ID

VAR-202302-1467


CVE

CVE-2022-26032


TITLE

Intel's  distribution for python  Vulnerability regarding uncontrolled search path elements in

Trust: 0.8

sources: JVNDB: JVNDB-2022-019759

DESCRIPTION

Uncontrolled search path element in the Intel(R) Distribution for Python programming language before version 2022.1 for Intel(R) oneAPI Toolkits may allow an authenticated user to potentially enable escalation of privilege via local access. Intel's distribution for python Exists in a vulnerability in an element of an uncontrolled search path.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state

Trust: 1.8

sources: NVD: CVE-2022-26032 // JVNDB: JVNDB-2022-019759 // VULHUB: VHN-416810 // VULMON: CVE-2022-26032

AFFECTED PRODUCTS

vendor:intelmodel:distribution for pythonscope:ltversion:2022.1

Trust: 1.0

vendor:インテルmodel:distribution for pythonscope:eqversion: -

Trust: 0.8

vendor:インテルmodel:distribution for pythonscope: - version: -

Trust: 0.8

vendor:インテルmodel:distribution for pythonscope:eqversion:2022.1

Trust: 0.8

sources: JVNDB: JVNDB-2022-019759 // NVD: CVE-2022-26032

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2022-26032
value: HIGH

Trust: 1.0

secure@intel.com: CVE-2022-26032
value: MEDIUM

Trust: 1.0

NVD: CVE-2022-26032
value: HIGH

Trust: 0.8

CNNVD: CNNVD-202302-1407
value: HIGH

Trust: 0.6

nvd@nist.gov: CVE-2022-26032
baseSeverity: HIGH
baseScore: 7.3
vectorString: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H
attackVector: LOCAL
attackComplexity: LOW
privilegesRequired: LOW
userInteraction: REQUIRED
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 1.3
impactScore: 5.9
version: 3.1

Trust: 1.0

secure@intel.com: CVE-2022-26032
baseSeverity: MEDIUM
baseScore: 6.7
vectorString: CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H
attackVector: LOCAL
attackComplexity: HIGH
privilegesRequired: LOW
userInteraction: REQUIRED
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 0.8
impactScore: 5.9
version: 3.1

Trust: 1.0

NVD: CVE-2022-26032
baseSeverity: HIGH
baseScore: 7.3
vectorString: CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H
attackVector: LOCAL
attackComplexity: LOW
privilegesRequired: LOW
userInteraction: REQUIRED
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: JVNDB: JVNDB-2022-019759 // CNNVD: CNNVD-202302-1407 // NVD: CVE-2022-26032 // NVD: CVE-2022-26032

PROBLEMTYPE DATA

problemtype:CWE-427

Trust: 1.1

problemtype:Uncontrolled search path elements (CWE-427) [NVD evaluation ]

Trust: 0.8

sources: VULHUB: VHN-416810 // JVNDB: JVNDB-2022-019759 // NVD: CVE-2022-26032

THREAT TYPE

local

Trust: 0.6

sources: CNNVD: CNNVD-202302-1407

TYPE

code problem

Trust: 0.6

sources: CNNVD: CNNVD-202302-1407

PATCH

title:Intel Distribution for Python Fixes for code issue vulnerabilitiesurl:http://123.124.177.30/web/xxk/bdxqById.tag?id=227093

Trust: 0.6

title: - url:https://github.com/Live-Hack-CVE/CVE-2022-26032

Trust: 0.1

sources: VULMON: CVE-2022-26032 // CNNVD: CNNVD-202302-1407

EXTERNAL IDS

db:NVDid:CVE-2022-26032

Trust: 3.4

db:JVNid:JVNVU91223897

Trust: 0.8

db:JVNDBid:JVNDB-2022-019759

Trust: 0.8

db:CNNVDid:CNNVD-202302-1407

Trust: 0.6

db:VULHUBid:VHN-416810

Trust: 0.1

db:VULMONid:CVE-2022-26032

Trust: 0.1

sources: VULHUB: VHN-416810 // VULMON: CVE-2022-26032 // JVNDB: JVNDB-2022-019759 // CNNVD: CNNVD-202302-1407 // NVD: CVE-2022-26032

REFERENCES

url:http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00674.html

Trust: 2.6

url:https://jvn.jp/vu/jvnvu91223897/

Trust: 0.8

url:https://nvd.nist.gov/vuln/detail/cve-2022-26032

Trust: 0.8

url:https://cxsecurity.com/cveshow/cve-2022-26032/

Trust: 0.6

url:https://github.com/live-hack-cve/cve-2022-26032

Trust: 0.1

url:https://nvd.nist.gov

Trust: 0.1

sources: VULHUB: VHN-416810 // VULMON: CVE-2022-26032 // JVNDB: JVNDB-2022-019759 // CNNVD: CNNVD-202302-1407 // NVD: CVE-2022-26032

SOURCES

db:VULHUBid:VHN-416810
db:VULMONid:CVE-2022-26032
db:JVNDBid:JVNDB-2022-019759
db:CNNVDid:CNNVD-202302-1407
db:NVDid:CVE-2022-26032

LAST UPDATE DATE

2024-08-14T13:16:40.779000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-416810date:2023-02-28T00:00:00
db:VULMONid:CVE-2022-26032date:2023-02-17T00:00:00
db:JVNDBid:JVNDB-2022-019759date:2023-10-27T06:16:00
db:CNNVDid:CNNVD-202302-1407date:2023-03-01T00:00:00
db:NVDid:CVE-2022-26032date:2023-04-07T12:40:54.470

SOURCES RELEASE DATE

db:VULHUBid:VHN-416810date:2023-02-16T00:00:00
db:VULMONid:CVE-2022-26032date:2023-02-16T00:00:00
db:JVNDBid:JVNDB-2022-019759date:2023-10-27T00:00:00
db:CNNVDid:CNNVD-202302-1407date:2023-02-16T00:00:00
db:NVDid:CVE-2022-26032date:2023-02-16T20:15:12.660