ID

VAR-202302-1329


CVE

CVE-2022-26425


TITLE

Intel's  oneapi collective communications library  Vulnerability regarding uncontrolled search path elements in

Trust: 0.8

sources: JVNDB: JVNDB-2022-019753

DESCRIPTION

Uncontrolled search path element in the Intel(R) oneAPI Collective Communications Library (oneCCL) before version 2021.6 for Intel(R) oneAPI Base Toolkit may allow an authenticated user to potentially enable escalation of privilege via local access. (DoS) It may be in a state

Trust: 1.8

sources: NVD: CVE-2022-26425 // JVNDB: JVNDB-2022-019753 // VULHUB: VHN-417119 // VULMON: CVE-2022-26425

AFFECTED PRODUCTS

vendor:intelmodel:oneapi collective communications libraryscope:ltversion:2021.6

Trust: 1.0

vendor:インテルmodel:oneapi collective communications libraryscope: - version: -

Trust: 0.8

vendor:インテルmodel:oneapi collective communications libraryscope:eqversion:2021.6

Trust: 0.8

vendor:インテルmodel:oneapi collective communications libraryscope:eqversion: -

Trust: 0.8

sources: JVNDB: JVNDB-2022-019753 // NVD: CVE-2022-26425

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2022-26425
value: HIGH

Trust: 1.0

secure@intel.com: CVE-2022-26425
value: MEDIUM

Trust: 1.0

NVD: CVE-2022-26425
value: HIGH

Trust: 0.8

CNNVD: CNNVD-202302-1400
value: HIGH

Trust: 0.6

nvd@nist.gov: CVE-2022-26425
baseSeverity: HIGH
baseScore: 7.3
vectorString: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H
attackVector: LOCAL
attackComplexity: LOW
privilegesRequired: LOW
userInteraction: REQUIRED
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 1.3
impactScore: 5.9
version: 3.1

Trust: 1.0

secure@intel.com: CVE-2022-26425
baseSeverity: MEDIUM
baseScore: 6.7
vectorString: CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H
attackVector: LOCAL
attackComplexity: HIGH
privilegesRequired: LOW
userInteraction: REQUIRED
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 0.8
impactScore: 5.9
version: 3.1

Trust: 1.0

NVD: CVE-2022-26425
baseSeverity: HIGH
baseScore: 7.3
vectorString: CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H
attackVector: LOCAL
attackComplexity: LOW
privilegesRequired: LOW
userInteraction: REQUIRED
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: JVNDB: JVNDB-2022-019753 // CNNVD: CNNVD-202302-1400 // NVD: CVE-2022-26425 // NVD: CVE-2022-26425

PROBLEMTYPE DATA

problemtype:CWE-427

Trust: 1.1

problemtype:Uncontrolled search path elements (CWE-427) [NVD evaluation ]

Trust: 0.8

sources: VULHUB: VHN-417119 // JVNDB: JVNDB-2022-019753 // NVD: CVE-2022-26425

THREAT TYPE

local

Trust: 0.6

sources: CNNVD: CNNVD-202302-1400

TYPE

code problem

Trust: 0.6

sources: CNNVD: CNNVD-202302-1400

PATCH

title:Intel OneApi Toolkits Fixes for code issue vulnerabilitiesurl:http://123.124.177.30/web/xxk/bdxqById.tag?id=227087

Trust: 0.6

title: - url:https://github.com/Live-Hack-CVE/CVE-2022-26425

Trust: 0.1

sources: VULMON: CVE-2022-26425 // CNNVD: CNNVD-202302-1400

EXTERNAL IDS

db:NVDid:CVE-2022-26425

Trust: 3.4

db:JVNid:JVNVU91223897

Trust: 0.8

db:JVNDBid:JVNDB-2022-019753

Trust: 0.8

db:CNNVDid:CNNVD-202302-1400

Trust: 0.6

db:VULHUBid:VHN-417119

Trust: 0.1

db:VULMONid:CVE-2022-26425

Trust: 0.1

sources: VULHUB: VHN-417119 // VULMON: CVE-2022-26425 // JVNDB: JVNDB-2022-019753 // CNNVD: CNNVD-202302-1400 // NVD: CVE-2022-26425

REFERENCES

url:http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00674.html

Trust: 2.6

url:https://jvn.jp/vu/jvnvu91223897/

Trust: 0.8

url:https://nvd.nist.gov/vuln/detail/cve-2022-26425

Trust: 0.8

url:https://cxsecurity.com/cveshow/cve-2022-26425/

Trust: 0.6

url:https://github.com/live-hack-cve/cve-2022-26425

Trust: 0.1

url:https://nvd.nist.gov

Trust: 0.1

sources: VULHUB: VHN-417119 // VULMON: CVE-2022-26425 // JVNDB: JVNDB-2022-019753 // CNNVD: CNNVD-202302-1400 // NVD: CVE-2022-26425

SOURCES

db:VULHUBid:VHN-417119
db:VULMONid:CVE-2022-26425
db:JVNDBid:JVNDB-2022-019753
db:CNNVDid:CNNVD-202302-1400
db:NVDid:CVE-2022-26425

LAST UPDATE DATE

2024-08-14T12:15:21.837000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-417119date:2023-02-28T00:00:00
db:VULMONid:CVE-2022-26425date:2023-02-17T00:00:00
db:JVNDBid:JVNDB-2022-019753date:2023-10-27T06:10:00
db:CNNVDid:CNNVD-202302-1400date:2023-03-01T00:00:00
db:NVDid:CVE-2022-26425date:2023-02-28T19:19:57.267

SOURCES RELEASE DATE

db:VULHUBid:VHN-417119date:2023-02-16T00:00:00
db:VULMONid:CVE-2022-26425date:2023-02-16T00:00:00
db:JVNDBid:JVNDB-2022-019753date:2023-10-27T00:00:00
db:CNNVDid:CNNVD-202302-1400date:2023-02-16T00:00:00
db:NVDid:CVE-2022-26425date:2023-02-16T20:15:13.233