Vulnerabilites related to intel - compute_module_liquid-cooled_hns2600bpbrct_firmware
cve-2023-34431
Vulnerability from cvelistv5
Published
2023-11-14 19:05
Modified
2024-08-30 16:57
Severity ?
EPSS score ?
Summary
Improper input validation in some Intel(R) Server Board BIOS firmware may allow a privileged user to potentially enable escalation of privilege via local access
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
n/a | Intel(R) Server Board BIOS firmware |
Version: See references |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-02T16:10:07.186Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00719.html", tags: [ "x_transferred", ], url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00719.html", }, ], title: "CVE Program Container", }, { metrics: [ { other: { content: { id: "CVE-2023-34431", options: [ { Exploitation: "none", }, { Automatable: "no", }, { "Technical Impact": "total", }, ], role: "CISA Coordinator", timestamp: "2024-08-30T16:55:22.972453Z", version: "2.0.3", }, type: "ssvc", }, }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-20", description: "CWE-20 Improper Input Validation", lang: "en", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2024-08-30T16:57:11.553Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, ], cna: { affected: [ { defaultStatus: "unaffected", product: "Intel(R) Server Board BIOS firmware", vendor: "n/a", versions: [ { status: "affected", version: "See references", }, ], }, ], descriptions: [ { lang: "en", value: "Improper input validation in some Intel(R) Server Board BIOS firmware may allow a privileged user to potentially enable escalation of privilege via local access", }, ], metrics: [ { cvssV3_1: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "HIGH", baseScore: 8.2, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "HIGH", scope: "CHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H", version: "3.1", }, format: "CVSS", scenarios: [ { lang: "en", value: "GENERAL", }, ], }, ], problemTypes: [ { descriptions: [ { description: "escalation of privilege", lang: "en", }, { cweId: "CWE-20", description: "Improper input validation", lang: "en", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2023-11-14T19:05:08.245Z", orgId: "6dda929c-bb53-4a77-a76d-48e79601a1ce", shortName: "intel", }, references: [ { name: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00719.html", url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00719.html", }, ], }, }, cveMetadata: { assignerOrgId: "6dda929c-bb53-4a77-a76d-48e79601a1ce", assignerShortName: "intel", cveId: "CVE-2023-34431", datePublished: "2023-11-14T19:05:08.245Z", dateReserved: "2023-06-06T03:00:05.087Z", dateUpdated: "2024-08-30T16:57:11.553Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2022-29262
Vulnerability from cvelistv5
Published
2023-11-14 19:05
Modified
2024-08-30 15:09
Severity ?
EPSS score ?
Summary
Improper buffer restrictions in some Intel(R) Server Board BIOS firmware may allow a privileged user to potentially enable escalation of privilege via local access.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
n/a | Intel(R) Server Board BIOS firmware |
Version: See references |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-03T06:17:54.490Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00719.html", tags: [ "x_transferred", ], url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00719.html", }, ], title: "CVE Program Container", }, { metrics: [ { other: { content: { id: "CVE-2022-29262", options: [ { Exploitation: "none", }, { Automatable: "no", }, { "Technical Impact": "partial", }, ], role: "CISA Coordinator", timestamp: "2024-08-30T15:06:21.536256Z", version: "2.0.3", }, type: "ssvc", }, }, ], providerMetadata: { dateUpdated: "2024-08-30T15:09:15.619Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, ], cna: { affected: [ { defaultStatus: "unaffected", product: "Intel(R) Server Board BIOS firmware", vendor: "n/a", versions: [ { status: "affected", version: "See references", }, ], }, ], descriptions: [ { lang: "en", value: "Improper buffer restrictions in some Intel(R) Server Board BIOS firmware may allow a privileged user to potentially enable escalation of privilege via local access.", }, ], metrics: [ { cvssV3_1: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "HIGH", baseScore: 7.9, baseSeverity: "HIGH", confidentialityImpact: "NONE", integrityImpact: "HIGH", privilegesRequired: "HIGH", scope: "CHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:H/A:H", version: "3.1", }, format: "CVSS", scenarios: [ { lang: "en", value: "GENERAL", }, ], }, ], problemTypes: [ { descriptions: [ { description: "escalation of privilege", lang: "en", }, { cweId: "CWE-92", description: "Improper buffer restrictions", lang: "en", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2023-11-14T19:05:09.467Z", orgId: "6dda929c-bb53-4a77-a76d-48e79601a1ce", shortName: "intel", }, references: [ { name: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00719.html", url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00719.html", }, ], }, }, cveMetadata: { assignerOrgId: "6dda929c-bb53-4a77-a76d-48e79601a1ce", assignerShortName: "intel", cveId: "CVE-2022-29262", datePublished: "2023-11-14T19:05:09.467Z", dateReserved: "2022-04-20T00:10:11.709Z", dateUpdated: "2024-08-30T15:09:15.619Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2022-33945
Vulnerability from cvelistv5
Published
2023-11-14 19:05
Modified
2024-08-14 20:01
Severity ?
EPSS score ?
Summary
Improper input validation in some Intel(R) Server board and Intel(R) Server System BIOS firmware may allow a privileged user to potentially enable escalation of privilege via local access.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
n/a | Intel(R) Server board and Intel(R) Server System BIOS firmware |
Version: See references |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-03T08:16:15.930Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00719.html", tags: [ "x_transferred", ], url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00719.html", }, ], title: "CVE Program Container", }, { affected: [ { cpes: [ "cpe:2.3:o:intel:server_m20ntp_family:*:*:*:*:*:*:*:*", ], defaultStatus: "unknown", product: "server_m20ntp_family", vendor: "intel", versions: [ { lessThan: "0022.D02", status: "affected", version: "0", versionType: "custom", }, ], }, { cpes: [ "cpe:2.3:o:intel:server_system_m70klp_family:*:*:*:*:*:*:*:*", ], defaultStatus: "unknown", product: "server_system_m70klp_family", vendor: "intel", versions: [ { lessThan: "01.04.0029", status: "affected", version: "0", versionType: "custom", }, ], }, { cpes: [ "cpe:2.3:o:intel:server_board_m10jnp2sb_family:*:*:*:*:*:*:*:*", ], defaultStatus: "unknown", product: "server_board_m10jnp2sb_family", vendor: "intel", versions: [ { lessThan: "7.219", status: "affected", version: "0", versionType: "custom", }, ], }, { cpes: [ "cpe:2.3:o:intel:server_board_s2600bp_family:*:*:*:*:*:*:*:*", ], defaultStatus: "unknown", product: "server_board_s2600bp_family", vendor: "intel", versions: [ { lessThan: "02.01.0015", status: "affected", version: "0", versionType: "custom", }, ], }, ], metrics: [ { other: { content: { id: "CVE-2022-33945", options: [ { Exploitation: "none", }, { Automatable: "no", }, { "Technical Impact": "total", }, ], role: "CISA Coordinator", timestamp: "2024-08-14T19:04:34.157408Z", version: "2.0.3", }, type: "ssvc", }, }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-20", description: "CWE-20 Improper Input Validation", lang: "en", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2024-08-14T20:01:25.503Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, ], cna: { affected: [ { defaultStatus: "unaffected", product: "Intel(R) Server board and Intel(R) Server System BIOS firmware", vendor: "n/a", versions: [ { status: "affected", version: "See references", }, ], }, ], descriptions: [ { lang: "en", value: "Improper input validation in some Intel(R) Server board and Intel(R) Server System BIOS firmware may allow a privileged user to potentially enable escalation of privilege via local access.", }, ], metrics: [ { cvssV3_1: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "HIGH", baseScore: 8.2, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "HIGH", scope: "CHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H", version: "3.1", }, format: "CVSS", scenarios: [ { lang: "en", value: "GENERAL", }, ], }, ], problemTypes: [ { descriptions: [ { description: "escalation of privilege", lang: "en", }, { cweId: "CWE-20", description: "Improper input validation", lang: "en", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2023-11-14T19:05:08.859Z", orgId: "6dda929c-bb53-4a77-a76d-48e79601a1ce", shortName: "intel", }, references: [ { name: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00719.html", url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00719.html", }, ], }, }, cveMetadata: { assignerOrgId: "6dda929c-bb53-4a77-a76d-48e79601a1ce", assignerShortName: "intel", cveId: "CVE-2022-33945", datePublished: "2023-11-14T19:05:08.859Z", dateReserved: "2022-06-18T03:00:05.784Z", dateUpdated: "2024-08-14T20:01:25.503Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
Vulnerability from fkie_nvd
Published
2023-11-14 19:15
Modified
2024-11-21 06:58
Severity ?
7.9 (High) - CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:H/A:H
6.7 (Medium) - CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
6.7 (Medium) - CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
Summary
Improper buffer restrictions in some Intel(R) Server Board BIOS firmware may allow a privileged user to potentially enable escalation of privilege via local access.
References
Impacted products
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:intel:server_board_m70klp2sb_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "B527A5B5-60EA-4488-AAF8-9DB30843D4FB", versionEndExcluding: "01.04.0022", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:intel:server_board_m70klp2sb:-:*:*:*:*:*:*:*", matchCriteriaId: "2C473084-B18C-4307-9733-7B9CE9E2D9C4", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:intel:server_system_m70klp4s2uhh_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "D7D0F31B-369C-4B52-A164-8E8C4F354104", versionEndExcluding: "01.04.0022", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:intel:server_system_m70klp4s2uhh:-:*:*:*:*:*:*:*", matchCriteriaId: "EB396EC4-E034-4E2C-AEAA-1BE5E8F43E11", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:intel:server_board_m20ntp2sb_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "65F66C02-F23E-4BC8-B2FA-D5B19C09376E", versionEndExcluding: "0022.d02", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:intel:server_board_m20ntp2sb:-:*:*:*:*:*:*:*", matchCriteriaId: "0D38ACC2-646B-44C2-B9B0-43FA4BECF487", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:intel:server_system_m20ntp1ur304_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "E40AA36D-D91E-40FB-9AD7-6967EC804786", versionEndExcluding: "0022.d02", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:intel:server_system_m20ntp1ur304:-:*:*:*:*:*:*:*", matchCriteriaId: "10B8E6BE-1AD7-43CF-AD4B-590738A27B04", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:intel:server_board_m10jnp2sb_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "3C7464A9-6B5D-40EE-9F5F-E93BF5A334EE", versionEndExcluding: "7.219", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:intel:server_board_m10jnp2sb:-:*:*:*:*:*:*:*", matchCriteriaId: "8EAE5D89-ADEC-4F26-B555-52971EEE18A3", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:intel:server_board_s2600bpbr_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "E64B3B0E-0B71-4268-9264-85899BB8099A", versionEndExcluding: "02.01.0015", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:intel:server_board_s2600bpbr:-:*:*:*:*:*:*:*", matchCriteriaId: "1EF2A748-40E2-4F2E-9516-78C9E6DBA4AF", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:intel:server_board_s2600bps_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "01584E1F-1CFC-4D85-AE63-AB5DF4487BA6", versionEndExcluding: "02.01.0015", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:intel:server_board_s2600bps:-:*:*:*:*:*:*:*", matchCriteriaId: "5C2EB283-D51C-495C-A645-AD27293A25FC", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:intel:server_board_s2600bpsr_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "B5BFB798-2C10-4B89-A33A-C09D325AA624", versionEndExcluding: "02.01.0015", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:intel:server_board_s2600bpsr:-:*:*:*:*:*:*:*", matchCriteriaId: "76ACEDD9-68F4-4EFE-9725-16447C18291C", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:intel:server_board_s2600bpqr_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "FE22EC88-0174-4CF8-9277-ED84E781C4A1", versionEndExcluding: "02.01.0015", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:intel:server_board_s2600bpqr:-:*:*:*:*:*:*:*", matchCriteriaId: "5674D660-DEB6-4AF9-8B0D-F57ECC4DC533", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:intel:server_board_s2600bpb_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "6666119A-761D-47C8-B50A-D168C01C2641", versionEndExcluding: "02.01.0015", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:intel:server_board_s2600bpb:-:*:*:*:*:*:*:*", matchCriteriaId: "6E7B114F-1EA0-40D5-BA2D-8EC268A30530", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:intel:server_board_s2600bpq_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "9DB2F02B-5486-45C0-A505-3F7D953B6875", versionEndExcluding: "02.01.0015", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:intel:server_board_s2600bpq:-:*:*:*:*:*:*:*", matchCriteriaId: "2C243BA0-42DD-417A-B080-F102A3C53CCD", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:intel:compute_module_hns2600bpblcr_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "EF1DD8AF-C1EA-472E-8741-AECBEAAF13AF", versionEndExcluding: "02.01.0015", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:intel:compute_module_hns2600bpblcr:-:*:*:*:*:*:*:*", matchCriteriaId: "B1797A5C-10D0-4874-800B-E2E11E87BEEF", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:intel:compute_module_hns2600bpblc_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "18D84868-327D-4EB8-87C2-BED687BC9CC7", versionEndExcluding: "02.01.0015", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:intel:compute_module_hns2600bpblc:-:*:*:*:*:*:*:*", matchCriteriaId: "32262A66-91B4-4F3A-9C6C-720746C4E5E5", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:intel:compute_module_hns2600bpblc24r_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "3D45D4DC-DA61-4A6A-B2D8-3CD680BE8325", versionEndExcluding: "02.01.0015", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:intel:compute_module_hns2600bpblc24r:-:*:*:*:*:*:*:*", matchCriteriaId: "CA6AD771-8195-4725-83D0-AAAAA3CF1A53", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:intel:compute_module_hns2600bps_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "0190BDDD-B096-4421-8216-9427D978AED4", versionEndExcluding: "02.01.0015", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:intel:compute_module_hns2600bps:-:*:*:*:*:*:*:*", matchCriteriaId: "9711E78E-0D83-42DB-9D7A-16F4F9A9DAA4", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:intel:compute_module_hns2600bps24_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "F258BCD5-6DE3-4634-AB9C-A90EE0DEEABD", versionEndExcluding: "02.01.0015", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:intel:compute_module_hns2600bps24:-:*:*:*:*:*:*:*", matchCriteriaId: "0CFF3C55-6890-4E40-99C5-C3AA7FA10526", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:intel:compute_module_hns2600bpbr_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "E50495D1-291E-49DE-B89A-2A0F85964C66", versionEndExcluding: "02.01.0015", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:intel:compute_module_hns2600bpbr:-:*:*:*:*:*:*:*", matchCriteriaId: "345D9886-97FD-497C-9413-6A7BEAA6A3CA", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:intel:compute_module_hns2600bpqr_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "B6ABB575-106A-48C2-AEF6-D9874A196947", versionEndExcluding: "02.01.0015", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:intel:compute_module_hns2600bpqr:-:*:*:*:*:*:*:*", matchCriteriaId: "CC923696-6BD3-47BB-A87A-92005F9969F4", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:intel:compute_module_hns2600bpsr_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "0931828C-42DF-459F-87CA-73B0950E5D99", versionEndExcluding: "02.01.0015", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:intel:compute_module_hns2600bpsr:-:*:*:*:*:*:*:*", matchCriteriaId: "DB1A914A-D272-4CB0-9094-94C1FF4F3085", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:intel:compute_module_hns2600bps24r_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "6291095D-E752-4F46-A60B-75CFB913A396", versionEndExcluding: "02.01.0015", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:intel:compute_module_hns2600bps24r:-:*:*:*:*:*:*:*", matchCriteriaId: "BC8912C2-F121-4684-B264-871708D17E69", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:intel:compute_module_hns2600bpq24r_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "E7A5A3C0-63A4-4179-BC12-1E3CAFFE8AC3", versionEndExcluding: "02.01.0015", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:intel:compute_module_hns2600bpq24r:-:*:*:*:*:*:*:*", matchCriteriaId: "6B368AC9-CEDA-4D9A-BE58-384E01E581A1", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:intel:compute_module_hns2600bpb24_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "9CEC56EC-7DBE-40E9-8F59-DC9FA11201CC", versionEndExcluding: "02.01.0015", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:intel:compute_module_hns2600bpb24:-:*:*:*:*:*:*:*", matchCriteriaId: "DDE416FA-6492-4B6D-90F5-E070492A8B5B", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:intel:compute_module_hns2600bpb_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "7BE65260-1164-402D-B449-1239F1163F6F", versionEndExcluding: "02.01.0015", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:intel:compute_module_hns2600bpb:-:*:*:*:*:*:*:*", matchCriteriaId: "840C1EB2-1733-4B30-9BFD-18C6DE4278F3", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:intel:compute_module_hns2600bpblc24_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "AE5A8102-1061-4EDB-885B-51861C68E978", versionEndExcluding: "02.01.0015", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:intel:compute_module_hns2600bpblc24:-:*:*:*:*:*:*:*", matchCriteriaId: "6F39C203-2002-42FD-92CB-E10F191A23FA", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:intel:compute_module_hns2600bpq_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "A135CF8D-5107-4950-929F-8AD1F8EB6EAA", versionEndExcluding: "02.01.0015", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:intel:compute_module_hns2600bpq:-:*:*:*:*:*:*:*", matchCriteriaId: "BBB18487-735C-4663-90FF-B2A17F725CEE", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:intel:compute_module_hns2600bpq24_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "AE7AEFA1-3623-46A7-9E0B-934E65D50F41", versionEndExcluding: "02.01.0015", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:intel:compute_module_hns2600bpq24:-:*:*:*:*:*:*:*", matchCriteriaId: "3A44103A-AFAD-45FD-A40B-22AD0E02857C", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:intel:compute_module_liquid-cooled_hns2600bpbrct_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "9860D40F-5D10-4439-ABE2-3A0F34639987", versionEndExcluding: "02.01.0015", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:intel:compute_module_liquid-cooled_hns2600bpbrct:-:*:*:*:*:*:*:*", matchCriteriaId: "88E13428-34E0-4261-A8A4-366A0F8EA757", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:intel:server_system_vrn2224bpaf6_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "76A27F1F-BD15-47DE-B807-8C3475F0D91F", versionEndExcluding: "02.01.0015", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:intel:server_system_vrn2224bpaf6:-:*:*:*:*:*:*:*", matchCriteriaId: "A024137B-5C8D-4631-95CD-76015C8444A3", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:intel:server_system_vrn2224bphy6_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "57ECA099-6FBB-49CA-8FE0-4DEFC9B428AC", versionEndExcluding: "02.01.0015", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:intel:server_system_vrn2224bphy6:-:*:*:*:*:*:*:*", matchCriteriaId: "7D4F6641-4B1E-4E62-B5E0-51FD1B9C4EA7", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:intel:server_system_mcb2208wfaf5_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "2CA8EB9F-9B7D-473C-B1CE-6745752FDD01", versionEndExcluding: "02.01.0015", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:intel:server_system_mcb2208wfaf5:-:*:*:*:*:*:*:*", matchCriteriaId: "FF79097A-8552-4D5A-884A-3D63EFC8E621", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:intel:server_system_zsb2224bpaf2_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "5C93A98E-3C72-4835-A816-D7AB2B51ABEC", versionEndExcluding: "02.01.0015", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:intel:server_system_zsb2224bpaf2:-:*:*:*:*:*:*:*", matchCriteriaId: "612AD14A-E5FC-4EEB-A658-F6508979C4A2", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:intel:server_system_zsb2224bphy1_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "C18886DA-81CB-489D-9C61-808B05A8C24A", versionEndExcluding: "02.01.0015", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:intel:server_system_zsb2224bphy1:-:*:*:*:*:*:*:*", matchCriteriaId: "764C96DC-97F9-4B2C-9A81-D9305E51EC85", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:intel:server_system_zsb2224bpaf1_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "15DB8AF7-38C3-45C4-8F8D-949A124EA695", versionEndExcluding: "02.01.0015", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:intel:server_system_zsb2224bpaf1:-:*:*:*:*:*:*:*", matchCriteriaId: "018633EC-CB3D-4A28-87E9-F980D6860282", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, ], cveTags: [], descriptions: [ { lang: "en", value: "Improper buffer restrictions in some Intel(R) Server Board BIOS firmware may allow a privileged user to potentially enable escalation of privilege via local access.", }, { lang: "es", value: "Las restricciones inadecuadas del búfer en Intel(R) Server Board BIOS firmware pueden permitir que un usuario privilegiado habilite potencialmente la escalada de privilegios a través del acceso local.", }, ], id: "CVE-2022-29262", lastModified: "2024-11-21T06:58:49.587", metrics: { cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "HIGH", baseScore: 7.9, baseSeverity: "HIGH", confidentialityImpact: "NONE", integrityImpact: "HIGH", privilegesRequired: "HIGH", scope: "CHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:H/A:H", version: "3.1", }, exploitabilityScore: 1.5, impactScore: 5.8, source: "secure@intel.com", type: "Secondary", }, { cvssData: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "HIGH", baseScore: 6.7, baseSeverity: "MEDIUM", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "HIGH", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, exploitabilityScore: 0.8, impactScore: 5.9, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2023-11-14T19:15:11.020", references: [ { source: "secure@intel.com", tags: [ "Patch", "Vendor Advisory", ], url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00719.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Patch", "Vendor Advisory", ], url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00719.html", }, ], sourceIdentifier: "secure@intel.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-92", }, ], source: "secure@intel.com", type: "Secondary", }, { description: [ { lang: "en", value: "NVD-CWE-noinfo", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2023-11-14 19:15
Modified
2024-11-21 07:08
Severity ?
8.2 (High) - CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H
6.7 (Medium) - CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
6.7 (Medium) - CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
Summary
Improper input validation in some Intel(R) Server board and Intel(R) Server System BIOS firmware may allow a privileged user to potentially enable escalation of privilege via local access.
References
Impacted products
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:intel:server_board_m70klp2sb_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "B527A5B5-60EA-4488-AAF8-9DB30843D4FB", versionEndExcluding: "01.04.0022", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:intel:server_board_m70klp2sb:-:*:*:*:*:*:*:*", matchCriteriaId: "2C473084-B18C-4307-9733-7B9CE9E2D9C4", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:intel:server_system_m70klp4s2uhh_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "D7D0F31B-369C-4B52-A164-8E8C4F354104", versionEndExcluding: "01.04.0022", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:intel:server_system_m70klp4s2uhh:-:*:*:*:*:*:*:*", matchCriteriaId: "EB396EC4-E034-4E2C-AEAA-1BE5E8F43E11", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:intel:server_board_m20ntp2sb_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "65F66C02-F23E-4BC8-B2FA-D5B19C09376E", versionEndExcluding: "0022.d02", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:intel:server_board_m20ntp2sb:-:*:*:*:*:*:*:*", matchCriteriaId: "0D38ACC2-646B-44C2-B9B0-43FA4BECF487", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:intel:server_system_m20ntp1ur304_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "E40AA36D-D91E-40FB-9AD7-6967EC804786", versionEndExcluding: "0022.d02", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:intel:server_system_m20ntp1ur304:-:*:*:*:*:*:*:*", matchCriteriaId: "10B8E6BE-1AD7-43CF-AD4B-590738A27B04", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:intel:server_board_m10jnp2sb_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "3C7464A9-6B5D-40EE-9F5F-E93BF5A334EE", versionEndExcluding: "7.219", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:intel:server_board_m10jnp2sb:-:*:*:*:*:*:*:*", matchCriteriaId: "8EAE5D89-ADEC-4F26-B555-52971EEE18A3", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:intel:server_board_s2600bpbr_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "E64B3B0E-0B71-4268-9264-85899BB8099A", versionEndExcluding: "02.01.0015", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:intel:server_board_s2600bpbr:-:*:*:*:*:*:*:*", matchCriteriaId: "1EF2A748-40E2-4F2E-9516-78C9E6DBA4AF", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:intel:server_board_s2600bps_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "01584E1F-1CFC-4D85-AE63-AB5DF4487BA6", versionEndExcluding: "02.01.0015", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:intel:server_board_s2600bps:-:*:*:*:*:*:*:*", matchCriteriaId: "5C2EB283-D51C-495C-A645-AD27293A25FC", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:intel:server_board_s2600bpsr_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "B5BFB798-2C10-4B89-A33A-C09D325AA624", versionEndExcluding: "02.01.0015", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:intel:server_board_s2600bpsr:-:*:*:*:*:*:*:*", matchCriteriaId: "76ACEDD9-68F4-4EFE-9725-16447C18291C", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:intel:server_board_s2600bpqr_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "FE22EC88-0174-4CF8-9277-ED84E781C4A1", versionEndExcluding: "02.01.0015", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:intel:server_board_s2600bpqr:-:*:*:*:*:*:*:*", matchCriteriaId: "5674D660-DEB6-4AF9-8B0D-F57ECC4DC533", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:intel:server_board_s2600bpb_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "6666119A-761D-47C8-B50A-D168C01C2641", versionEndExcluding: "02.01.0015", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:intel:server_board_s2600bpb:-:*:*:*:*:*:*:*", matchCriteriaId: "6E7B114F-1EA0-40D5-BA2D-8EC268A30530", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:intel:server_board_s2600bpq_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "9DB2F02B-5486-45C0-A505-3F7D953B6875", versionEndExcluding: "02.01.0015", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:intel:server_board_s2600bpq:-:*:*:*:*:*:*:*", matchCriteriaId: "2C243BA0-42DD-417A-B080-F102A3C53CCD", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:intel:compute_module_hns2600bpblcr_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "EF1DD8AF-C1EA-472E-8741-AECBEAAF13AF", versionEndExcluding: "02.01.0015", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:intel:compute_module_hns2600bpblcr:-:*:*:*:*:*:*:*", matchCriteriaId: "B1797A5C-10D0-4874-800B-E2E11E87BEEF", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:intel:compute_module_hns2600bpblc_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "18D84868-327D-4EB8-87C2-BED687BC9CC7", versionEndExcluding: "02.01.0015", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:intel:compute_module_hns2600bpblc:-:*:*:*:*:*:*:*", matchCriteriaId: "32262A66-91B4-4F3A-9C6C-720746C4E5E5", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:intel:compute_module_hns2600bpblc24r_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "3D45D4DC-DA61-4A6A-B2D8-3CD680BE8325", versionEndExcluding: "02.01.0015", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:intel:compute_module_hns2600bpblc24r:-:*:*:*:*:*:*:*", matchCriteriaId: "CA6AD771-8195-4725-83D0-AAAAA3CF1A53", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:intel:compute_module_hns2600bps_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "0190BDDD-B096-4421-8216-9427D978AED4", versionEndExcluding: "02.01.0015", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:intel:compute_module_hns2600bps:-:*:*:*:*:*:*:*", matchCriteriaId: "9711E78E-0D83-42DB-9D7A-16F4F9A9DAA4", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:intel:compute_module_hns2600bps24_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "F258BCD5-6DE3-4634-AB9C-A90EE0DEEABD", versionEndExcluding: "02.01.0015", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:intel:compute_module_hns2600bps24:-:*:*:*:*:*:*:*", matchCriteriaId: "0CFF3C55-6890-4E40-99C5-C3AA7FA10526", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:intel:compute_module_hns2600bpbr_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "E50495D1-291E-49DE-B89A-2A0F85964C66", versionEndExcluding: "02.01.0015", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:intel:compute_module_hns2600bpbr:-:*:*:*:*:*:*:*", matchCriteriaId: "345D9886-97FD-497C-9413-6A7BEAA6A3CA", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:intel:compute_module_hns2600bpqr_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "B6ABB575-106A-48C2-AEF6-D9874A196947", versionEndExcluding: "02.01.0015", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:intel:compute_module_hns2600bpqr:-:*:*:*:*:*:*:*", matchCriteriaId: "CC923696-6BD3-47BB-A87A-92005F9969F4", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:intel:compute_module_hns2600bpsr_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "0931828C-42DF-459F-87CA-73B0950E5D99", versionEndExcluding: "02.01.0015", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:intel:compute_module_hns2600bpsr:-:*:*:*:*:*:*:*", matchCriteriaId: "DB1A914A-D272-4CB0-9094-94C1FF4F3085", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:intel:compute_module_hns2600bps24r_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "6291095D-E752-4F46-A60B-75CFB913A396", versionEndExcluding: "02.01.0015", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:intel:compute_module_hns2600bps24r:-:*:*:*:*:*:*:*", matchCriteriaId: "BC8912C2-F121-4684-B264-871708D17E69", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:intel:compute_module_hns2600bpq24r_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "E7A5A3C0-63A4-4179-BC12-1E3CAFFE8AC3", versionEndExcluding: "02.01.0015", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:intel:compute_module_hns2600bpq24r:-:*:*:*:*:*:*:*", matchCriteriaId: "6B368AC9-CEDA-4D9A-BE58-384E01E581A1", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:intel:compute_module_hns2600bpb24_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "9CEC56EC-7DBE-40E9-8F59-DC9FA11201CC", versionEndExcluding: "02.01.0015", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:intel:compute_module_hns2600bpb24:-:*:*:*:*:*:*:*", matchCriteriaId: "DDE416FA-6492-4B6D-90F5-E070492A8B5B", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:intel:compute_module_hns2600bpb_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "7BE65260-1164-402D-B449-1239F1163F6F", versionEndExcluding: "02.01.0015", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:intel:compute_module_hns2600bpb:-:*:*:*:*:*:*:*", matchCriteriaId: "840C1EB2-1733-4B30-9BFD-18C6DE4278F3", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:intel:compute_module_hns2600bpblc24_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "AE5A8102-1061-4EDB-885B-51861C68E978", versionEndExcluding: "02.01.0015", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:intel:compute_module_hns2600bpblc24:-:*:*:*:*:*:*:*", matchCriteriaId: "6F39C203-2002-42FD-92CB-E10F191A23FA", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:intel:compute_module_hns2600bpq_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "A135CF8D-5107-4950-929F-8AD1F8EB6EAA", versionEndExcluding: "02.01.0015", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:intel:compute_module_hns2600bpq:-:*:*:*:*:*:*:*", matchCriteriaId: "BBB18487-735C-4663-90FF-B2A17F725CEE", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:intel:compute_module_hns2600bpq24_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "AE7AEFA1-3623-46A7-9E0B-934E65D50F41", versionEndExcluding: "02.01.0015", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:intel:compute_module_hns2600bpq24:-:*:*:*:*:*:*:*", matchCriteriaId: "3A44103A-AFAD-45FD-A40B-22AD0E02857C", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:intel:compute_module_liquid-cooled_hns2600bpbrct_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "9860D40F-5D10-4439-ABE2-3A0F34639987", versionEndExcluding: "02.01.0015", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:intel:compute_module_liquid-cooled_hns2600bpbrct:-:*:*:*:*:*:*:*", matchCriteriaId: "88E13428-34E0-4261-A8A4-366A0F8EA757", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:intel:server_system_vrn2224bpaf6_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "76A27F1F-BD15-47DE-B807-8C3475F0D91F", versionEndExcluding: "02.01.0015", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:intel:server_system_vrn2224bpaf6:-:*:*:*:*:*:*:*", matchCriteriaId: "A024137B-5C8D-4631-95CD-76015C8444A3", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:intel:server_system_vrn2224bphy6_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "57ECA099-6FBB-49CA-8FE0-4DEFC9B428AC", versionEndExcluding: "02.01.0015", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:intel:server_system_vrn2224bphy6:-:*:*:*:*:*:*:*", matchCriteriaId: "7D4F6641-4B1E-4E62-B5E0-51FD1B9C4EA7", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:intel:server_system_mcb2208wfaf5_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "2CA8EB9F-9B7D-473C-B1CE-6745752FDD01", versionEndExcluding: "02.01.0015", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:intel:server_system_mcb2208wfaf5:-:*:*:*:*:*:*:*", matchCriteriaId: "FF79097A-8552-4D5A-884A-3D63EFC8E621", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:intel:server_system_zsb2224bpaf2_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "5C93A98E-3C72-4835-A816-D7AB2B51ABEC", versionEndExcluding: "02.01.0015", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:intel:server_system_zsb2224bpaf2:-:*:*:*:*:*:*:*", matchCriteriaId: "612AD14A-E5FC-4EEB-A658-F6508979C4A2", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:intel:server_system_zsb2224bphy1_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "C18886DA-81CB-489D-9C61-808B05A8C24A", versionEndExcluding: "02.01.0015", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:intel:server_system_zsb2224bphy1:-:*:*:*:*:*:*:*", matchCriteriaId: "764C96DC-97F9-4B2C-9A81-D9305E51EC85", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:intel:server_system_zsb2224bpaf1_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "15DB8AF7-38C3-45C4-8F8D-949A124EA695", versionEndExcluding: "02.01.0015", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:intel:server_system_zsb2224bpaf1:-:*:*:*:*:*:*:*", matchCriteriaId: "018633EC-CB3D-4A28-87E9-F980D6860282", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, ], cveTags: [], descriptions: [ { lang: "en", value: "Improper input validation in some Intel(R) Server board and Intel(R) Server System BIOS firmware may allow a privileged user to potentially enable escalation of privilege via local access.", }, { lang: "es", value: "La validación de entrada incorrecta en Intel(R) Server Board y Intel(R) Server System BIOS firmware puede permitir que un usuario privilegiado habilite potencialmente la escalada de privilegios a través del acceso local.", }, ], id: "CVE-2022-33945", lastModified: "2024-11-21T07:08:39.500", metrics: { cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "HIGH", baseScore: 8.2, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "HIGH", scope: "CHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H", version: "3.1", }, exploitabilityScore: 1.5, impactScore: 6, source: "secure@intel.com", type: "Secondary", }, { cvssData: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "HIGH", baseScore: 6.7, baseSeverity: "MEDIUM", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "HIGH", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, exploitabilityScore: 0.8, impactScore: 5.9, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2023-11-14T19:15:11.617", references: [ { source: "secure@intel.com", tags: [ "Patch", "Vendor Advisory", ], url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00719.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Patch", "Vendor Advisory", ], url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00719.html", }, ], sourceIdentifier: "secure@intel.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-20", }, ], source: "secure@intel.com", type: "Secondary", }, { description: [ { lang: "en", value: "NVD-CWE-noinfo", }, ], source: "nvd@nist.gov", type: "Primary", }, { description: [ { lang: "en", value: "CWE-20", }, ], source: "134c704f-9b21-4f2e-91b3-4a467353bcc0", type: "Secondary", }, ], }
Vulnerability from fkie_nvd
Published
2023-11-14 19:15
Modified
2024-11-21 08:07
Severity ?
8.2 (High) - CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H
6.7 (Medium) - CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
6.7 (Medium) - CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
Summary
Improper input validation in some Intel(R) Server Board BIOS firmware may allow a privileged user to potentially enable escalation of privilege via local access
References
Impacted products
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:intel:server_board_m70klp2sb_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "B527A5B5-60EA-4488-AAF8-9DB30843D4FB", versionEndExcluding: "01.04.0022", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:intel:server_board_m70klp2sb:-:*:*:*:*:*:*:*", matchCriteriaId: "2C473084-B18C-4307-9733-7B9CE9E2D9C4", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:intel:server_system_m70klp4s2uhh_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "D7D0F31B-369C-4B52-A164-8E8C4F354104", versionEndExcluding: "01.04.0022", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:intel:server_system_m70klp4s2uhh:-:*:*:*:*:*:*:*", matchCriteriaId: "EB396EC4-E034-4E2C-AEAA-1BE5E8F43E11", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:intel:server_board_m20ntp2sb_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "65F66C02-F23E-4BC8-B2FA-D5B19C09376E", versionEndExcluding: "0022.d02", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:intel:server_board_m20ntp2sb:-:*:*:*:*:*:*:*", matchCriteriaId: "0D38ACC2-646B-44C2-B9B0-43FA4BECF487", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:intel:server_system_m20ntp1ur304_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "E40AA36D-D91E-40FB-9AD7-6967EC804786", versionEndExcluding: "0022.d02", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:intel:server_system_m20ntp1ur304:-:*:*:*:*:*:*:*", matchCriteriaId: "10B8E6BE-1AD7-43CF-AD4B-590738A27B04", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:intel:server_board_m10jnp2sb_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "3C7464A9-6B5D-40EE-9F5F-E93BF5A334EE", versionEndExcluding: "7.219", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:intel:server_board_m10jnp2sb:-:*:*:*:*:*:*:*", matchCriteriaId: "8EAE5D89-ADEC-4F26-B555-52971EEE18A3", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:intel:server_board_s2600bpbr_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "E64B3B0E-0B71-4268-9264-85899BB8099A", versionEndExcluding: "02.01.0015", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:intel:server_board_s2600bpbr:-:*:*:*:*:*:*:*", matchCriteriaId: "1EF2A748-40E2-4F2E-9516-78C9E6DBA4AF", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:intel:server_board_s2600bps_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "01584E1F-1CFC-4D85-AE63-AB5DF4487BA6", versionEndExcluding: "02.01.0015", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:intel:server_board_s2600bps:-:*:*:*:*:*:*:*", matchCriteriaId: "5C2EB283-D51C-495C-A645-AD27293A25FC", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:intel:server_board_s2600bpsr_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "B5BFB798-2C10-4B89-A33A-C09D325AA624", versionEndExcluding: "02.01.0015", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:intel:server_board_s2600bpsr:-:*:*:*:*:*:*:*", matchCriteriaId: "76ACEDD9-68F4-4EFE-9725-16447C18291C", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:intel:server_board_s2600bpqr_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "FE22EC88-0174-4CF8-9277-ED84E781C4A1", versionEndExcluding: "02.01.0015", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:intel:server_board_s2600bpqr:-:*:*:*:*:*:*:*", matchCriteriaId: "5674D660-DEB6-4AF9-8B0D-F57ECC4DC533", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:intel:server_board_s2600bpb_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "6666119A-761D-47C8-B50A-D168C01C2641", versionEndExcluding: "02.01.0015", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:intel:server_board_s2600bpb:-:*:*:*:*:*:*:*", matchCriteriaId: "6E7B114F-1EA0-40D5-BA2D-8EC268A30530", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:intel:server_board_s2600bpq_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "9DB2F02B-5486-45C0-A505-3F7D953B6875", versionEndExcluding: "02.01.0015", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:intel:server_board_s2600bpq:-:*:*:*:*:*:*:*", matchCriteriaId: "2C243BA0-42DD-417A-B080-F102A3C53CCD", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:intel:compute_module_hns2600bpblcr_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "EF1DD8AF-C1EA-472E-8741-AECBEAAF13AF", versionEndExcluding: "02.01.0015", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:intel:compute_module_hns2600bpblcr:-:*:*:*:*:*:*:*", matchCriteriaId: "B1797A5C-10D0-4874-800B-E2E11E87BEEF", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:intel:compute_module_hns2600bpblc_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "18D84868-327D-4EB8-87C2-BED687BC9CC7", versionEndExcluding: "02.01.0015", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:intel:compute_module_hns2600bpblc:-:*:*:*:*:*:*:*", matchCriteriaId: "32262A66-91B4-4F3A-9C6C-720746C4E5E5", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:intel:compute_module_hns2600bpblc24r_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "3D45D4DC-DA61-4A6A-B2D8-3CD680BE8325", versionEndExcluding: "02.01.0015", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:intel:compute_module_hns2600bpblc24r:-:*:*:*:*:*:*:*", matchCriteriaId: "CA6AD771-8195-4725-83D0-AAAAA3CF1A53", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:intel:compute_module_hns2600bps_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "0190BDDD-B096-4421-8216-9427D978AED4", versionEndExcluding: "02.01.0015", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:intel:compute_module_hns2600bps:-:*:*:*:*:*:*:*", matchCriteriaId: "9711E78E-0D83-42DB-9D7A-16F4F9A9DAA4", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:intel:compute_module_hns2600bps24_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "F258BCD5-6DE3-4634-AB9C-A90EE0DEEABD", versionEndExcluding: "02.01.0015", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:intel:compute_module_hns2600bps24:-:*:*:*:*:*:*:*", matchCriteriaId: "0CFF3C55-6890-4E40-99C5-C3AA7FA10526", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:intel:compute_module_hns2600bpbr_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "E50495D1-291E-49DE-B89A-2A0F85964C66", versionEndExcluding: "02.01.0015", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:intel:compute_module_hns2600bpbr:-:*:*:*:*:*:*:*", matchCriteriaId: "345D9886-97FD-497C-9413-6A7BEAA6A3CA", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:intel:compute_module_hns2600bpqr_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "B6ABB575-106A-48C2-AEF6-D9874A196947", versionEndExcluding: "02.01.0015", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:intel:compute_module_hns2600bpqr:-:*:*:*:*:*:*:*", matchCriteriaId: "CC923696-6BD3-47BB-A87A-92005F9969F4", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:intel:compute_module_hns2600bpsr_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "0931828C-42DF-459F-87CA-73B0950E5D99", versionEndExcluding: "02.01.0015", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:intel:compute_module_hns2600bpsr:-:*:*:*:*:*:*:*", matchCriteriaId: "DB1A914A-D272-4CB0-9094-94C1FF4F3085", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:intel:compute_module_hns2600bps24r_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "6291095D-E752-4F46-A60B-75CFB913A396", versionEndExcluding: "02.01.0015", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:intel:compute_module_hns2600bps24r:-:*:*:*:*:*:*:*", matchCriteriaId: "BC8912C2-F121-4684-B264-871708D17E69", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:intel:compute_module_hns2600bpq24r_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "E7A5A3C0-63A4-4179-BC12-1E3CAFFE8AC3", versionEndExcluding: "02.01.0015", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:intel:compute_module_hns2600bpq24r:-:*:*:*:*:*:*:*", matchCriteriaId: "6B368AC9-CEDA-4D9A-BE58-384E01E581A1", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:intel:compute_module_hns2600bpb24_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "9CEC56EC-7DBE-40E9-8F59-DC9FA11201CC", versionEndExcluding: "02.01.0015", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:intel:compute_module_hns2600bpb24:-:*:*:*:*:*:*:*", matchCriteriaId: "DDE416FA-6492-4B6D-90F5-E070492A8B5B", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:intel:compute_module_hns2600bpb_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "7BE65260-1164-402D-B449-1239F1163F6F", versionEndExcluding: "02.01.0015", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:intel:compute_module_hns2600bpb:-:*:*:*:*:*:*:*", matchCriteriaId: "840C1EB2-1733-4B30-9BFD-18C6DE4278F3", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:intel:compute_module_hns2600bpblc24_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "AE5A8102-1061-4EDB-885B-51861C68E978", versionEndExcluding: "02.01.0015", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:intel:compute_module_hns2600bpblc24:-:*:*:*:*:*:*:*", matchCriteriaId: "6F39C203-2002-42FD-92CB-E10F191A23FA", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:intel:compute_module_hns2600bpq_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "A135CF8D-5107-4950-929F-8AD1F8EB6EAA", versionEndExcluding: "02.01.0015", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:intel:compute_module_hns2600bpq:-:*:*:*:*:*:*:*", matchCriteriaId: "BBB18487-735C-4663-90FF-B2A17F725CEE", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:intel:compute_module_hns2600bpq24_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "AE7AEFA1-3623-46A7-9E0B-934E65D50F41", versionEndExcluding: "02.01.0015", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:intel:compute_module_hns2600bpq24:-:*:*:*:*:*:*:*", matchCriteriaId: "3A44103A-AFAD-45FD-A40B-22AD0E02857C", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:intel:compute_module_liquid-cooled_hns2600bpbrct_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "9860D40F-5D10-4439-ABE2-3A0F34639987", versionEndExcluding: "02.01.0015", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:intel:compute_module_liquid-cooled_hns2600bpbrct:-:*:*:*:*:*:*:*", matchCriteriaId: "88E13428-34E0-4261-A8A4-366A0F8EA757", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:intel:server_system_vrn2224bpaf6_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "76A27F1F-BD15-47DE-B807-8C3475F0D91F", versionEndExcluding: "02.01.0015", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:intel:server_system_vrn2224bpaf6:-:*:*:*:*:*:*:*", matchCriteriaId: "A024137B-5C8D-4631-95CD-76015C8444A3", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:intel:server_system_vrn2224bphy6_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "57ECA099-6FBB-49CA-8FE0-4DEFC9B428AC", versionEndExcluding: "02.01.0015", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:intel:server_system_vrn2224bphy6:-:*:*:*:*:*:*:*", matchCriteriaId: "7D4F6641-4B1E-4E62-B5E0-51FD1B9C4EA7", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:intel:server_system_mcb2208wfaf5_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "2CA8EB9F-9B7D-473C-B1CE-6745752FDD01", versionEndExcluding: "02.01.0015", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:intel:server_system_mcb2208wfaf5:-:*:*:*:*:*:*:*", matchCriteriaId: "FF79097A-8552-4D5A-884A-3D63EFC8E621", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:intel:server_system_zsb2224bpaf2_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "5C93A98E-3C72-4835-A816-D7AB2B51ABEC", versionEndExcluding: "02.01.0015", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:intel:server_system_zsb2224bpaf2:-:*:*:*:*:*:*:*", matchCriteriaId: "612AD14A-E5FC-4EEB-A658-F6508979C4A2", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:intel:server_system_zsb2224bphy1_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "C18886DA-81CB-489D-9C61-808B05A8C24A", versionEndExcluding: "02.01.0015", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:intel:server_system_zsb2224bphy1:-:*:*:*:*:*:*:*", matchCriteriaId: "764C96DC-97F9-4B2C-9A81-D9305E51EC85", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:intel:server_system_zsb2224bpaf1_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "15DB8AF7-38C3-45C4-8F8D-949A124EA695", versionEndExcluding: "02.01.0015", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:intel:server_system_zsb2224bpaf1:-:*:*:*:*:*:*:*", matchCriteriaId: "018633EC-CB3D-4A28-87E9-F980D6860282", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, ], cveTags: [], descriptions: [ { lang: "en", value: "Improper input validation in some Intel(R) Server Board BIOS firmware may allow a privileged user to potentially enable escalation of privilege via local access", }, { lang: "es", value: "La validación de entrada incorrecta en Intel(R) Server Board BIOS firmware puede permitir que un usuario privilegiado habilite potencialmente la escalada de privilegios a través del acceso local.", }, ], id: "CVE-2023-34431", lastModified: "2024-11-21T08:07:13.497", metrics: { cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "HIGH", baseScore: 8.2, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "HIGH", scope: "CHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H", version: "3.1", }, exploitabilityScore: 1.5, impactScore: 6, source: "secure@intel.com", type: "Secondary", }, { cvssData: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "HIGH", baseScore: 6.7, baseSeverity: "MEDIUM", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "HIGH", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, exploitabilityScore: 0.8, impactScore: 5.9, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2023-11-14T19:15:28.417", references: [ { source: "secure@intel.com", tags: [ "Patch", "Vendor Advisory", ], url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00719.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Patch", "Vendor Advisory", ], url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00719.html", }, ], sourceIdentifier: "secure@intel.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-20", }, ], source: "secure@intel.com", type: "Secondary", }, { description: [ { lang: "en", value: "NVD-CWE-noinfo", }, ], source: "nvd@nist.gov", type: "Primary", }, { description: [ { lang: "en", value: "CWE-20", }, ], source: "134c704f-9b21-4f2e-91b3-4a467353bcc0", type: "Secondary", }, ], }