{"vulnerability": "CVE-2022-33942", "sightings": [{"uuid": "d5a05b19-7578-47dc-83d1-339b5968e249", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-33942", "type": "published-proof-of-concept", "source": "https://t.me/yafcab/23", "content": "\u041a\u0440\u0443\u0442\u0443\u044e \u0441\u0442\u0430\u0442\u044c\u044e \u043d\u0430\u0448\u0451\u043b, \u0440\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0443\u044e \u043a \u043f\u0440\u043e\u0447\u0442\u0435\u043d\u0438\u044e \nhttps://www.rcesecurity.com/2022/11/from-zero-to-hero-part-1-bypassing-intel-dcms-authentication-cve-2022-33942/", "creation_timestamp": "2022-11-26T18:36:05.000000Z"}, {"uuid": "8aae380f-9022-477e-9179-4b0b0bafb769", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-33942", "type": "published-proof-of-concept", "source": "https://t.me/thebugbountyhunter/6732", "content": "From Zero to Hero Part 1: Bypassing Intel DCM\u2019s Authentication by Spoofing Kerberos and LDAP Responses (CVE-2022-33942)\n\nhttps://www.rcesecurity.com/2022/11/from-zero-to-hero-part-1-bypassing-intel-dcms-authentication-cve-2022-33942/", "creation_timestamp": "2022-11-24T02:40:00.000000Z"}, {"uuid": "8cb25894-5502-41ae-bcef-6597bd5783db", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-33942", "type": "published-proof-of-concept", "source": "https://t.me/crackcodes/1500", "content": "#Offensive_security\n1. Linux Password Mining\nhttps://medium.com/@tinopreter/linux-password-mining-58e341635f1c\n2. Bypassing Intel DCM\u2019s Authentication by Spoofing Kerberos and LDAP Responses (CVE-2022-33942)\nhttps://www.rcesecurity.com/2022/11/from-zero-to-hero-part-1-bypassing-intel-dcms-authentication-cve-2022-33942", "creation_timestamp": "2022-11-26T15:13:50.000000Z"}, {"uuid": "fa26ea7d-a4e5-4c18-bdc9-b9ac732e1ce4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-33942", "type": "seen", "source": "https://t.me/cibsecurity/52882", "content": "\u203c CVE-2022-33942 \u203c\n\nProtection mechanism failure in the Intel(R) DCM software before version 5.0 may allow an unauthenticated user to potentially enable escalation of privilege via adjacent access.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-11-13T05:45:12.000000Z"}, {"uuid": "5af4b00d-8679-4502-ba7c-c48d22a813f3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-33942", "type": "published-proof-of-concept", "source": "https://t.me/CyberSecurityTechnologies/7236", "content": "#Offensive_security\n1. Linux Password Mining\nhttps://medium.com/@tinopreter/linux-password-mining-58e341635f1c\n2. Bypassing Intel DCM\u2019s Authentication by Spoofing Kerberos and LDAP Responses (CVE-2022-33942)\nhttps://www.rcesecurity.com/2022/11/from-zero-to-hero-part-1-bypassing-intel-dcms-authentication-cve-2022-33942", "creation_timestamp": "2022-11-24T15:41:03.000000Z"}]}