CERTFR-2022-AVI-727
Vulnerability from certfr_avis

De multiples vulnérabilités ont été découvertes dans les produits Intel. Certaines d'entre elles permettent à un attaquant de provoquer un déni de service, une atteinte à l'intégrité des données et une atteinte à la confidentialité des données.

Solution

Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).

None
Impacted products
Vendor Product Description
Intel N/A Intel 722 Series Ethernet contrôleurs et adaptateurs versions antérieures à 1.5.5
Intel N/A Intel Killer™ WiFi versions antérieures à 3.1122.1105
Intel N/A Open AMT Cloud Toolkit versions antérieures à 2.0.2 et 2.2.2
Intel N/A Intel E810 Ethernet contrôleurs et adaptateurs versions antérieures à 1.6.1.9
Intel N/A Intel Support Android versions antérieures à 21.7.40
Intel N/A Intel Team Blue toutes versions
Intel N/A Intel IPP Cryptography versions antérieures à 2021.5
Intel N/A Intel VTune™ Profiler versions antérieures à 2022.2.0
Intel N/A Intel Processors (veuillez vous référer aux avis de l'éditeur : intel-sa-00706 et intel-sa-00657)
Intel N/A Intel Edge Insights pour les versions Industrial antérieures à 2.6.1
Intel N/A Intel Standard Manageability toutes versions
Intel N/A Intel Data Center Manager versions antérieures à 4.1
Intel N/A Intel PROSet/Wireless WiFi versions antérieure à 22.120
Intel N/A Intel Datacenter Group Event Android toutes versions
Intel N/A Intel SPS versions antérieures à SPS_E3_04.08.04.330.0 et SPS_E3_04.01.04.530.0
Intel N/A Intel Ethernet 700 Series Controller drivers pour les versions VMware antérieures à 2.1.5.0
Intel N/A Intel 700 Series Ethernet contrôleurs et adaptateurs versions antérieures à 8.5
Intel N/A Intel DSA versions antérieures 22.2.14
Intel N/A Intel NUC9 Extreme Laptop kits versions antérieures à 2.2.0.22
Intel N/A Intel Connect M Android versions antérieures à 1.7.4
Intel N/A Intel HAXM versions antérieures à 7.7.1
Intel N/A Intel Distribution pour Python versions antérieures à 2022.0.3
Intel N/A Intel Killer™ Bluetooth versions antérieures à 22.120
Intel N/A Intel NUCs versions antérieures à BC0076
Intel N/A Intel RST versions antérieures à 16.8.4.1011, 17.7.1.1010, 18.1.6.1039, 18.2.1.1008 et 18.3.0.1003
Intel N/A Intel SEAPI toutes versions
Intel N/A Intel Ethernet 500 Series Controller drivers pour les versions VMware antérieures à 1.11.4.0
Intel N/A Intel Wireless Bluetooth versions antérieures à 22.120
Intel N/A Intel AMT toutes versions
Intel N/A Intel Enpirion Digital Power Configurator GUI toutes versions
Intel N/A Intel Datacenter Group Event Advisory iOS toutes versions
References
Bulletin de sécurité Intel intel-sa-00701.html du 09 août 2022 None vendor-advisory
Bulletin de sécurité Intel intel-sa-00703.html du 09 août 2022 None vendor-advisory
Bulletin de sécurité Intel intel-sa-00669.html du 09 août 2022 None vendor-advisory
Bulletin de sécurité Intel intel-sa-00686.html du 09 août 2022 None vendor-advisory
Bulletin de sécurité Intel intel-sa-00679.html du 09 août 2022 None vendor-advisory
Bulletin de sécurité Intel intel-sa-00668.html du 09 août 2022 None vendor-advisory
Bulletin de sécurité Intel intel-sa-00657.html du 09 août 2022 None vendor-advisory
Bulletin de sécurité Intel intel-sa-00660.html du 09 août 2022 None vendor-advisory
Bulletin de sécurité Intel intel-sa-00593.html du 09 août 2022 None vendor-advisory
Bulletin de sécurité Intel intel-sa-00684.html du 09 août 2022 None vendor-advisory
Bulletin de sécurité Intel intel-sa-00653.html du 09 août 2022 None vendor-advisory
Bulletin de sécurité Intel intel-sa-00658.html du 09 août 2022 None vendor-advisory
Bulletin de sécurité Intel intel-sa-00709.html du 09 août 2022 None vendor-advisory
Bulletin de sécurité Intel intel-sa-00621.html du 09 août 2022 None vendor-advisory
Bulletin de sécurité Intel intel-sa-00672.html du 09 août 2022 None vendor-advisory
Bulletin de sécurité Intel intel-sa-00628.html du 09 août 2022 None vendor-advisory
Bulletin de sécurité Intel intel-sa-00596.html du 09 août 2022 None vendor-advisory
Bulletin de sécurité Intel intel-sa-00665.html du 09 août 2022 None vendor-advisory
Bulletin de sécurité Intel intel-sa-00655.html du 09 août 2022 None vendor-advisory
Bulletin de sécurité Intel intel-sa-00712.html du 09 août 2022 None vendor-advisory
Bulletin de sécurité Intel intel-sa-00678.html du 09 août 2022 None vendor-advisory
Bulletin de sécurité Intel intel-sa-00667.html du 09 août 2022 None vendor-advisory
Bulletin de sécurité Intel intel-sa-00705.html du 09 août 2022 None vendor-advisory
Bulletin de sécurité Intel intel-sa-00706.html du 09 août 2022 None vendor-advisory
Bulletin de sécurité Intel intel-sa-00694.html du 09 août 2022 None vendor-advisory
Bulletin de sécurité Intel intel-sa-00650.html du 09 août 2022 None vendor-advisory
Bulletin de sécurité Intel intel-sa-00662.html du 09 août 2022 None vendor-advisory

Show details on source website


{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "Intel 722 Series Ethernet contr\u00f4leurs et adaptateurs versions ant\u00e9rieures \u00e0 1.5.5",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel Killer\u2122 WiFi versions ant\u00e9rieures \u00e0 3.1122.1105",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Open AMT Cloud Toolkit versions ant\u00e9rieures \u00e0 2.0.2 et 2.2.2",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel E810 Ethernet contr\u00f4leurs et adaptateurs versions ant\u00e9rieures \u00e0 1.6.1.9",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel Support Android versions ant\u00e9rieures \u00e0 21.7.40",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel Team Blue toutes versions",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel IPP Cryptography versions ant\u00e9rieures \u00e0 2021.5",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel VTune\u2122 Profiler versions ant\u00e9rieures \u00e0 2022.2.0",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel Processors (veuillez vous r\u00e9f\u00e9rer aux avis de l\u0027\u00e9diteur : intel-sa-00706 et intel-sa-00657)",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel Edge Insights pour les versions Industrial ant\u00e9rieures \u00e0 2.6.1",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel Standard Manageability toutes versions",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel Data Center Manager versions ant\u00e9rieures \u00e0 4.1",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel PROSet/Wireless WiFi versions ant\u00e9rieure \u00e0 22.120",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel Datacenter Group Event Android toutes versions",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel SPS versions ant\u00e9rieures \u00e0 SPS_E3_04.08.04.330.0 et SPS_E3_04.01.04.530.0",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel Ethernet 700 Series Controller drivers pour les versions VMware ant\u00e9rieures \u00e0 2.1.5.0",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel 700 Series Ethernet contr\u00f4leurs et adaptateurs versions ant\u00e9rieures \u00e0 8.5",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel DSA versions ant\u00e9rieures 22.2.14",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel NUC9 Extreme Laptop kits versions ant\u00e9rieures \u00e0 2.2.0.22",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel Connect M Android versions ant\u00e9rieures \u00e0 1.7.4",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel HAXM versions ant\u00e9rieures \u00e0 7.7.1",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel Distribution pour Python versions ant\u00e9rieures \u00e0 2022.0.3",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel Killer\u2122 Bluetooth versions ant\u00e9rieures \u00e0 22.120",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel NUCs versions ant\u00e9rieures \u00e0 BC0076",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel RST versions ant\u00e9rieures \u00e0 16.8.4.1011, 17.7.1.1010, 18.1.6.1039, 18.2.1.1008 et 18.3.0.1003",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel SEAPI toutes versions",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel Ethernet 500 Series Controller drivers pour les versions VMware ant\u00e9rieures \u00e0 1.11.4.0",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel Wireless Bluetooth versions ant\u00e9rieures \u00e0 22.120",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel AMT toutes versions",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel Enpirion Digital Power Configurator GUI toutes versions",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel Datacenter Group Event Advisory iOS toutes versions",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    }
  ],
  "affected_systems_content": null,
  "content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
  "cves": [
    {
      "name": "CVE-2022-28696",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-28696"
    },
    {
      "name": "CVE-2022-33209",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-33209"
    },
    {
      "name": "CVE-2022-21197",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-21197"
    },
    {
      "name": "CVE-2022-29507",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-29507"
    },
    {
      "name": "CVE-2022-28709",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-28709"
    },
    {
      "name": "CVE-2022-21233",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-21233"
    },
    {
      "name": "CVE-2022-21139",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-21139"
    },
    {
      "name": "CVE-2022-27500",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-27500"
    },
    {
      "name": "CVE-2022-34345",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-34345"
    },
    {
      "name": "CVE-2022-30944",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-30944"
    },
    {
      "name": "CVE-2022-30601",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-30601"
    },
    {
      "name": "CVE-2022-23182",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-23182"
    },
    {
      "name": "CVE-2021-23179",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-23179"
    },
    {
      "name": "CVE-2022-21172",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-21172"
    },
    {
      "name": "CVE-2022-26344",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-26344"
    },
    {
      "name": "CVE-2022-21160",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-21160"
    },
    {
      "name": "CVE-2022-34488",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-34488"
    },
    {
      "name": "CVE-2022-21152",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-21152"
    },
    {
      "name": "CVE-2021-33126",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-33126"
    },
    {
      "name": "CVE-2022-26374",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-26374"
    },
    {
      "name": "CVE-2022-21793",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-21793"
    },
    {
      "name": "CVE-2021-23168",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-23168"
    },
    {
      "name": "CVE-2022-27493",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-27493"
    },
    {
      "name": "CVE-2022-21225",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-21225"
    },
    {
      "name": "CVE-2021-26950",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-26950"
    },
    {
      "name": "CVE-2022-26017",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-26017"
    },
    {
      "name": "CVE-2022-30296",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-30296"
    },
    {
      "name": "CVE-2022-22730",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-22730"
    },
    {
      "name": "CVE-2021-33847",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-33847"
    },
    {
      "name": "CVE-2022-25999",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-25999"
    },
    {
      "name": "CVE-2022-21812",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-21812"
    },
    {
      "name": "CVE-2022-26083",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-26083"
    },
    {
      "name": "CVE-2022-25841",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-25841"
    },
    {
      "name": "CVE-2021-33060",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-33060"
    },
    {
      "name": "CVE-2022-21181",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-21181"
    },
    {
      "name": "CVE-2021-26254",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-26254"
    },
    {
      "name": "CVE-2022-25899",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-25899"
    },
    {
      "name": "CVE-2021-44545",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-44545"
    },
    {
      "name": "CVE-2018-1285",
      "url": "https://www.cve.org/CVERecord?id=CVE-2018-1285"
    },
    {
      "name": "CVE-2022-26373",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-26373"
    },
    {
      "name": "CVE-2021-44470",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-44470"
    },
    {
      "name": "CVE-2022-25966",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-25966"
    },
    {
      "name": "CVE-2022-28858",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-28858"
    },
    {
      "name": "CVE-2022-21140",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-21140"
    },
    {
      "name": "CVE-2022-26844",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-26844"
    },
    {
      "name": "CVE-2022-21212",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-21212"
    },
    {
      "name": "CVE-2021-33128",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-33128"
    },
    {
      "name": "CVE-2022-23403",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-23403"
    },
    {
      "name": "CVE-2022-21229",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-21229"
    },
    {
      "name": "CVE-2021-26257",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-26257"
    },
    {
      "name": "CVE-2022-28697",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-28697"
    },
    {
      "name": "CVE-2021-23188",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-23188"
    },
    {
      "name": "CVE-2022-21807",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-21807"
    },
    {
      "name": "CVE-2022-32579",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-32579"
    },
    {
      "name": "CVE-2022-21148",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-21148"
    },
    {
      "name": "CVE-2022-26074",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-26074"
    },
    {
      "name": "CVE-2021-37409",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-37409"
    },
    {
      "name": "CVE-2021-23223",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-23223"
    },
    {
      "name": "CVE-2022-21240",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-21240"
    },
    {
      "name": "CVE-2022-24378",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-24378"
    }
  ],
  "initial_release_date": "2022-08-10T00:00:00",
  "last_revision_date": "2022-08-10T00:00:00",
  "links": [],
  "reference": "CERTFR-2022-AVI-727",
  "revisions": [
    {
      "description": "Version initiale",
      "revision_date": "2022-08-10T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
    },
    {
      "description": "D\u00e9ni de service"
    },
    {
      "description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
    },
    {
      "description": "\u00c9l\u00e9vation de privil\u00e8ges"
    }
  ],
  "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits Intel.\nCertaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer un d\u00e9ni\nde service, une atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es et une atteinte \u00e0 la\nconfidentialit\u00e9 des donn\u00e9es.\n",
  "title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Intel",
  "vendor_advisories": [
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00701.html du 09 ao\u00fbt 2022",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00701.html.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00703.html du 09 ao\u00fbt 2022",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00703.html.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00669.html du 09 ao\u00fbt 2022",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00669.html.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00686.html du 09 ao\u00fbt 2022",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00686.html.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00679.html du 09 ao\u00fbt 2022",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00679.html.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00668.html du 09 ao\u00fbt 2022",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00668.html.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00657.html du 09 ao\u00fbt 2022",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00657.html.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00660.html du 09 ao\u00fbt 2022",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00660.html.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00593.html du 09 ao\u00fbt 2022",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00593.html.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00684.html du 09 ao\u00fbt 2022",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00684.html.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00653.html du 09 ao\u00fbt 2022",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00653.html.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00658.html du 09 ao\u00fbt 2022",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00658.html.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00709.html du 09 ao\u00fbt 2022",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00709.html.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00621.html du 09 ao\u00fbt 2022",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00621.html.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00672.html du 09 ao\u00fbt 2022",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00672.html.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00628.html du 09 ao\u00fbt 2022",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00628.html.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00596.html du 09 ao\u00fbt 2022",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00596.html.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00665.html du 09 ao\u00fbt 2022",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00665.html.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00655.html du 09 ao\u00fbt 2022",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00655.html.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00712.html du 09 ao\u00fbt 2022",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00712.html.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00678.html du 09 ao\u00fbt 2022",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00678.html.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00667.html du 09 ao\u00fbt 2022",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00667.html.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00705.html du 09 ao\u00fbt 2022",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00705.html.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00706.html du 09 ao\u00fbt 2022",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00706.html.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00694.html du 09 ao\u00fbt 2022",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00694.html.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00650.html du 09 ao\u00fbt 2022",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00650.html.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00662.html du 09 ao\u00fbt 2022",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00662.html.html"
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.


Loading…

Loading…