fkie_cve-2022-38102
Vulnerability from fkie_nvd
Published
2023-08-11 03:15
Modified
2024-11-21 07:15
Summary
Improper Input validation in firmware for some Intel(R) Converged Security and Management Engine before versions 15.0.45, and 16.1.27 may allow a privileged user to potentially enable denial of service via local access.
Impacted products
Vendor Product Version
intel converged_security_management_engine_firmware *
intel b660 -
intel h610 -
intel h610e -
intel h670 -
intel hm670 -
intel q670 -
intel q670e -
intel r680e -
intel w680 -
intel wm690 -
intel z690 -
intel converged_security_management_engine_firmware *
intel atom_x6200fe -
intel atom_x6211e -
intel atom_x6212re -
intel atom_x6214re -
intel atom_x6413e -
intel atom_x6414re -
intel atom_x6416re -
intel atom_x6425e -
intel atom_x6425re -
intel atom_x6427fe -
intel b560 -
intel c252 -
intel c256 -
intel celeron_j1750 -
intel celeron_j1800 -
intel celeron_j1850 -
intel celeron_j1900 -
intel celeron_j3060 -
intel celeron_j3160 -
intel celeron_j3355 -
intel celeron_j3355e -
intel celeron_j3455 -
intel celeron_j3455e -
intel celeron_j4005 -
intel celeron_j4025 -
intel celeron_j4105 -
intel celeron_j4125 -
intel celeron_j6412 -
intel celeron_j6413 -
intel celeron_n2805 -
intel celeron_n2806 -
intel celeron_n2807 -
intel celeron_n2808 -
intel celeron_n2810 -
intel celeron_n2815 -
intel celeron_n2820 -
intel celeron_n2830 -
intel celeron_n2840 -
intel celeron_n2910 -
intel celeron_n2920 -
intel celeron_n2930 -
intel celeron_n2940 -
intel celeron_n3000 -
intel celeron_n3010 -
intel celeron_n3050 -
intel celeron_n3060 -
intel celeron_n3150 -
intel celeron_n3160 -
intel celeron_n3350 -
intel celeron_n3350e -
intel celeron_n3450 -
intel celeron_n4000 -
intel celeron_n4020 -
intel celeron_n4100 -
intel celeron_n4120 -
intel celeron_n4500 -
intel celeron_n4505 -
intel celeron_n5100 -
intel celeron_n5105 -
intel celeron_n6210 -
intel celeron_n6211 -
intel h510 -
intel h570 -
intel hm570 -
intel hm570e -
intel pentium_j2850 -
intel pentium_j2900 -
intel pentium_j3710 -
intel pentium_j4205 -
intel pentium_j6426 -
intel pentium_n3510 -
intel pentium_n3520 -
intel pentium_n3530 -
intel pentium_n3540 -
intel pentium_n3700 -
intel pentium_n3710 -
intel pentium_n4200 -
intel pentium_n4200e -
intel pentium_n6415 -
intel q570 -
intel qm580 -
intel qm580e -
intel rm590e -
intel w580 -
intel wm590 -
intel z590 -



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:intel:converged_security_management_engine_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "CF505BC6-9834-416D-8539-9EADD93D81A3",
                     versionEndExcluding: "16.1.27",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:intel:b660:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2576527C-0218-491F-871E-07A60A5E1C25",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:h610:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A68DECC9-072F-43C0-90EF-02E8BBC9AE4C",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:h610e:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "9B973879-DE48-4461-B543-98625EABCCE4",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:h670:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "BCF3A230-7824-4417-B5C4-E2D30ECBE3AE",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:hm670:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "70675897-E01D-4217-82AE-EC15AE58390E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:q670:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "B3DBB4E3-B863-4333-AC01-DB21416FCB94",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:q670e:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "5B479403-BA34-426F-8DB6-61303C57F268",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:r680e:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F20D230F-E14A-4986-8746-168CC9C61AD0",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:w680:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "EF31448A-E935-4FFF-AF76-2B06EF71E229",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:wm690:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D5B7B7CD-63B7-4F80-A0A1-7C69F0868D1B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:z690:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2D1C667A-A904-4707-BE7E-FF7530E0D716",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:intel:converged_security_management_engine_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "5438BCF4-5C36-458B-95B3-F55AC0C886CA",
                     versionEndExcluding: "15.0.45",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:intel:atom_x6200fe:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "89231773-9D9B-434A-A6A3-8527C4F6FEBB",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:atom_x6211e:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A85EA674-2537-4323-AEDA-FA356489E7DE",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:atom_x6212re:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F85599DD-3F80-4EB0-9753-D24EDD8D76CC",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:atom_x6214re:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2D98929C-9560-40CF-8231-718B5BFF19EA",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:atom_x6413e:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "1B3348F4-8E2B-42BE-9F3A-48DFF5CE0047",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:atom_x6414re:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F1D7A0BC-7798-466E-B341-D371988FE6CA",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:atom_x6416re:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "8A8C0489-E31A-455A-AA64-3765074530F4",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:atom_x6425e:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7F068F4F-8CCD-4218-871C-BEABEB0DAB55",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:atom_x6425re:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7313975C-41A5-4657-8758-1C16F947BE4C",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:atom_x6427fe:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2FBE4406-9979-4723-833C-176F051E6389",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:b560:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "9FE930AA-59F7-43A7-9FF3-363CE72A6728",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:c252:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F6E46116-6B73-4A65-A2AB-E238678B7E48",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:c256:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C9F281EE-3F33-406A-8FA0-43B3AB6BC35B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:celeron_j1750:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A2F55513-48F4-44EC-9293-2CA744FCE07B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:celeron_j1800:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "51D52347-FA7F-4592-99E4-4C01D2833F35",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:celeron_j1850:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "82EC9A22-4893-4770-A501-31D492DC7EC3",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:celeron_j1900:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "744EC990-7849-4BC1-BC75-1D64693645A4",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:celeron_j3060:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "B949F28E-5C73-4222-973E-DC39325E9268",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:celeron_j3160:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "132E32FD-4A52-43AF-9C0A-75F299B4C93F",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:celeron_j3355:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7087FCA7-6D5C-45A5-B380-533915BC608A",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:celeron_j3355e:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "85683891-11D4-47B1-834B-5E0380351E78",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:celeron_j3455:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "DBF2D89D-AC2D-4EAB-ADF3-66C25FE54E19",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:celeron_j3455e:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "03D778C7-F242-4A6A-9B62-A7C578D985FC",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:celeron_j4005:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "652EC574-B9B6-4747-AE72-39D1379A596B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:celeron_j4025:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "522A9A57-B8D8-4C61-92E3-BE894A765C12",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:celeron_j4105:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A588BEB3-90B5-482E-B6C4-DC6529B0B4C4",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:celeron_j4125:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "826BAF04-E174-483D-8700-7FA1EAC4D555",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:celeron_j6412:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3D3162DD-BF40-4A58-8FC4-63B4455C0E51",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:celeron_j6413:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F7A8BF58-1D33-484A-951C-808443912BE8",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:celeron_n2805:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "04CEC115-871B-4222-A3F8-6B1EE15E9A2C",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:celeron_n2806:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3FD0BD9D-F741-457D-9495-8BCC3707D098",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:celeron_n2807:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "B2935CEA-13CE-4F4C-84B1-0318FB6FE39A",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:celeron_n2808:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C3BB7241-F796-44A7-8171-B555A45FF852",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:celeron_n2810:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "5F967E7C-E56D-46B2-AEB8-1931FA324029",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:celeron_n2815:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "5D902C7F-DCE8-41ED-8E80-26DA251FBF36",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:celeron_n2820:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "71C505E0-3548-49BD-9B53-2A588FF29144",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:celeron_n2830:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "5E735023-A75C-48E3-AD6B-BB29CF95B17F",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:celeron_n2840:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3826FEBA-0B2E-403D-9A6A-0DA02FEF9A2B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:celeron_n2910:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "4080CDEF-3938-44D5-9737-6A9D72DB54B7",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:celeron_n2920:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A77976A7-6C2D-4E0B-A28B-06A23EEA0D68",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:celeron_n2930:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A5600350-04CC-4481-AC47-9F98BEB9D258",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:celeron_n2940:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A5A64D0A-D1C2-41B3-B51B-563263438CA8",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:celeron_n3000:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "B57F4250-80C8-4612-97F6-2702D3F7DF25",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:celeron_n3010:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7AA180B4-0EB8-4884-A600-BFAEB64A0A58",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:celeron_n3050:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "27D79952-8946-488A-8BD8-6129D97A8E34",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:celeron_n3060:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "6B17905A-95E2-4E60-8A0F-AA8ABAF9D523",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:celeron_n3150:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "752081F5-AE8D-4004-B564-863840AC52E1",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:celeron_n3160:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "5375A75A-85AA-4119-9F6C-1AD9D2550F6B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:celeron_n3350:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F5884F21-BAB5-4A45-8C72-C90D07BAECA8",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:celeron_n3350e:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "EC2A2AC5-FA56-49F0-BA00-E96B10FEF889",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:celeron_n3450:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "B8FF7ADD-9E27-4A23-9714-5B76132C20BC",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:celeron_n4000:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C8771AB4-2F51-494D-8C86-3524BB4219C7",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:celeron_n4020:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "6D7E822D-994F-410D-B13C-939449FFC293",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:celeron_n4100:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "AB5576F2-4914-427C-9518-ED7D16630CC5",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:celeron_n4120:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3ABB7C52-863F-4291-A05B-422EE9615FAE",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:celeron_n4500:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "B54D15DF-53EA-4611-932A-EDB8279F582A",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:celeron_n4505:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "BE7B5E21-2796-4578-998F-B03E26277DE7",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:celeron_n5100:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "96D6F5D3-3559-47AD-8201-C9D34417DC09",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:celeron_n5105:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "AA455AC5-8434-4B59-BE89-E82CDACD2AEC",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:celeron_n6210:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "5D31CA93-6F45-4BCE-B504-35F6494B864C",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:celeron_n6211:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "406E9139-BCFF-406B-A856-57896D27B752",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:h510:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D67C6D6B-12F3-43A6-BB8D-DFE0B6483294",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:h570:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "96F1DD9B-C078-41C5-88E0-DB7705E17742",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:hm570:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "9D9BD5A1-AD1F-4770-87EE-7F1804BA87A1",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:hm570e:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "242BA56E-E8D0-4851-AA71-FECB9E102F87",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:pentium_j2850:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "1C43D202-D661-4042-9F68-0FA7EE73CFEE",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:pentium_j2900:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "29ECACD3-E10C-4773-B847-8C1C097C45FA",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:pentium_j3710:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "56C4EF86-84BF-48F4-88DE-8142A270D4A3",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:pentium_j4205:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "B6585755-C56C-4910-A7D5-B2153396AC7A",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:pentium_j6426:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7596F281-BA94-4239-8238-AA5EC804AE11",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:pentium_n3510:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A635B99E-A03F-488A-A01B-B390691EA03B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:pentium_n3520:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "22EAE772-AFAC-4272-8129-B416B171490C",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:pentium_n3530:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "EDB3841D-3872-42BD-B0FB-E3E61813CA63",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:pentium_n3540:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C5DC1B8F-3F6C-49D8-BF5F-54146DE3E83C",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:pentium_n3700:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A1A836B1-451E-4CEF-8A14-89FFB9289DD3",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:pentium_n3710:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "8BC51285-B40A-4BEA-9CFF-F3BC01B5BA80",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:pentium_n4200:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "9A944A8C-462E-4FF9-8AD6-1687297DD0DE",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:pentium_n4200e:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "5378FE6C-251A-4BCD-B151-EA42B594DC37",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:pentium_n6415:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "638FA431-71EA-4668-AFF2-989A4994ED12",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:q570:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "44BCD8EB-D71A-4BD6-8D2D-AF2430F840C3",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:qm580:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "61AB83BE-01F0-412B-98E9-B766884BF249",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:qm580e:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "8CDD634A-B6BA-452C-A6E0-18ADEFF81529",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:rm590e:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "E1C4E46E-5828-4EE6-9A95-8F4FE56AC156",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:w580:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "EE366EB3-BE96-4A01-9BD5-792B59163938",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:wm590:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "4158B9A6-ACBE-4A62-AA2C-9790F73C4C3C",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:z590:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "89563A0F-CE7A-41C5-A8C7-9FC2D40F000A",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "Improper Input validation in firmware for some Intel(R) Converged Security and Management Engine before versions 15.0.45, and 16.1.27 may allow a privileged user to potentially enable denial of service via local access.",
      },
      {
         lang: "es",
         value: "La validación de entrada inadecuada en el firmware de algunos Intel(R) Converged Security and Management Engine anteriores a las versiones 15.0.45 y 16.1.27 puede permitir que un usuario con privilegios habilite potencialmente la denegación de servicio mediante acceso local.",
      },
   ],
   id: "CVE-2022-38102",
   lastModified: "2024-11-21T07:15:47.753",
   metrics: {
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "HIGH",
               attackVector: "LOCAL",
               availabilityImpact: "HIGH",
               baseScore: 7.2,
               baseSeverity: "HIGH",
               confidentialityImpact: "NONE",
               integrityImpact: "HIGH",
               privilegesRequired: "HIGH",
               scope: "CHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:H/A:H",
               version: "3.1",
            },
            exploitabilityScore: 0.8,
            impactScore: 5.8,
            source: "secure@intel.com",
            type: "Secondary",
         },
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "LOCAL",
               availabilityImpact: "HIGH",
               baseScore: 4.4,
               baseSeverity: "MEDIUM",
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               privilegesRequired: "HIGH",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
               version: "3.1",
            },
            exploitabilityScore: 0.8,
            impactScore: 3.6,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2023-08-11T03:15:14.070",
   references: [
      {
         source: "secure@intel.com",
         tags: [
            "Vendor Advisory",
         ],
         url: "http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00783.html",
      },
      {
         source: "secure@intel.com",
         url: "https://security.netapp.com/advisory/ntap-20230824-0002/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00783.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://security.netapp.com/advisory/ntap-20230824-0002/",
      },
   ],
   sourceIdentifier: "secure@intel.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-20",
            },
         ],
         source: "secure@intel.com",
         type: "Secondary",
      },
      {
         description: [
            {
               lang: "en",
               value: "NVD-CWE-noinfo",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}


Log in or create an account to share your comment.

Security Advisory comment format.

This schema specifies the format of a comment related to a security advisory.

UUIDv4 of the comment
UUIDv4 of the Vulnerability-Lookup instance
When the comment was created originally
When the comment was last updated
Title of the comment
Description of the comment
The identifier of the vulnerability (CVE ID, GHSA-ID, PYSEC ID, etc.).



Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.