var-202302-1248
Vulnerability from variot
Out-of-bounds write in firmware for some Intel(R) Ethernet Network Controllers and Adapters E810 Series before version 1.7.0.8 and some Intel(R) Ethernet 700 Series Controllers and Adapters before version 9.101 may allow a privileged user to potentially enable denial of service via local access
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202302-1248", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "ethernet controller xl710-am1", "scope": "lt", "trust": 1.0, "vendor": "intel", "version": "9.101" }, { "model": "ethernet converged network adapter xl710-da1", "scope": "lt", "trust": 1.0, "vendor": "intel", "version": "9.101" }, { "model": "ethernet controller xl710-bm2", "scope": "lt", "trust": 1.0, "vendor": "intel", "version": "9.101" }, { "model": "ethernet converged network adapter x710-da2", "scope": "lt", "trust": 1.0, "vendor": "intel", "version": "9.101" }, { "model": "ethernet controller x710-bm2", "scope": "lt", "trust": 1.0, "vendor": "intel", "version": "9.101" }, { "model": "ethernet controller xxv710-am2", "scope": "lt", "trust": 1.0, "vendor": "intel", "version": "9.101" }, { "model": "ethernet controller xxv710-am1", "scope": "lt", "trust": 1.0, "vendor": "intel", "version": "9.101" }, { "model": "ethernet network controller e810-cam1", "scope": "lt", "trust": 1.0, "vendor": "intel", "version": "1.7.0.8" }, { "model": "ethernet controller x710-am2", "scope": "lt", "trust": 1.0, "vendor": "intel", "version": "9.101" }, { "model": "ethernet converged network adapter xl710-da2", "scope": "lt", "trust": 1.0, "vendor": "intel", "version": "9.101" }, { "model": "ethernet controller xl710-bm1", "scope": "lt", "trust": 1.0, "vendor": "intel", "version": "9.101" }, { "model": "ethernet controller xl710-am2", "scope": "lt", "trust": 1.0, "vendor": "intel", "version": "9.101" }, { "model": "ethernet network controller e810-xxvam2", "scope": "lt", "trust": 1.0, "vendor": "intel", "version": "1.7.0.8" }, { "model": "ethernet converged network adapter x710-da4", "scope": "lt", "trust": 1.0, "vendor": "intel", "version": "9.101" }, { "model": "ethernet network controller e810-cam2", "scope": "lt", "trust": 1.0, "vendor": "intel", "version": "1.7.0.8" }, { "model": "intel ethernet controller xl710-am2", "scope": null, "trust": 0.8, "vendor": "\u30a4\u30f3\u30c6\u30eb", "version": null }, { "model": "intel ethernet network controller e810-xxvam2", "scope": null, "trust": 0.8, "vendor": "\u30a4\u30f3\u30c6\u30eb", "version": null }, { "model": "\u65e5\u7acb\u30a2\u30c9\u30d0\u30f3\u30b9\u30c8\u30b5\u30fc\u30d0 ha8000v \u30b7\u30ea\u30fc\u30ba", "scope": null, "trust": 0.8, "vendor": "\u65e5\u7acb", "version": null }, { "model": "intel ethernet controller x710-am2", "scope": null, "trust": 0.8, "vendor": "\u30a4\u30f3\u30c6\u30eb", "version": null }, { "model": "intel ethernet network controller e810-cam1", "scope": null, "trust": 0.8, "vendor": "\u30a4\u30f3\u30c6\u30eb", "version": null }, { "model": "intel ethernet controller xl710-bm1", "scope": null, "trust": 0.8, "vendor": "\u30a4\u30f3\u30c6\u30eb", "version": null }, { "model": "intel ethernet network controller e810-cam2", "scope": null, "trust": 0.8, "vendor": "\u30a4\u30f3\u30c6\u30eb", "version": null }, { "model": "intel ethernet controller x710-bm2", "scope": null, "trust": 0.8, "vendor": "\u30a4\u30f3\u30c6\u30eb", "version": null }, { "model": "intel ethernet controller xl710-bm2", "scope": null, "trust": 0.8, "vendor": "\u30a4\u30f3\u30c6\u30eb", "version": null }, { "model": "intel ethernet controller xxv710-am1", "scope": null, "trust": 0.8, "vendor": "\u30a4\u30f3\u30c6\u30eb", "version": null }, { "model": "intel ethernet controller xl710-am1", "scope": null, "trust": 0.8, "vendor": "\u30a4\u30f3\u30c6\u30eb", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-005394" }, { "db": "NVD", "id": "CVE-2022-36382" } ] }, "cve": "CVE-2022-36382", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "LOCAL", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 4.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "exploitabilityScore": 0.8, "id": "CVE-2022-36382", "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, { "attackComplexity": "LOW", "attackVector": "LOCAL", "author": "secure@intel.com", "availabilityImpact": "HIGH", "baseScore": 6.0, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "exploitabilityScore": 0.8, "id": "CVE-2022-36382", "impactScore": 5.2, "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Local", "author": "NVD", "availabilityImpact": "High", "baseScore": 4.4, "baseSeverity": "Medium", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2022-36382", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "High", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2022-36382", "trust": 1.0, "value": "MEDIUM" }, { "author": "secure@intel.com", "id": "CVE-2022-36382", "trust": 1.0, "value": "MEDIUM" }, { "author": "NVD", "id": "CVE-2022-36382", "trust": 0.8, "value": "Medium" }, { "author": "CNNVD", "id": "CNNVD-202302-1337", "trust": 0.6, "value": "MEDIUM" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-005394" }, { "db": "CNNVD", "id": "CNNVD-202302-1337" }, { "db": "NVD", "id": "CVE-2022-36382" }, { "db": "NVD", "id": "CVE-2022-36382" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Out-of-bounds write in firmware for some Intel(R) Ethernet Network Controllers and Adapters E810 Series before version 1.7.0.8 and some Intel(R) Ethernet 700 Series Controllers and Adapters before version 9.101 may allow a privileged user to potentially enable denial of service via local access", "sources": [ { "db": "NVD", "id": "CVE-2022-36382" }, { "db": "JVNDB", "id": "JVNDB-2022-005394" }, { "db": "VULMON", "id": "CVE-2022-36382" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-36382", "trust": 3.3 }, { "db": "JVN", "id": "JVNVU91223897", "trust": 0.8 }, { "db": "JVNDB", "id": "JVNDB-2022-005394", "trust": 0.8 }, { "db": "AUSCERT", "id": "ESB-2023.0901", "trust": 0.6 }, { "db": "CNNVD", "id": "CNNVD-202302-1337", "trust": 0.6 }, { "db": "VULMON", "id": "CVE-2022-36382", "trust": 0.1 } ], "sources": [ { "db": "VULMON", "id": "CVE-2022-36382" }, { "db": "JVNDB", "id": "JVNDB-2022-005394" }, { "db": "CNNVD", "id": "CNNVD-202302-1337" }, { "db": "NVD", "id": "CVE-2022-36382" } ] }, "id": "VAR-202302-1248", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VARIoT devices database", "id": null } ], "trust": 0.48344827 }, "last_update_date": "2024-08-14T12:18:00.719000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "INTEL-SA-00754 Hitachi Server / Client Product Security Information", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00754.html" }, { "title": "Intel Ethernet Controllers Buffer error vulnerability fix", "trust": 0.6, "url": "http://123.124.177.30/web/xxk/bdxqById.tag?id=228036" }, { "title": "", "trust": 0.1, "url": "https://github.com/Live-Hack-CVE/CVE-2022-36382 " } ], "sources": [ { "db": "VULMON", "id": "CVE-2022-36382" }, { "db": "JVNDB", "id": "JVNDB-2022-005394" }, { "db": "CNNVD", "id": "CNNVD-202302-1337" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-787", "trust": 1.0 }, { "problemtype": "Out-of-bounds writing (CWE-787) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-005394" }, { "db": "NVD", "id": "CVE-2022-36382" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00754.html" }, { "trust": 0.8, "url": "https://jvn.jp/vu/jvnvu91223897/" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-36382" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2023.0901" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-36382/" }, { "trust": 0.1, "url": "https://github.com/live-hack-cve/cve-2022-36382" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULMON", "id": "CVE-2022-36382" }, { "db": "JVNDB", "id": "JVNDB-2022-005394" }, { "db": "CNNVD", "id": "CNNVD-202302-1337" }, { "db": "NVD", "id": "CVE-2022-36382" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULMON", "id": "CVE-2022-36382" }, { "db": "JVNDB", "id": "JVNDB-2022-005394" }, { "db": "CNNVD", "id": "CNNVD-202302-1337" }, { "db": "NVD", "id": "CVE-2022-36382" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2023-02-16T00:00:00", "db": "VULMON", "id": "CVE-2022-36382" }, { "date": "2023-05-30T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-005394" }, { "date": "2023-02-16T00:00:00", "db": "CNNVD", "id": "CNNVD-202302-1337" }, { "date": "2023-02-16T21:15:13.353000", "db": "NVD", "id": "CVE-2022-36382" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2023-02-17T00:00:00", "db": "VULMON", "id": "CVE-2022-36382" }, { "date": "2023-05-30T05:18:00", "db": "JVNDB", "id": "JVNDB-2022-005394" }, { "date": "2023-03-08T00:00:00", "db": "CNNVD", "id": "CNNVD-202302-1337" }, { "date": "2023-03-07T22:03:21.587000", "db": "NVD", "id": "CVE-2022-36382" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "local", "sources": [ { "db": "CNNVD", "id": "CNNVD-202302-1337" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Intel(R)\u00a0Ethernet\u00a0Controller\u00a0E810\u00a0 and \u00a0700\u00a0 Series out-of-bounds write vulnerability", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-005394" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "buffer error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202302-1337" } ], "trust": 0.6 } }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…