ID

VAR-202302-1374


CVE

CVE-2022-34854


TITLE

Intel's  system usage report  Vulnerability in

Trust: 0.8

sources: JVNDB: JVNDB-2022-019739

DESCRIPTION

Improper access control in the Intel(R) SUR software before version 2.4.8902 may allow an authenticated user to potentially enable escalation of privilege via local access. Intel's system usage report Exists in unspecified vulnerabilities.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state

Trust: 1.8

sources: NVD: CVE-2022-34854 // JVNDB: JVNDB-2022-019739 // VULHUB: VHN-431279 // VULMON: CVE-2022-34854

AFFECTED PRODUCTS

vendor:intelmodel:system usage reportscope:ltversion:2.4.8902

Trust: 1.0

vendor:インテルmodel:system usage reportscope:eqversion:2.4.8902

Trust: 0.8

vendor:インテルmodel:system usage reportscope:eqversion: -

Trust: 0.8

vendor:インテルmodel:system usage reportscope: - version: -

Trust: 0.8

sources: JVNDB: JVNDB-2022-019739 // NVD: CVE-2022-34854

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2022-34854
value: HIGH

Trust: 1.0

secure@intel.com: CVE-2022-34854
value: MEDIUM

Trust: 1.0

NVD: CVE-2022-34854
value: HIGH

Trust: 0.8

CNNVD: CNNVD-202302-1472
value: HIGH

Trust: 0.6

nvd@nist.gov: CVE-2022-34854
baseSeverity: HIGH
baseScore: 7.8
vectorString: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
attackVector: LOCAL
attackComplexity: LOW
privilegesRequired: LOW
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 1.8
impactScore: 5.9
version: 3.1

Trust: 1.0

secure@intel.com: CVE-2022-34854
baseSeverity: MEDIUM
baseScore: 6.7
vectorString: CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H
attackVector: LOCAL
attackComplexity: HIGH
privilegesRequired: LOW
userInteraction: REQUIRED
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 0.8
impactScore: 5.9
version: 3.1

Trust: 1.0

NVD: CVE-2022-34854
baseSeverity: HIGH
baseScore: 7.8
vectorString: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
attackVector: LOCAL
attackComplexity: LOW
privilegesRequired: LOW
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: JVNDB: JVNDB-2022-019739 // CNNVD: CNNVD-202302-1472 // NVD: CVE-2022-34854 // NVD: CVE-2022-34854

PROBLEMTYPE DATA

problemtype:NVD-CWE-Other

Trust: 1.0

problemtype:others (CWE-Other) [NVD evaluation ]

Trust: 0.8

sources: JVNDB: JVNDB-2022-019739 // NVD: CVE-2022-34854

THREAT TYPE

local

Trust: 0.6

sources: CNNVD: CNNVD-202302-1472

TYPE

other

Trust: 0.6

sources: CNNVD: CNNVD-202302-1472

PATCH

title:Intel SUR Security vulnerabilitiesurl:http://123.124.177.30/web/xxk/bdxqById.tag?id=226982

Trust: 0.6

sources: CNNVD: CNNVD-202302-1472

EXTERNAL IDS

db:NVDid:CVE-2022-34854

Trust: 3.4

db:JVNid:JVNVU91223897

Trust: 0.8

db:JVNDBid:JVNDB-2022-019739

Trust: 0.8

db:CNNVDid:CNNVD-202302-1472

Trust: 0.6

db:VULHUBid:VHN-431279

Trust: 0.1

db:VULMONid:CVE-2022-34854

Trust: 0.1

sources: VULHUB: VHN-431279 // VULMON: CVE-2022-34854 // JVNDB: JVNDB-2022-019739 // CNNVD: CNNVD-202302-1472 // NVD: CVE-2022-34854

REFERENCES

url:http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00729.html

Trust: 2.6

url:https://jvn.jp/vu/jvnvu91223897/

Trust: 0.8

url:https://nvd.nist.gov/vuln/detail/cve-2022-34854

Trust: 0.8

url:https://cxsecurity.com/cveshow/cve-2022-34854/

Trust: 0.6

url:https://nvd.nist.gov

Trust: 0.1

sources: VULHUB: VHN-431279 // VULMON: CVE-2022-34854 // JVNDB: JVNDB-2022-019739 // CNNVD: CNNVD-202302-1472 // NVD: CVE-2022-34854

SOURCES

db:VULHUBid:VHN-431279
db:VULMONid:CVE-2022-34854
db:JVNDBid:JVNDB-2022-019739
db:CNNVDid:CNNVD-202302-1472
db:NVDid:CVE-2022-34854

LAST UPDATE DATE

2024-08-14T12:38:43.754000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-431279date:2023-02-27T00:00:00
db:VULMONid:CVE-2022-34854date:2023-02-17T00:00:00
db:JVNDBid:JVNDB-2022-019739date:2023-10-27T05:34:00
db:CNNVDid:CNNVD-202302-1472date:2023-02-28T00:00:00
db:NVDid:CVE-2022-34854date:2023-08-08T14:22:24.967

SOURCES RELEASE DATE

db:VULHUBid:VHN-431279date:2023-02-16T00:00:00
db:VULMONid:CVE-2022-34854date:2023-02-16T00:00:00
db:JVNDBid:JVNDB-2022-019739date:2023-10-27T00:00:00
db:CNNVDid:CNNVD-202302-1472date:2023-02-16T00:00:00
db:NVDid:CVE-2022-34854date:2023-02-16T21:15:12.887