ID

VAR-202302-1460


CVE

CVE-2022-32971


TITLE

Intel's  system usage report  Authentication vulnerability in

Trust: 0.8

sources: JVNDB: JVNDB-2022-019744

DESCRIPTION

Improper authentication in the Intel(R) SUR software before version 2.4.8902 may allow a privileged user to potentially enable escalation of privilege via network access. Intel's system usage report There is an authentication vulnerability in.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state

Trust: 1.8

sources: NVD: CVE-2022-32971 // JVNDB: JVNDB-2022-019744 // VULHUB: VHN-430913 // VULMON: CVE-2022-32971

AFFECTED PRODUCTS

vendor:intelmodel:system usage reportscope:ltversion:2.4.8902

Trust: 1.0

vendor:インテルmodel:system usage reportscope:eqversion:2.4.8902

Trust: 0.8

vendor:インテルmodel:system usage reportscope:eqversion: -

Trust: 0.8

vendor:インテルmodel:system usage reportscope: - version: -

Trust: 0.8

sources: JVNDB: JVNDB-2022-019744 // NVD: CVE-2022-32971

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2022-32971
value: HIGH

Trust: 1.0

secure@intel.com: CVE-2022-32971
value: LOW

Trust: 1.0

NVD: CVE-2022-32971
value: HIGH

Trust: 0.8

CNNVD: CNNVD-202302-1482
value: HIGH

Trust: 0.6

nvd@nist.gov: CVE-2022-32971
baseSeverity: HIGH
baseScore: 7.2
vectorString: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: HIGH
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 1.2
impactScore: 5.9
version: 3.1

Trust: 1.0

secure@intel.com: CVE-2022-32971
baseSeverity: LOW
baseScore: 3.1
vectorString: CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:N/I:L/A:L
attackVector: NETWORK
attackComplexity: HIGH
privilegesRequired: HIGH
userInteraction: REQUIRED
scope: UNCHANGED
confidentialityImpact: NONE
integrityImpact: LOW
availabilityImpact: LOW
exploitabilityScore: 0.5
impactScore: 2.5
version: 3.1

Trust: 1.0

NVD: CVE-2022-32971
baseSeverity: HIGH
baseScore: 7.2
vectorString: CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: HIGH
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: JVNDB: JVNDB-2022-019744 // CNNVD: CNNVD-202302-1482 // NVD: CVE-2022-32971 // NVD: CVE-2022-32971

PROBLEMTYPE DATA

problemtype:CWE-287

Trust: 1.1

problemtype:Inappropriate authentication (CWE-287) [NVD evaluation ]

Trust: 0.8

sources: VULHUB: VHN-430913 // JVNDB: JVNDB-2022-019744 // NVD: CVE-2022-32971

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-202302-1482

TYPE

authorization issue

Trust: 0.6

sources: CNNVD: CNNVD-202302-1482

PATCH

title:Intel SUR Remediation measures for authorization problem vulnerabilitiesurl:http://123.124.177.30/web/xxk/bdxqById.tag?id=226987

Trust: 0.6

sources: CNNVD: CNNVD-202302-1482

EXTERNAL IDS

db:NVDid:CVE-2022-32971

Trust: 3.4

db:JVNid:JVNVU91223897

Trust: 0.8

db:JVNDBid:JVNDB-2022-019744

Trust: 0.8

db:CNNVDid:CNNVD-202302-1482

Trust: 0.6

db:VULHUBid:VHN-430913

Trust: 0.1

db:VULMONid:CVE-2022-32971

Trust: 0.1

sources: VULHUB: VHN-430913 // VULMON: CVE-2022-32971 // JVNDB: JVNDB-2022-019744 // CNNVD: CNNVD-202302-1482 // NVD: CVE-2022-32971

REFERENCES

url:http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00729.html

Trust: 2.6

url:https://jvn.jp/vu/jvnvu91223897/

Trust: 0.8

url:https://nvd.nist.gov/vuln/detail/cve-2022-32971

Trust: 0.8

url:https://cxsecurity.com/cveshow/cve-2022-32971/

Trust: 0.6

url:https://nvd.nist.gov

Trust: 0.1

sources: VULHUB: VHN-430913 // VULMON: CVE-2022-32971 // JVNDB: JVNDB-2022-019744 // CNNVD: CNNVD-202302-1482 // NVD: CVE-2022-32971

SOURCES

db:VULHUBid:VHN-430913
db:VULMONid:CVE-2022-32971
db:JVNDBid:JVNDB-2022-019744
db:CNNVDid:CNNVD-202302-1482
db:NVDid:CVE-2022-32971

LAST UPDATE DATE

2024-08-14T12:14:43.156000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-430913date:2023-02-27T00:00:00
db:VULMONid:CVE-2022-32971date:2023-02-17T00:00:00
db:JVNDBid:JVNDB-2022-019744date:2023-10-27T05:47:00
db:CNNVDid:CNNVD-202302-1482date:2023-02-28T00:00:00
db:NVDid:CVE-2022-32971date:2023-02-27T19:00:17.990

SOURCES RELEASE DATE

db:VULHUBid:VHN-430913date:2023-02-16T00:00:00
db:VULMONid:CVE-2022-32971date:2023-02-16T00:00:00
db:JVNDBid:JVNDB-2022-019744date:2023-10-27T00:00:00
db:CNNVDid:CNNVD-202302-1482date:2023-02-16T00:00:00
db:NVDid:CVE-2022-32971date:2023-02-16T21:15:12.297