ID

VAR-202302-1461


CVE

CVE-2022-29514


TITLE

Intel's  system usage report  Vulnerability in

Trust: 0.8

sources: JVNDB: JVNDB-2022-019747

DESCRIPTION

Improper access control in the Intel(R) SUR software before version 2.4.8902 may allow an unauthenticated user to potentially enable escalation of privilege via network access. Intel's system usage report Exists in unspecified vulnerabilities.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state

Trust: 1.8

sources: NVD: CVE-2022-29514 // JVNDB: JVNDB-2022-019747 // VULHUB: VHN-430629 // VULMON: CVE-2022-29514

AFFECTED PRODUCTS

vendor:intelmodel:system usage reportscope:ltversion:2.4.8902

Trust: 1.0

vendor:インテルmodel:system usage reportscope:eqversion:2.4.8902

Trust: 0.8

vendor:インテルmodel:system usage reportscope:eqversion: -

Trust: 0.8

vendor:インテルmodel:system usage reportscope: - version: -

Trust: 0.8

sources: JVNDB: JVNDB-2022-019747 // NVD: CVE-2022-29514

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2022-29514
value: CRITICAL

Trust: 1.0

secure@intel.com: CVE-2022-29514
value: HIGH

Trust: 1.0

NVD: CVE-2022-29514
value: CRITICAL

Trust: 0.8

CNNVD: CNNVD-202302-1480
value: CRITICAL

Trust: 0.6

nvd@nist.gov: CVE-2022-29514
baseSeverity: CRITICAL
baseScore: 9.8
vectorString: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 3.9
impactScore: 5.9
version: 3.1

Trust: 1.0

secure@intel.com: CVE-2022-29514
baseSeverity: HIGH
baseScore: 7.7
vectorString: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:H/A:H
attackVector: NETWORK
attackComplexity: HIGH
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: LOW
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 2.2
impactScore: 5.5
version: 3.1

Trust: 1.0

NVD: CVE-2022-29514
baseSeverity: CRITICAL
baseScore: 9.8
vectorString: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: JVNDB: JVNDB-2022-019747 // CNNVD: CNNVD-202302-1480 // NVD: CVE-2022-29514 // NVD: CVE-2022-29514

PROBLEMTYPE DATA

problemtype:NVD-CWE-Other

Trust: 1.0

problemtype:others (CWE-Other) [NVD evaluation ]

Trust: 0.8

sources: JVNDB: JVNDB-2022-019747 // NVD: CVE-2022-29514

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-202302-1480

TYPE

other

Trust: 0.6

sources: CNNVD: CNNVD-202302-1480

PATCH

title:Intel SUR Security vulnerabilitiesurl:http://123.124.177.30/web/xxk/bdxqById.tag?id=226986

Trust: 0.6

sources: CNNVD: CNNVD-202302-1480

EXTERNAL IDS

db:NVDid:CVE-2022-29514

Trust: 3.4

db:JVNid:JVNVU91223897

Trust: 0.8

db:JVNDBid:JVNDB-2022-019747

Trust: 0.8

db:CNNVDid:CNNVD-202302-1480

Trust: 0.6

db:VULHUBid:VHN-430629

Trust: 0.1

db:VULMONid:CVE-2022-29514

Trust: 0.1

sources: VULHUB: VHN-430629 // VULMON: CVE-2022-29514 // JVNDB: JVNDB-2022-019747 // CNNVD: CNNVD-202302-1480 // NVD: CVE-2022-29514

REFERENCES

url:http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00729.html

Trust: 2.6

url:https://jvn.jp/vu/jvnvu91223897/

Trust: 0.8

url:https://nvd.nist.gov/vuln/detail/cve-2022-29514

Trust: 0.8

url:https://cxsecurity.com/cveshow/cve-2022-29514/

Trust: 0.6

url:https://nvd.nist.gov

Trust: 0.1

sources: VULHUB: VHN-430629 // VULMON: CVE-2022-29514 // JVNDB: JVNDB-2022-019747 // CNNVD: CNNVD-202302-1480 // NVD: CVE-2022-29514

SOURCES

db:VULHUBid:VHN-430629
db:VULMONid:CVE-2022-29514
db:JVNDBid:JVNDB-2022-019747
db:CNNVDid:CNNVD-202302-1480
db:NVDid:CVE-2022-29514

LAST UPDATE DATE

2024-08-14T12:09:47.484000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-430629date:2023-02-27T00:00:00
db:VULMONid:CVE-2022-29514date:2023-02-17T00:00:00
db:JVNDBid:JVNDB-2022-019747date:2023-10-27T05:50:00
db:CNNVDid:CNNVD-202302-1480date:2023-02-28T00:00:00
db:NVDid:CVE-2022-29514date:2023-08-08T14:22:24.967

SOURCES RELEASE DATE

db:VULHUBid:VHN-430629date:2023-02-16T00:00:00
db:VULMONid:CVE-2022-29514date:2023-02-16T00:00:00
db:JVNDBid:JVNDB-2022-019747date:2023-10-27T00:00:00
db:CNNVDid:CNNVD-202302-1480date:2023-02-16T00:00:00
db:NVDid:CVE-2022-29514date:2023-02-16T21:15:11.887