CVE-2022-38787 (GCVE-0-2022-38787)
Vulnerability from cvelistv5
Published
2023-05-10 13:17
Modified
2025-01-27 18:04
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- escalation of privilege
- CWE-20 - Improper input validation
Summary
Improper input validation in firmware for some Intel(R) FPGA products before version 2.7.0 Hotfix may allow an authenticated user to potentially enable escalation of privilege via local access.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
n/a | Intel(R) FPGA products |
Version: before version 2.7.0 Hotfix |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T11:02:14.597Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00824.html", "tags": [ "x_transferred" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00824.html" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2022-38787", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2025-01-27T17:27:43.153667Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-01-27T18:04:04.945Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "Intel(R) FPGA products", "vendor": "n/a", "versions": [ { "status": "affected", "version": "before version 2.7.0 Hotfix" } ] } ], "descriptions": [ { "lang": "en", "value": "Improper input validation in firmware for some Intel(R) FPGA products before version 2.7.0 Hotfix may allow an authenticated user to potentially enable escalation of privilege via local access." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "description": "escalation of privilege", "lang": "en" }, { "cweId": "CWE-20", "description": "Improper input validation", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-05-10T13:17:02.449Z", "orgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce", "shortName": "intel" }, "references": [ { "name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00824.html", "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00824.html" } ] } }, "cveMetadata": { "assignerOrgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce", "assignerShortName": "intel", "cveId": "CVE-2022-38787", "datePublished": "2023-05-10T13:17:02.449Z", "dateReserved": "2022-09-28T14:53:53.448Z", "dateUpdated": "2025-01-27T18:04:04.945Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "vulnerability-lookup:meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2022-38787\",\"sourceIdentifier\":\"secure@intel.com\",\"published\":\"2023-05-10T14:15:14.017\",\"lastModified\":\"2024-11-21T07:17:05.220\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Improper input validation in firmware for some Intel(R) FPGA products before version 2.7.0 Hotfix may allow an authenticated user to potentially enable escalation of privilege via local access.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"secure@intel.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:N\",\"baseScore\":5.7,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"HIGH\",\"privilegesRequired\":\"HIGH\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":0.5,\"impactScore\":5.2},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H\",\"baseScore\":7.8,\"baseSeverity\":\"HIGH\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":1.8,\"impactScore\":5.9}]},\"weaknesses\":[{\"source\":\"secure@intel.com\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-20\"}]},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"NVD-CWE-noinfo\"}]}],\"configurations\":[{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:agilex_7_fpga_f-series_019_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"2.7.0\",\"matchCriteriaId\":\"2A6A97E4-62A9-4237-A13E-0BD55BDD8A42\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:agilex_7_fpga_f-series_019:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4D68665D-53D4-49C5-8A06-A720EE9F1267\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:agilex_7_fpga_f-series_023_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"2.7.0\",\"matchCriteriaId\":\"925DC85E-37C8-4221-8F47-17D9BAB9FF34\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:agilex_7_fpga_f-series_023:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3366464F-0854-4D57-99F0-91C0F8C408EC\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:agilex_7_fpga_f-series_006_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"2.7.0\",\"matchCriteriaId\":\"4901DDCC-11B9-4ED9-A3C6-C77B3F465ED8\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:agilex_7_fpga_f-series_006:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"481A2231-C217-42F4-AF28-94490AE56AB9\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:agilex_7_fpga_f-series_008_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"2.7.0\",\"matchCriteriaId\":\"2FA90A9A-F961-4A5E-8506-2A9F07963077\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:agilex_7_fpga_f-series_008:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4CB6868D-4587-409D-B64C-36240DDDC19C\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:agilex_7_fpga_f-series_027_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"2.7.0\",\"matchCriteriaId\":\"57AC32ED-85E1-4D77-B9F1-AFCF702142FF\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:agilex_7_fpga_f-series_027:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FBD8AC9B-AD29-4C14-9DEF-91B678ACB554\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:agilex_7_fpga_f-series_014_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"2.7.0\",\"matchCriteriaId\":\"48E5C24D-9718-4DAC-90D5-FAD771C25254\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:agilex_7_fpga_f-series_014:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"031DEF2A-B186-418E-85DC-9F03DB95B8D7\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:agilex_7_fpga_f-series_012_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"2.7.0\",\"matchCriteriaId\":\"645E4E1D-83FF-490D-A7A9-A124D64AF26B\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:agilex_7_fpga_f-series_012:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0BB7671C-CAC4-46E7-A1B4-03C71472865C\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:agilex_7_fpga_f-series_022_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"2.7.0\",\"matchCriteriaId\":\"2AE0B8F0-2411-4FA7-A569-BF6765F4EA19\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:agilex_7_fpga_f-series_022:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9C67013E-48AA-4D44-8435-B782F77B48AB\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:agilex_7_fpga_i-series_022_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"2.7.0\",\"matchCriteriaId\":\"FC7259A2-1545-4452-BEB5-536A8A1DFD5E\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:agilex_7_fpga_i-series_022:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"934E3D45-0BFB-421B-B6C3-CB4823ECD40F\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:agilex_7_fpga_i-series_041_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"2.7.0\",\"matchCriteriaId\":\"CF0D99C4-44B7-4345-B572-BFA74299C572\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:agilex_7_fpga_i-series_041:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3FD1F07B-8857-478F-B8AA-7FBB1FDA0B02\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:agilex_7_fpga_i-series_035_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"2.7.0\",\"matchCriteriaId\":\"D95BF10C-7890-4040-A3A5-756FD2D9A8DD\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:agilex_7_fpga_i-series_035:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8501A5FD-95DB-4F4F-A1B6-7FF98C286E88\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:agilex_7_fpga_i-series_027_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"2.7.0\",\"matchCriteriaId\":\"B852565A-0D55-489A-B5AC-C2CEC72E4847\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:agilex_7_fpga_i-series_027:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E32704B5-C354-4A28-A3C5-BE8DC5CC87E1\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:agilex_7_fpga_i-series_019_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"2.7.0\",\"matchCriteriaId\":\"F6844407-D1FD-4E9D-85E6-4E7B3AD798A9\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:agilex_7_fpga_i-series_019:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C77709F7-0B2D-415D-AE47-76BECE0202F3\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:agilex_7_fpga_i-series_040_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"2.7.0\",\"matchCriteriaId\":\"7FB9E255-1888-4D8D-996F-7654680F1A20\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:agilex_7_fpga_i-series_040:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A88039FE-FEB0-4C51-8CAC-CB59014AD964\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:agilex_7_fpga_i-series_023_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"2.7.0\",\"matchCriteriaId\":\"84224732-2E15-42E7-A87A-E39973A73391\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:agilex_7_fpga_i-series_023:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A2A32D9F-D82D-4610-A6CA-B30EC8050DF0\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:agilex_7_fpga_m-series_039_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"2.7.0\",\"matchCriteriaId\":\"EBED8EF7-CA05-4180-BEF2-FFAD46FF5E4F\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:agilex_7_fpga_m-series_039:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6866ED35-765A-4C2B-9474-A4BC38BB9AAA\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:stratix_10_nx_2100_fpga_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"2.7.0\",\"matchCriteriaId\":\"1A484B58-4AE8-4729-BE38-0231674DE114\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:stratix_10_nx_2100_fpga:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6DFD6254-F1EC-4839-B0E9-EED795C1643C\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:stratix_10_dx_2800_fpga_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"2.7.0\",\"matchCriteriaId\":\"50F5F0B6-6F56-4B2B-B6B5-72F498A99569\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:stratix_10_dx_2800_fpga:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F8CBB78E-3661-42F2-9168-AA636C2FEB4D\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:stratix_10_dx_2100_fpga_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"2.7.0\",\"matchCriteriaId\":\"16F78C58-38A3-4C5F-8387-DDEDE63D8B8C\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:stratix_10_dx_2100_fpga:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B2563221-8650-4BB8-9979-0DA77E76C20F\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:stratix_10_dx_1100_fpga_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"2.7.0\",\"matchCriteriaId\":\"75C77642-7FB5-47F2-81D2-B40BA667EB9C\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:stratix_10_dx_1100_fpga:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CA405E82-8737-4337-9823-A6FB3747A7FF\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:stratix_10_tx_1650_fpga_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"2.7.0\",\"matchCriteriaId\":\"EC877E90-D6A3-41D3-BA75-EF370336FD5D\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:stratix_10_tx_1650_fpga:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F841BCA0-603D-4DF7-8DAC-344BA3FA7B47\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:stratix_10_tx_2500_fpga_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"2.7.0\",\"matchCriteriaId\":\"502D348D-7D50-414C-9AD3-2C137BF3DC9A\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:stratix_10_tx_2500_fpga:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FF940E7E-56C1-4810-9FF9-34797121C142\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:stratix_10_tx_2100_fpga_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"2.7.0\",\"matchCriteriaId\":\"4EC99440-D6C8-4557-9839-EF8361582157\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:stratix_10_tx_2100_fpga:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D38BF0AF-554D-4026-983B-CEB85AA32193\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:stratix_10_tx_850_fpga_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"2.7.0\",\"matchCriteriaId\":\"F7AE55A0-0EC6-4487-BE4E-077FC7F2325F\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:stratix_10_tx_850_fpga:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"24730E73-BAE9-4CA5-B193-7E8266C865AF\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:stratix_10_tx_400_fpga_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"2.7.0\",\"matchCriteriaId\":\"C6427DE9-3547-45D8-BCA5-AC0DAAC1B528\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:stratix_10_tx_400_fpga:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0CBDD342-2160-42A0-96D0-2A00C624D950\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:stratix_10_tx_1100_fpga_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"2.7.0\",\"matchCriteriaId\":\"FA74AF2E-8605-4D52-A4BE-7DCBA3E5F2BB\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:stratix_10_tx_1100_fpga:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B4E68CD4-9853-41EE-9BC8-8376B620D04F\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:stratix_10_tx_2800_fpga_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"2.7.0\",\"matchCriteriaId\":\"A30B6E5B-2F7A-4351-B317-702E658D9370\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:stratix_10_tx_2800_fpga:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9CC3C9FD-C8FD-4402-A5A5-D95D1D124A6B\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:stratix_10_sx_650_fpga_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"2.7.0\",\"matchCriteriaId\":\"F20BA1A1-E4D9-4222-8E8E-88A3BB7101C9\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:stratix_10_sx_650_fpga:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C00F9533-5277-4F6F-96F6-B3B702B8E2C1\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:stratix_10_sx_400_fpga_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"2.7.0\",\"matchCriteriaId\":\"9D9584CC-18D9-4638-A712-91B6169412B8\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:stratix_10_sx_400_fpga:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3EE8A237-43CA-469C-B5EA-1F194B27EC1C\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:stratix_10_sx_1100_fpga_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"2.7.0\",\"matchCriteriaId\":\"0C9EF34B-F505-4AD9-8A6D-14084B0E11A2\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:stratix_10_sx_1100_fpga:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7F9A8832-4C8A-46B9-9FB7-A2E6653AF4EE\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:stratix_10_sx_850_fpga_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"2.7.0\",\"matchCriteriaId\":\"55F18140-1D0B-40E3-94D0-362B34A8ADFC\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:stratix_10_sx_850_fpga:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6482AA9D-95E3-4E42-9117-3F72265B3168\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:stratix_10_sx_1650_fpga_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"2.7.0\",\"matchCriteriaId\":\"DF406F7B-7850-4103-B2B2-0AB66D63E9BD\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:stratix_10_sx_1650_fpga:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5055D09C-D118-40A4-86F7-369C97111FF4\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:stratix_10_sx_2100_fpga_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"2.7.0\",\"matchCriteriaId\":\"8B090795-73EC-42DF-B403-13663487A8EA\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:stratix_10_sx_2100_fpga:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B6836FE2-D66D-4E53-9C44-EC1A7578361B\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:stratix_10_sx_2500_fpga_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"2.7.0\",\"matchCriteriaId\":\"95ACB8D8-C6D0-4F5B-BDA4-FCBA4EC25B48\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:stratix_10_sx_2500_fpga:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6FA24707-EC97-4877-A183-1C36146F55D7\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:stratix_10_sx_2800_fpga_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"2.7.0\",\"matchCriteriaId\":\"2D72E987-4C70-47D9-94F3-33448C9B4635\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:stratix_10_sx_2800_fpga:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1202442F-755C-40A3-A38B-A695721F6F19\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:stratix_10_mx_2100_fpga_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"2.7.0\",\"matchCriteriaId\":\"DDEAAF89-50A9-4FD3-AE59-D56E04A6BCA8\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:stratix_10_mx_2100_fpga:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0491BF82-8D81-4514-AE7E-2736BA02F5A0\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:stratix_10_mx_1650_fpga_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"2.7.0\",\"matchCriteriaId\":\"1DCA7474-A2F1-45C2-A474-03A329036D48\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:stratix_10_mx_1650_fpga:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A50071C6-AD81-4280-9002-FD2A07371EAC\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:stratix_10_gx_2110_fpga_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"2.7.0\",\"matchCriteriaId\":\"CE1D4D52-9788-4A78-9ED1-8C5EA5B2F5FE\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:stratix_10_gx_2110_fpga:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"64562A7E-53D7-4175-B02E-50A9BA8170E9\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:stratix_10_gx_1660_fpga_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"2.7.0\",\"matchCriteriaId\":\"823336BC-C6EB-4BED-A384-C81B50FF669D\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:stratix_10_gx_1660_fpga:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"277040B2-D525-43BC-8899-5CFB10F95D71\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:stratix_10_gx_650_fpga_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"2.7.0\",\"matchCriteriaId\":\"6DDB7711-F2D8-46EA-94C1-6FE8F5BC9C7E\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:stratix_10_gx_650_fpga:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A462375F-0D3E-4393-8EB0-2797962E039E\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:stratix_10_gx_400_fpga_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"2.7.0\",\"matchCriteriaId\":\"05D4608F-6C59-439C-BC1F-1FEF53A214B3\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:stratix_10_gx_400_fpga:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"371A7925-FDCA-4158-853D-33F65FA4E9E6\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:stratix_10_gx_850_fpga_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"2.7.0\",\"matchCriteriaId\":\"B837999B-AF15-4601-872B-43C3F129C814\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:stratix_10_gx_850_fpga:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F67C4A13-50B5-45A9-A069-B7057EC5675B\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:stratix_10_gx_2100_fpga_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"2.7.0\",\"matchCriteriaId\":\"FCA35390-F1B5-4F65-A907-3099515A548D\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:stratix_10_gx_2100_fpga:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9B361ACB-0622-400A-8358-E6E239E23EAA\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:stratix_10_gx_1100_fpga_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"2.7.0\",\"matchCriteriaId\":\"0DF9E880-20BA-45B6-8C61-8DF8972E87E3\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:stratix_10_gx_1100_fpga:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D6BA78DE-F2C5-4DEF-8768-3C88733B0C7C\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:stratix_10_gx_2500_fpga_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"2.7.0\",\"matchCriteriaId\":\"0CBA900D-6A31-4328-9F84-E869FF7484D1\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:stratix_10_gx_2500_fpga:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"95EE7175-23A1-4357-8E79-586D0D1C5068\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:stratix_10_gx_10m_fpga_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"2.7.0\",\"matchCriteriaId\":\"F6E0D917-BB2C-49E8-9647-A1121CF98A73\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:stratix_10_gx_10m_fpga:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"89B0EC34-E6BA-4C9F-B79F-E510B21C6014\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:stratix_10_gx_2800_fpga_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"2.7.0\",\"matchCriteriaId\":\"443BF261-461B-4204-9A5A-C212349856F2\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:stratix_10_gx_2800_fpga:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A0E4E2EF-5A50-4F1F-8A3B-C0B5BF9EBC98\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:stratix_10_gx_1650_fpga_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"2.7.0\",\"matchCriteriaId\":\"BA201B34-D644-4EDD-8804-C395144334B2\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:stratix_10_gx_1650_fpga:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E7B49FF8-5DF9-495B-B29E-DCF92D376178\"}]}]}],\"references\":[{\"url\":\"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00824.html\",\"source\":\"secure@intel.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00824.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]}]}}", "vulnrichment": { "containers": "{\"adp\": [{\"title\": \"CVE Program Container\", \"references\": [{\"url\": \"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00824.html\", \"name\": \"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00824.html\", \"tags\": [\"x_transferred\"]}], \"providerMetadata\": {\"orgId\": \"af854a3a-2127-422b-91ae-364da2661108\", \"shortName\": \"CVE\", \"dateUpdated\": \"2024-08-03T11:02:14.597Z\"}}, {\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2022-38787\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"total\"}], \"version\": \"2.0.3\", \"timestamp\": \"2025-01-27T17:27:43.153667Z\"}}}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2025-01-27T17:27:44.766Z\"}}], \"cna\": {\"metrics\": [{\"format\": \"CVSS\", \"cvssV3_1\": {\"scope\": \"UNCHANGED\", \"version\": \"3.1\", \"baseScore\": 5.7, \"attackVector\": \"LOCAL\", \"baseSeverity\": \"MEDIUM\", \"vectorString\": \"CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:N\", \"integrityImpact\": \"HIGH\", \"userInteraction\": \"NONE\", \"attackComplexity\": \"HIGH\", \"availabilityImpact\": \"NONE\", \"privilegesRequired\": \"HIGH\", \"confidentialityImpact\": \"HIGH\"}, \"scenarios\": [{\"lang\": \"en\", \"value\": \"GENERAL\"}]}], \"affected\": [{\"vendor\": \"n/a\", \"product\": \"Intel(R) FPGA products\", \"versions\": [{\"status\": \"affected\", \"version\": \"before version 2.7.0 Hotfix\"}], \"defaultStatus\": \"unaffected\"}], \"references\": [{\"url\": \"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00824.html\", \"name\": \"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00824.html\"}], \"descriptions\": [{\"lang\": \"en\", \"value\": \"Improper input validation in firmware for some Intel(R) FPGA products before version 2.7.0 Hotfix may allow an authenticated user to potentially enable escalation of privilege via local access.\"}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"description\": \"escalation of privilege\"}, {\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-20\", \"description\": \"Improper input validation\"}]}], \"providerMetadata\": {\"orgId\": \"6dda929c-bb53-4a77-a76d-48e79601a1ce\", \"shortName\": \"intel\", \"dateUpdated\": \"2023-05-10T13:17:02.449Z\"}}}", "cveMetadata": "{\"cveId\": \"CVE-2022-38787\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2025-01-27T18:04:04.945Z\", \"dateReserved\": \"2022-09-28T14:53:53.448Z\", \"assignerOrgId\": \"6dda929c-bb53-4a77-a76d-48e79601a1ce\", \"datePublished\": \"2023-05-10T13:17:02.449Z\", \"assignerShortName\": \"intel\"}", "dataType": "CVE_RECORD", "dataVersion": "5.1" } } }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…
Loading…