ID

VAR-202302-1176


CVE

CVE-2022-30530


TITLE

Intel's  Intel Driver and Support Assistant  Vulnerability in

Trust: 0.8

sources: JVNDB: JVNDB-2022-020122

DESCRIPTION

Protection mechanism failure in the Intel(R) DSA software before version 22.4.26 may allow an authenticated user to potentially enable escalation of privilege via local access. Intel's Intel Driver and Support Assistant Exists in unspecified vulnerabilities.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state

Trust: 1.8

sources: NVD: CVE-2022-30530 // JVNDB: JVNDB-2022-020122 // VULHUB: VHN-426236 // VULMON: CVE-2022-30530

AFFECTED PRODUCTS

vendor:intelmodel:driver \& support assistantscope:ltversion:22.4.26

Trust: 1.0

vendor:インテルmodel:intel driver and support assistantscope:eqversion: -

Trust: 0.8

vendor:インテルmodel:intel driver and support assistantscope:eqversion:22.4.26

Trust: 0.8

vendor:インテルmodel:intel driver and support assistantscope: - version: -

Trust: 0.8

sources: JVNDB: JVNDB-2022-020122 // NVD: CVE-2022-30530

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2022-30530
value: HIGH

Trust: 1.0

secure@intel.com: CVE-2022-30530
value: HIGH

Trust: 1.0

NVD: CVE-2022-30530
value: HIGH

Trust: 0.8

CNNVD: CNNVD-202302-1339
value: HIGH

Trust: 0.6

nvd@nist.gov: CVE-2022-30530
baseSeverity: HIGH
baseScore: 7.8
vectorString: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
attackVector: LOCAL
attackComplexity: LOW
privilegesRequired: LOW
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 1.8
impactScore: 5.9
version: 3.1

Trust: 2.0

NVD: CVE-2022-30530
baseSeverity: HIGH
baseScore: 7.8
vectorString: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
attackVector: LOCAL
attackComplexity: LOW
privilegesRequired: LOW
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: JVNDB: JVNDB-2022-020122 // CNNVD: CNNVD-202302-1339 // NVD: CVE-2022-30530 // NVD: CVE-2022-30530

PROBLEMTYPE DATA

problemtype:NVD-CWE-Other

Trust: 1.0

problemtype:others (CWE-Other) [NVD evaluation ]

Trust: 0.8

sources: JVNDB: JVNDB-2022-020122 // NVD: CVE-2022-30530

THREAT TYPE

local

Trust: 0.6

sources: CNNVD: CNNVD-202302-1339

TYPE

other

Trust: 0.6

sources: CNNVD: CNNVD-202302-1339

PATCH

title:Intel DSA Security vulnerabilitiesurl:http://123.124.177.30/web/xxk/bdxqById.tag?id=225851

Trust: 0.6

title: - url:https://github.com/Live-Hack-CVE/CVE-2022-30530

Trust: 0.1

sources: VULMON: CVE-2022-30530 // CNNVD: CNNVD-202302-1339

EXTERNAL IDS

db:NVDid:CVE-2022-30530

Trust: 3.4

db:JVNid:JVNVU91223897

Trust: 0.8

db:JVNDBid:JVNDB-2022-020122

Trust: 0.8

db:AUSCERTid:ESB-2023.0898

Trust: 0.6

db:CNNVDid:CNNVD-202302-1339

Trust: 0.6

db:VULHUBid:VHN-426236

Trust: 0.1

db:VULMONid:CVE-2022-30530

Trust: 0.1

sources: VULHUB: VHN-426236 // VULMON: CVE-2022-30530 // JVNDB: JVNDB-2022-020122 // CNNVD: CNNVD-202302-1339 // NVD: CVE-2022-30530

REFERENCES

url:http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00725.html

Trust: 2.6

url:https://jvn.jp/vu/jvnvu91223897/

Trust: 0.8

url:https://nvd.nist.gov/vuln/detail/cve-2022-30530

Trust: 0.8

url:https://www.auscert.org.au/bulletins/esb-2023.0898

Trust: 0.6

url:https://cxsecurity.com/cveshow/cve-2022-30530/

Trust: 0.6

url:https://github.com/live-hack-cve/cve-2022-30530

Trust: 0.1

url:https://nvd.nist.gov

Trust: 0.1

sources: VULHUB: VHN-426236 // VULMON: CVE-2022-30530 // JVNDB: JVNDB-2022-020122 // CNNVD: CNNVD-202302-1339 // NVD: CVE-2022-30530

SOURCES

db:VULHUBid:VHN-426236
db:VULMONid:CVE-2022-30530
db:JVNDBid:JVNDB-2022-020122
db:CNNVDid:CNNVD-202302-1339
db:NVDid:CVE-2022-30530

LAST UPDATE DATE

2024-08-14T13:03:00.263000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-426236date:2023-03-06T00:00:00
db:VULMONid:CVE-2022-30530date:2023-02-17T00:00:00
db:JVNDBid:JVNDB-2022-020122date:2023-10-31T07:02:00
db:CNNVDid:CNNVD-202302-1339date:2023-03-07T00:00:00
db:NVDid:CVE-2022-30530date:2023-03-06T14:28:45.850

SOURCES RELEASE DATE

db:VULHUBid:VHN-426236date:2023-02-16T00:00:00
db:VULMONid:CVE-2022-30530date:2023-02-16T00:00:00
db:JVNDBid:JVNDB-2022-020122date:2023-10-31T00:00:00
db:CNNVDid:CNNVD-202302-1339date:2023-02-16T00:00:00
db:NVDid:CVE-2022-30530date:2023-02-16T20:15:13.953