ID

VAR-202208-1490


CVE

CVE-2022-25966


TITLE

Intel's  edge insights for industrial  Vulnerability in

Trust: 0.8

sources: JVNDB: JVNDB-2022-015180

DESCRIPTION

Improper access control in the Intel(R) Edge Insights for Industrial software before version 2.6.1 may allow an authenticated user to potentially enable escalation of privilege via local access. Intel's edge insights for industrial Exists in unspecified vulnerabilities.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. Intel Edge Insights for Industrial is a pre-validated, ready-to-deploy software reference design from Intel Corporation for video and time-series data ingestion. Attackers exploit this vulnerability to escalate privileges

Trust: 1.71

sources: NVD: CVE-2022-25966 // JVNDB: JVNDB-2022-015180 // VULHUB: VHN-416751

AFFECTED PRODUCTS

vendor:intelmodel:edge insights for industrialscope:ltversion:2.6.1

Trust: 1.0

vendor:インテルmodel:edge insights for industrialscope:eqversion:2.6.1

Trust: 0.8

vendor:インテルmodel:edge insights for industrialscope:eqversion: -

Trust: 0.8

vendor:インテルmodel:edge insights for industrialscope: - version: -

Trust: 0.8

sources: JVNDB: JVNDB-2022-015180 // NVD: CVE-2022-25966

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2022-25966
value: HIGH

Trust: 1.0

134c704f-9b21-4f2e-91b3-4a467353bcc0: CVE-2022-25966
value: HIGH

Trust: 1.0

NVD: CVE-2022-25966
value: HIGH

Trust: 0.8

CNNVD: CNNVD-202208-3403
value: HIGH

Trust: 0.6

nvd@nist.gov: CVE-2022-25966
baseSeverity: HIGH
baseScore: 7.8
vectorString: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
attackVector: LOCAL
attackComplexity: LOW
privilegesRequired: LOW
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 1.8
impactScore: 5.9
version: 3.1

Trust: 2.0

NVD: CVE-2022-25966
baseSeverity: HIGH
baseScore: 7.8
vectorString: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
attackVector: LOCAL
attackComplexity: LOW
privilegesRequired: LOW
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: JVNDB: JVNDB-2022-015180 // CNNVD: CNNVD-202208-3403 // NVD: CVE-2022-25966 // NVD: CVE-2022-25966

PROBLEMTYPE DATA

problemtype:NVD-CWE-Other

Trust: 1.0

problemtype:others (CWE-Other) [NVD evaluation ]

Trust: 0.8

problemtype:CWE-269

Trust: 0.1

sources: VULHUB: VHN-416751 // JVNDB: JVNDB-2022-015180 // NVD: CVE-2022-25966

THREAT TYPE

local

Trust: 0.6

sources: CNNVD: CNNVD-202208-3403

TYPE

other

Trust: 0.6

sources: CNNVD: CNNVD-202208-3403

PATCH

title:Intel Edge Insights for Industrial Security vulnerabilitiesurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=205101

Trust: 0.6

sources: CNNVD: CNNVD-202208-3403

EXTERNAL IDS

db:NVDid:CVE-2022-25966

Trust: 3.3

db:JVNid:JVNVU99494206

Trust: 0.8

db:JVNDBid:JVNDB-2022-015180

Trust: 0.8

db:CNNVDid:CNNVD-202208-3403

Trust: 0.7

db:VULHUBid:VHN-416751

Trust: 0.1

sources: VULHUB: VHN-416751 // JVNDB: JVNDB-2022-015180 // CNNVD: CNNVD-202208-3403 // NVD: CVE-2022-25966

REFERENCES

url:https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00653.html

Trust: 2.5

url:https://jvn.jp/vu/jvnvu99494206/

Trust: 0.8

url:https://nvd.nist.gov/vuln/detail/cve-2022-25966

Trust: 0.8

url:https://cxsecurity.com/cveshow/cve-2022-25966/

Trust: 0.6

sources: VULHUB: VHN-416751 // JVNDB: JVNDB-2022-015180 // CNNVD: CNNVD-202208-3403 // NVD: CVE-2022-25966

SOURCES

db:VULHUBid:VHN-416751
db:JVNDBid:JVNDB-2022-015180
db:CNNVDid:CNNVD-202208-3403
db:NVDid:CVE-2022-25966

LAST UPDATE DATE

2025-05-07T22:52:15.381000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-416751date:2022-08-19T00:00:00
db:JVNDBid:JVNDB-2022-015180date:2023-09-25T08:45:00
db:CNNVDid:CNNVD-202208-3403date:2022-08-29T00:00:00
db:NVDid:CVE-2022-25966date:2025-05-05T17:18:02.243

SOURCES RELEASE DATE

db:VULHUBid:VHN-416751date:2022-08-18T00:00:00
db:JVNDBid:JVNDB-2022-015180date:2023-09-25T00:00:00
db:CNNVDid:CNNVD-202208-3403date:2022-08-18T00:00:00
db:NVDid:CVE-2022-25966date:2022-08-18T20:15:10.780