ID

VAR-202302-1567


CVE

CVE-2022-33946


TITLE

Intel's  system usage report  Authentication vulnerability in

Trust: 0.8

sources: JVNDB: JVNDB-2022-019742

DESCRIPTION

Improper authentication in the Intel(R) SUR software before version 2.4.8902 may allow an authenticated user to potentially enable escalation of privilege via local access. Intel's system usage report There is an authentication vulnerability in.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state

Trust: 1.8

sources: NVD: CVE-2022-33946 // JVNDB: JVNDB-2022-019742 // VULHUB: VHN-431015 // VULMON: CVE-2022-33946

AFFECTED PRODUCTS

vendor:intelmodel:system usage reportscope:ltversion:2.4.8902

Trust: 1.0

vendor:インテルmodel:system usage reportscope:eqversion:2.4.8902

Trust: 0.8

vendor:インテルmodel:system usage reportscope:eqversion: -

Trust: 0.8

vendor:インテルmodel:system usage reportscope: - version: -

Trust: 0.8

sources: JVNDB: JVNDB-2022-019742 // NVD: CVE-2022-33946

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2022-33946
value: HIGH

Trust: 1.0

secure@intel.com: CVE-2022-33946
value: MEDIUM

Trust: 1.0

NVD: CVE-2022-33946
value: HIGH

Trust: 0.8

CNNVD: CNNVD-202302-1476
value: HIGH

Trust: 0.6

nvd@nist.gov: CVE-2022-33946
baseSeverity: HIGH
baseScore: 7.8
vectorString: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
attackVector: LOCAL
attackComplexity: LOW
privilegesRequired: LOW
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 1.8
impactScore: 5.9
version: 3.1

Trust: 1.0

secure@intel.com: CVE-2022-33946
baseSeverity: MEDIUM
baseScore: 5.6
vectorString: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:L
attackVector: LOCAL
attackComplexity: LOW
privilegesRequired: LOW
userInteraction: REQUIRED
scope: UNCHANGED
confidentialityImpact: NONE
integrityImpact: HIGH
availabilityImpact: LOW
exploitabilityScore: 1.3
impactScore: 4.2
version: 3.1

Trust: 1.0

NVD: CVE-2022-33946
baseSeverity: HIGH
baseScore: 7.8
vectorString: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
attackVector: LOCAL
attackComplexity: LOW
privilegesRequired: LOW
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: JVNDB: JVNDB-2022-019742 // CNNVD: CNNVD-202302-1476 // NVD: CVE-2022-33946 // NVD: CVE-2022-33946

PROBLEMTYPE DATA

problemtype:CWE-287

Trust: 1.1

problemtype:Inappropriate authentication (CWE-287) [NVD evaluation ]

Trust: 0.8

sources: VULHUB: VHN-431015 // JVNDB: JVNDB-2022-019742 // NVD: CVE-2022-33946

THREAT TYPE

local

Trust: 0.6

sources: CNNVD: CNNVD-202302-1476

TYPE

authorization issue

Trust: 0.6

sources: CNNVD: CNNVD-202302-1476

PATCH

title:Intel SUR Remediation measures for authorization problem vulnerabilitiesurl:http://123.124.177.30/web/xxk/bdxqById.tag?id=226984

Trust: 0.6

title: - url:https://github.com/Live-Hack-CVE/CVE-2022-33946

Trust: 0.1

sources: VULMON: CVE-2022-33946 // CNNVD: CNNVD-202302-1476

EXTERNAL IDS

db:NVDid:CVE-2022-33946

Trust: 3.4

db:JVNid:JVNVU91223897

Trust: 0.8

db:JVNDBid:JVNDB-2022-019742

Trust: 0.8

db:CNNVDid:CNNVD-202302-1476

Trust: 0.6

db:VULHUBid:VHN-431015

Trust: 0.1

db:VULMONid:CVE-2022-33946

Trust: 0.1

sources: VULHUB: VHN-431015 // VULMON: CVE-2022-33946 // JVNDB: JVNDB-2022-019742 // CNNVD: CNNVD-202302-1476 // NVD: CVE-2022-33946

REFERENCES

url:http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00729.html

Trust: 2.6

url:https://jvn.jp/vu/jvnvu91223897/

Trust: 0.8

url:https://nvd.nist.gov/vuln/detail/cve-2022-33946

Trust: 0.8

url:https://cxsecurity.com/cveshow/cve-2022-33946/

Trust: 0.6

url:https://github.com/live-hack-cve/cve-2022-33946

Trust: 0.1

url:https://nvd.nist.gov

Trust: 0.1

sources: VULHUB: VHN-431015 // VULMON: CVE-2022-33946 // JVNDB: JVNDB-2022-019742 // CNNVD: CNNVD-202302-1476 // NVD: CVE-2022-33946

SOURCES

db:VULHUBid:VHN-431015
db:VULMONid:CVE-2022-33946
db:JVNDBid:JVNDB-2022-019742
db:CNNVDid:CNNVD-202302-1476
db:NVDid:CVE-2022-33946

LAST UPDATE DATE

2024-08-14T12:09:46.206000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-431015date:2023-02-27T00:00:00
db:VULMONid:CVE-2022-33946date:2023-02-17T00:00:00
db:JVNDBid:JVNDB-2022-019742date:2023-10-27T05:44:00
db:CNNVDid:CNNVD-202302-1476date:2023-02-28T00:00:00
db:NVDid:CVE-2022-33946date:2023-02-27T19:03:06.913

SOURCES RELEASE DATE

db:VULHUBid:VHN-431015date:2023-02-16T00:00:00
db:VULMONid:CVE-2022-33946date:2023-02-16T00:00:00
db:JVNDBid:JVNDB-2022-019742date:2023-10-27T00:00:00
db:CNNVDid:CNNVD-202302-1476date:2023-02-16T00:00:00
db:NVDid:CVE-2022-33946date:2023-02-16T21:15:12.497