ID

VAR-202302-1411


CVE

CVE-2022-31476


TITLE

Intel's  system usage report  Vulnerability in

Trust: 0.8

sources: JVNDB: JVNDB-2022-019745

DESCRIPTION

Improper access control in the Intel(R) SUR software before version 2.4.8902 may allow an authenticated user to potentially enable denial of service via local access. Intel's system usage report Exists in unspecified vulnerabilities.Service operation interruption (DoS) It may be in a state

Trust: 1.8

sources: NVD: CVE-2022-31476 // JVNDB: JVNDB-2022-019745 // VULHUB: VHN-430791 // VULMON: CVE-2022-31476

AFFECTED PRODUCTS

vendor:intelmodel:system usage reportscope:ltversion:2.4.8902

Trust: 1.0

vendor:インテルmodel:system usage reportscope:eqversion:2.4.8902

Trust: 0.8

vendor:インテルmodel:system usage reportscope:eqversion: -

Trust: 0.8

vendor:インテルmodel:system usage reportscope: - version: -

Trust: 0.8

sources: JVNDB: JVNDB-2022-019745 // NVD: CVE-2022-31476

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2022-31476
value: MEDIUM

Trust: 1.0

secure@intel.com: CVE-2022-31476
value: MEDIUM

Trust: 1.0

NVD: CVE-2022-31476
value: MEDIUM

Trust: 0.8

CNNVD: CNNVD-202302-1485
value: MEDIUM

Trust: 0.6

nvd@nist.gov: CVE-2022-31476
baseSeverity: MEDIUM
baseScore: 5.5
vectorString: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
attackVector: LOCAL
attackComplexity: LOW
privilegesRequired: LOW
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: HIGH
exploitabilityScore: 1.8
impactScore: 3.6
version: 3.1

Trust: 2.0

NVD: CVE-2022-31476
baseSeverity: MEDIUM
baseScore: 5.5
vectorString: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
attackVector: LOCAL
attackComplexity: LOW
privilegesRequired: LOW
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: HIGH
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: JVNDB: JVNDB-2022-019745 // CNNVD: CNNVD-202302-1485 // NVD: CVE-2022-31476 // NVD: CVE-2022-31476

PROBLEMTYPE DATA

problemtype:NVD-CWE-Other

Trust: 1.0

problemtype:others (CWE-Other) [NVD evaluation ]

Trust: 0.8

sources: JVNDB: JVNDB-2022-019745 // NVD: CVE-2022-31476

THREAT TYPE

local

Trust: 0.6

sources: CNNVD: CNNVD-202302-1485

TYPE

other

Trust: 0.6

sources: CNNVD: CNNVD-202302-1485

PATCH

title:Intel SUR Security vulnerabilitiesurl:http://123.124.177.30/web/xxk/bdxqById.tag?id=226989

Trust: 0.6

title: - url:https://github.com/Live-Hack-CVE/CVE-2022-31476

Trust: 0.1

sources: VULMON: CVE-2022-31476 // CNNVD: CNNVD-202302-1485

EXTERNAL IDS

db:NVDid:CVE-2022-31476

Trust: 3.4

db:JVNid:JVNVU91223897

Trust: 0.8

db:JVNDBid:JVNDB-2022-019745

Trust: 0.8

db:CNNVDid:CNNVD-202302-1485

Trust: 0.6

db:VULHUBid:VHN-430791

Trust: 0.1

db:VULMONid:CVE-2022-31476

Trust: 0.1

sources: VULHUB: VHN-430791 // VULMON: CVE-2022-31476 // JVNDB: JVNDB-2022-019745 // CNNVD: CNNVD-202302-1485 // NVD: CVE-2022-31476

REFERENCES

url:http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00729.html

Trust: 2.6

url:https://jvn.jp/vu/jvnvu91223897/

Trust: 0.8

url:https://nvd.nist.gov/vuln/detail/cve-2022-31476

Trust: 0.8

url:https://cxsecurity.com/cveshow/cve-2022-31476/

Trust: 0.6

url:https://github.com/live-hack-cve/cve-2022-31476

Trust: 0.1

url:https://nvd.nist.gov

Trust: 0.1

sources: VULHUB: VHN-430791 // VULMON: CVE-2022-31476 // JVNDB: JVNDB-2022-019745 // CNNVD: CNNVD-202302-1485 // NVD: CVE-2022-31476

SOURCES

db:VULHUBid:VHN-430791
db:VULMONid:CVE-2022-31476
db:JVNDBid:JVNDB-2022-019745
db:CNNVDid:CNNVD-202302-1485
db:NVDid:CVE-2022-31476

LAST UPDATE DATE

2024-08-14T12:54:56.579000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-430791date:2023-02-27T00:00:00
db:VULMONid:CVE-2022-31476date:2023-02-17T00:00:00
db:JVNDBid:JVNDB-2022-019745date:2023-10-27T05:48:00
db:CNNVDid:CNNVD-202302-1485date:2023-02-28T00:00:00
db:NVDid:CVE-2022-31476date:2023-08-08T14:22:24.967

SOURCES RELEASE DATE

db:VULHUBid:VHN-430791date:2023-02-16T00:00:00
db:VULMONid:CVE-2022-31476date:2023-02-16T00:00:00
db:JVNDBid:JVNDB-2022-019745date:2023-10-27T00:00:00
db:CNNVDid:CNNVD-202302-1485date:2023-02-16T00:00:00
db:NVDid:CVE-2022-31476date:2023-02-16T21:15:12.127