    'Product Collection': 'Intel® Core™ Processors with Intel® Hybrid Technology',
    'Vertical Segment': 'Mobile',
    'CPU ID': ['806A1'],
    'Platform ID': '10'
  },
  {
    'Product Collection': 'Intel® Xeon® Processor E7 v4 Family',
    'Vertical Segment': 'Server',
    'CPU ID': ['406F1'],
    'Platform ID': 'EF'
  },
  {
    'Product Collection': 'Intel® Xeon® Processor E7 v3 Family',
    'Vertical Segment': 'Server',
    'CPU ID': ['306F4'],
    'Platform ID': '80'
  },
  {
    'Product Collection': '10th Generation Intel® Core™ Processor Family',
    'Vertical Segment': 'Server',
    'CPU ID': ['606A6'],
    'Platform ID': '80'
  },
  {
    'Product Collection': 'Intel® Xeon® Processor W Family',
    'Vertical Segment': 'Workstation',
    'CPU ID': ['50657'],
    'Platform ID': 'BF'
  },
  {
    'Product Collection': '2nd Generation Intel® Xeon® Scalable Processors',
    'Vertical Segment': 'Server',
    'CPU ID': ['50657'],
    'Platform ID': 'BF'
  },
  {
    'Product Collection': 'Intel® Xeon® Scalable Processors',
    'Vertical Segment': 'Server',
    'CPU ID': ['50653', '50654'],
    'Platform ID': '97 BF'
  },
  {
    'Product Collection': 'Intel® Xeon® Processor D Family',
    'Vertical Segment': 'Server',
    'CPU ID': ['50654'],
    'Platform ID': 'B7'
  },
  {
    'Product Collection': 'Intel® Xeon® Processor E5 v4 Family, Intel® Core™ X-series Processors',
    'Vertical Segment': 'Server',
    'CPU ID': ['406F1'],
    'Platform ID': 'EF'
  },
  {
    'Product Collection': 'Intel® Xeon® Processor E5 v3 Family',
    'Vertical Segment': 'Server',
    'CPU ID': ['306F2'],
    'Platform ID': '6F'
  },
  {
    'Product Collection': 'Intel® Pentium® Processor Silver Series, Intel® Celeron® Processor J Series, Intel® Celeron® Processor N Series',
    'Vertical Segment': 'Desktop, Mobile, Embedded',
    'CPU ID': ['706A1', '706A8'],
    'Platform ID': '01'
  },
  {
    'Product Collection': '8th Generation Intel® Core™ Processor Family, 10th Generation Intel® Core™ Processor Family',
    'Vertical Segment': 'Mobile',
    'CPU ID': ['806E9', '806EC'],
    'Platform ID': '10 94'
  },
  {
    'Product Collection': '8th Generation Intel® Core™ Processors',
    'Vertical Segment': 'Mobile, Embedded',
    'CPU ID': ['806EB', '806EC'],
    'Platform ID': 'D0 94'
  },
  {
    'Product Collection': '8th Generation Intel® Core™ Processor Family, 7th Generation Intel® Core™ Processor Family, Intel® Core™ X-series Processors',
    'Vertical Segment': 'Desktop, Mobile, Embedded',
    'CPU ID': ['906E9', '806EA', '806E9'],
    'Platform ID': '2A C0'
  },
  {
    'Product Collection': 'Intel® Xeon® Processor W Family, Intel® Core™ X-series Processors',
    'Vertical Segment': 'Desktop, Workstation',
    'CPU ID': ['50654'],
    'Platform ID': 'B7'
  },
  {
    'Product Collection': 'Intel® Core™ X-series Processors',
    'Vertical Segment': 'Desktop',
    'CPU ID': ['50657'],
    'Platform ID': 'B7'
  },
  {
    'Product Collection': '8th Generation Intel® Core™ Processor Family, Intel® Pentium® Gold Processor Series, Intel® Celeron® Processor G Series',
    'Vertical Segment': 'Desktop',
    'CPU ID': ['906EB'],
    'Platform ID': '02'
  },
  {
    'Product Collection': '8th Generation Intel® Core™ Processor Family',
    'Vertical Segment': 'Desktop',
    'CPU ID': ['906EA'],
    'Platform ID': '22'
  },
  {
    'Product Collection': '9th Generation Intel® Core™ Processor Family',
    'Vertical Segment': 'Desktop',
    'CPU ID': ['906ED'],
    'Platform ID': '22'
  }
];

var cve, cpuids, report, found = FALSE;
cve = 'CVE-2022-43505';
foreach (var processor in vuln_processors) 
{
  cpuids = processor['CPU ID'];
  foreach (var cpuid in cpuids)
  {
    if (processor_id == cpuid) 
    {
      found = TRUE;
      report  = 'The processor(s) ' + processor['Product Collection'] + ' with CPU ID ' + cpuid + ' are vulnerable to ' + 
                cve + '. See vendor advisory.\n';
      security_report_v4(port:135, severity:SECURITY_WARNING, extra:report);
    }     
  }
}

if (!found)
  audit(AUDIT_INST_VER_NOT_VULN, 'The intel processor');
VendorProductVersionCPE
intelcpe:/a:intel
intelcpe:/h:intel
intelcpe:/o:intel

4.4 Medium

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

HIGH

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H

0.0004 Low

EPSS

Percentile

9.0%

Related for INTEL_SA_00813_CVE-2022-43505.NASL