ID

VAR-202305-0581


CVE

CVE-2022-32766


TITLE

Intel's  compute stick stk2mv64cc  Firmware vulnerabilities

Trust: 0.8

sources: JVNDB: JVNDB-2022-024313

DESCRIPTION

Improper input validation for some Intel(R) BIOS firmware may allow a privileged user to potentially enable escalation of privilege via local access. Intel's compute stick stk2mv64cc There are unspecified vulnerabilities in the firmware.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state

Trust: 1.71

sources: NVD: CVE-2022-32766 // JVNDB: JVNDB-2022-024313 // VULMON: CVE-2022-32766

AFFECTED PRODUCTS

vendor:intelmodel:compute stick stk2mv64ccscope:ltversion:ccsklm5v.0067

Trust: 1.0

vendor:インテルmodel:compute stick stk2mv64ccscope:eqversion:compute stick stk2mv64cc firmware ccsklm5v.0067

Trust: 0.8

vendor:インテルmodel:compute stick stk2mv64ccscope:eqversion: -

Trust: 0.8

vendor:インテルmodel:compute stick stk2mv64ccscope: - version: -

Trust: 0.8

sources: JVNDB: JVNDB-2022-024313 // NVD: CVE-2022-32766

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2022-32766
value: HIGH

Trust: 1.0

secure@intel.com: CVE-2022-32766
value: HIGH

Trust: 1.0

NVD: CVE-2022-32766
value: HIGH

Trust: 0.8

CNNVD: CNNVD-202305-821
value: HIGH

Trust: 0.6

nvd@nist.gov: CVE-2022-32766
baseSeverity: HIGH
baseScore: 7.8
vectorString: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
attackVector: LOCAL
attackComplexity: LOW
privilegesRequired: LOW
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 1.8
impactScore: 5.9
version: 3.1

Trust: 1.0

secure@intel.com: CVE-2022-32766
baseSeverity: HIGH
baseScore: 7.2
vectorString: CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:N
attackVector: LOCAL
attackComplexity: HIGH
privilegesRequired: HIGH
userInteraction: NONE
scope: CHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: NONE
exploitabilityScore: 0.8
impactScore: 5.8
version: 3.1

Trust: 1.0

NVD: CVE-2022-32766
baseSeverity: HIGH
baseScore: 7.8
vectorString: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
attackVector: LOCAL
attackComplexity: LOW
privilegesRequired: LOW
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: JVNDB: JVNDB-2022-024313 // CNNVD: CNNVD-202305-821 // NVD: CVE-2022-32766 // NVD: CVE-2022-32766

PROBLEMTYPE DATA

problemtype:NVD-CWE-noinfo

Trust: 1.0

problemtype:CWE-20

Trust: 1.0

problemtype:Lack of information (CWE-noinfo) [NVD evaluation ]

Trust: 0.8

sources: JVNDB: JVNDB-2022-024313 // NVD: CVE-2022-32766

THREAT TYPE

local

Trust: 0.6

sources: CNNVD: CNNVD-202305-821

TYPE

other

Trust: 0.6

sources: CNNVD: CNNVD-202305-821

PATCH

title:Intel Bios Security vulnerabilitiesurl:http://123.124.177.30/web/xxk/bdxqById.tag?id=238221

Trust: 0.6

sources: CNNVD: CNNVD-202305-821

EXTERNAL IDS

db:NVDid:CVE-2022-32766

Trust: 3.3

db:JVNid:JVNVU99370518

Trust: 0.8

db:JVNDBid:JVNDB-2022-024313

Trust: 0.8

db:AUSCERTid:ESB-2023.2566

Trust: 0.6

db:CNNVDid:CNNVD-202305-821

Trust: 0.6

db:VULMONid:CVE-2022-32766

Trust: 0.1

sources: VULMON: CVE-2022-32766 // JVNDB: JVNDB-2022-024313 // CNNVD: CNNVD-202305-821 // NVD: CVE-2022-32766

REFERENCES

url:https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00777.html

Trust: 2.5

url:https://jvn.jp/vu/jvnvu99370518/

Trust: 0.8

url:https://nvd.nist.gov/vuln/detail/cve-2022-32766

Trust: 0.8

url:https://www.auscert.org.au/bulletins/esb-2023.2566

Trust: 0.6

url:https://cxsecurity.com/cveshow/cve-2022-32766/

Trust: 0.6

url:https://nvd.nist.gov

Trust: 0.1

sources: VULMON: CVE-2022-32766 // JVNDB: JVNDB-2022-024313 // CNNVD: CNNVD-202305-821 // NVD: CVE-2022-32766

SOURCES

db:VULMONid:CVE-2022-32766
db:JVNDBid:JVNDB-2022-024313
db:CNNVDid:CNNVD-202305-821
db:NVDid:CVE-2022-32766

LAST UPDATE DATE

2024-08-14T13:18:17.160000+00:00


SOURCES UPDATE DATE

db:VULMONid:CVE-2022-32766date:2023-05-10T00:00:00
db:JVNDBid:JVNDB-2022-024313date:2023-12-08T05:49:00
db:CNNVDid:CNNVD-202305-821date:2023-05-19T00:00:00
db:NVDid:CVE-2022-32766date:2023-11-07T03:48:11.060

SOURCES RELEASE DATE

db:VULMONid:CVE-2022-32766date:2023-05-10T00:00:00
db:JVNDBid:JVNDB-2022-024313date:2023-12-08T00:00:00
db:CNNVDid:CNNVD-202305-821date:2023-05-10T00:00:00
db:NVDid:CVE-2022-32766date:2023-05-10T14:15:12.440