ID

VAR-202302-1204


CVE

CVE-2022-36289


TITLE

Intel's  media software development kit  Vulnerability in

Trust: 0.8

sources: JVNDB: JVNDB-2022-019737

DESCRIPTION

Protection mechanism failure in the Intel(R) Media SDK software before version 22.2.2 may allow an authenticated user to potentially enable denial of service via local access. Intel's media software development kit Exists in unspecified vulnerabilities.Service operation interruption (DoS) It may be in a state

Trust: 1.8

sources: NVD: CVE-2022-36289 // JVNDB: JVNDB-2022-019737 // VULHUB: VHN-432404 // VULMON: CVE-2022-36289

AFFECTED PRODUCTS

vendor:intelmodel:media software development kitscope:ltversion:22.2.2

Trust: 1.0

vendor:インテルmodel:media software development kitscope: - version: -

Trust: 0.8

vendor:インテルmodel:media software development kitscope:eqversion:22.2.2

Trust: 0.8

vendor:インテルmodel:media software development kitscope:eqversion: -

Trust: 0.8

sources: JVNDB: JVNDB-2022-019737 // NVD: CVE-2022-36289

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2022-36289
value: MEDIUM

Trust: 1.0

secure@intel.com: CVE-2022-36289
value: LOW

Trust: 1.0

NVD: CVE-2022-36289
value: MEDIUM

Trust: 0.8

CNNVD: CNNVD-202302-1326
value: MEDIUM

Trust: 0.6

nvd@nist.gov: CVE-2022-36289
baseSeverity: MEDIUM
baseScore: 5.5
vectorString: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
attackVector: LOCAL
attackComplexity: LOW
privilegesRequired: LOW
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: HIGH
exploitabilityScore: 1.8
impactScore: 3.6
version: 3.1

Trust: 1.0

secure@intel.com: CVE-2022-36289
baseSeverity: LOW
baseScore: 2.8
vectorString: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L
attackVector: LOCAL
attackComplexity: LOW
privilegesRequired: LOW
userInteraction: REQUIRED
scope: UNCHANGED
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: LOW
exploitabilityScore: 1.3
impactScore: 1.4
version: 3.1

Trust: 1.0

NVD: CVE-2022-36289
baseSeverity: MEDIUM
baseScore: 5.5
vectorString: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
attackVector: LOCAL
attackComplexity: LOW
privilegesRequired: LOW
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: HIGH
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: JVNDB: JVNDB-2022-019737 // CNNVD: CNNVD-202302-1326 // NVD: CVE-2022-36289 // NVD: CVE-2022-36289

PROBLEMTYPE DATA

problemtype:NVD-CWE-Other

Trust: 1.0

problemtype:others (CWE-Other) [NVD evaluation ]

Trust: 0.8

sources: JVNDB: JVNDB-2022-019737 // NVD: CVE-2022-36289

THREAT TYPE

local

Trust: 0.6

sources: CNNVD: CNNVD-202302-1326

TYPE

other

Trust: 0.6

sources: CNNVD: CNNVD-202302-1326

PATCH

title:Intel Media SDK Security vulnerabilitiesurl:http://123.124.177.30/web/xxk/bdxqById.tag?id=226955

Trust: 0.6

title: - url:https://github.com/Live-Hack-CVE/CVE-2022-36289

Trust: 0.1

sources: VULMON: CVE-2022-36289 // CNNVD: CNNVD-202302-1326

EXTERNAL IDS

db:NVDid:CVE-2022-36289

Trust: 3.4

db:JVNid:JVNVU91223897

Trust: 0.8

db:JVNDBid:JVNDB-2022-019737

Trust: 0.8

db:AUSCERTid:ESB-2023.0905

Trust: 0.6

db:CNNVDid:CNNVD-202302-1326

Trust: 0.6

db:VULHUBid:VHN-432404

Trust: 0.1

db:VULMONid:CVE-2022-36289

Trust: 0.1

sources: VULHUB: VHN-432404 // VULMON: CVE-2022-36289 // JVNDB: JVNDB-2022-019737 // CNNVD: CNNVD-202302-1326 // NVD: CVE-2022-36289

REFERENCES

url:http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00731.html

Trust: 2.6

url:https://jvn.jp/vu/jvnvu91223897/

Trust: 0.8

url:https://nvd.nist.gov/vuln/detail/cve-2022-36289

Trust: 0.8

url:https://cxsecurity.com/cveshow/cve-2022-36289/

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2023.0905

Trust: 0.6

url:https://github.com/live-hack-cve/cve-2022-36289

Trust: 0.1

url:https://nvd.nist.gov

Trust: 0.1

sources: VULHUB: VHN-432404 // VULMON: CVE-2022-36289 // JVNDB: JVNDB-2022-019737 // CNNVD: CNNVD-202302-1326 // NVD: CVE-2022-36289

SOURCES

db:VULHUBid:VHN-432404
db:VULMONid:CVE-2022-36289
db:JVNDBid:JVNDB-2022-019737
db:CNNVDid:CNNVD-202302-1326
db:NVDid:CVE-2022-36289

LAST UPDATE DATE

2024-08-14T13:18:05.348000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-432404date:2023-02-27T00:00:00
db:VULMONid:CVE-2022-36289date:2023-02-17T00:00:00
db:JVNDBid:JVNDB-2022-019737date:2023-10-27T05:31:00
db:CNNVDid:CNNVD-202302-1326date:2023-02-28T00:00:00
db:NVDid:CVE-2022-36289date:2023-02-27T18:52:04.420

SOURCES RELEASE DATE

db:VULHUBid:VHN-432404date:2023-02-16T00:00:00
db:VULMONid:CVE-2022-36289date:2023-02-16T00:00:00
db:JVNDBid:JVNDB-2022-019737date:2023-10-27T00:00:00
db:CNNVDid:CNNVD-202302-1326date:2023-02-16T00:00:00
db:NVDid:CVE-2022-36289date:2023-02-16T21:15:13.217