ID

VAR-202205-0781


CVE

CVE-2022-24297


TITLE

Vulnerabilities in multiple Intel products

Trust: 0.8

sources: JVNDB: JVNDB-2022-009663

DESCRIPTION

Improper buffer restrictions in firmware for some Intel(R) NUCs may allow a privileged user to potentially enable escalation of privilege via local access. LAPBC510 firmware, LAPBC710 firmware, lapkc71f Multiple Intel products such as firmware have unspecified vulnerabilities.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state

Trust: 1.71

sources: NVD: CVE-2022-24297 // JVNDB: JVNDB-2022-009663 // VULMON: CVE-2022-24297

AFFECTED PRODUCTS

vendor:intelmodel:nuc 9 pro compute element nuc9v7qnbscope:ltversion:qncflx70.0064

Trust: 1.0

vendor:intelmodel:nuc kit nuc8i7bescope:ltversion:becfl357.0089

Trust: 1.0

vendor:intelmodel:nuc 11 pro kit nuc11tnki3scope:ltversion:tntgl357.0059

Trust: 1.0

vendor:intelmodel:nuc8i3cysnscope:ltversion:cycnli35.86a.0050

Trust: 1.0

vendor:intelmodel:nuc 11 compute element cm11ebi58wscope:ltversion:ebtgl357.0057

Trust: 1.0

vendor:intelmodel:nuc 11 pro kit nuc11tnki5scope:ltversion:tntgl357.0059

Trust: 1.0

vendor:intelmodel:nuc 11 compute element cm11ebi38wscope:ltversion:ebtgl357.0057

Trust: 1.0

vendor:intelmodel:lapbc510scope:ltversion:bctgl357.0065

Trust: 1.0

vendor:intelmodel:nuc11paqscope:ltversion:patgl357.0042

Trust: 1.0

vendor:intelmodel:nuc11pascope:ltversion:patgl357.0042

Trust: 1.0

vendor:intelmodel:nuc 11 pro kit nuc11tnhi50zscope:ltversion:tntgl357.0059

Trust: 1.0

vendor:intelmodel:nuc 11 compute element cm11ebi716wscope:ltversion:ebtgl357.0057

Trust: 1.0

vendor:intelmodel:nuc 11 pro board nuc11tnbi7scope:ltversion:tntgl357.0059

Trust: 1.0

vendor:intelmodel:nuc 11 pro kit nuc11tnhi70lscope:ltversion:tntgl357.0059

Trust: 1.0

vendor:intelmodel:nuc 11 pro kit nuc11tnhi70qscope:ltversion:tntgl357.0059

Trust: 1.0

vendor:intelmodel:nuc 11 enthusiast mini pc nuc11phki7caascope:ltversion:phtgl579.0064

Trust: 1.0

vendor:intelmodel:nuc 11 pro kit nuc11tnki70zscope:ltversion:tntgl357.0059

Trust: 1.0

vendor:intelmodel:nuc9i5qnscope:ltversion:qxcfl579.0064

Trust: 1.0

vendor:intelmodel:nuc 11 pro board nuc11tnbi3scope:ltversion:tntgl357.0059

Trust: 1.0

vendor:intelmodel:nuc11dbbi9scope:ltversion:dbtgl579.0055

Trust: 1.0

vendor:intelmodel:nuc 11 pro kit nuc11tnhi3scope:ltversion:tntgl357.0059

Trust: 1.0

vendor:intelmodel:nuc 11 pro kit nuc11tnhi5scope:ltversion:tntgl357.0059

Trust: 1.0

vendor:intelmodel:nuc 11 pro kit nuc11tnhi30lscope:ltversion:tntgl357.0059

Trust: 1.0

vendor:intelmodel:lapbc710scope:ltversion:bctgl357.0065

Trust: 1.0

vendor:intelmodel:nuc 11 pro kit nuc11tnki7scope:ltversion:tntgl357.0059

Trust: 1.0

vendor:intelmodel:nuc 8 compute element cm8i5cbscope:ltversion:cbwhl.0095

Trust: 1.0

vendor:intelmodel:nuc kit nuc8i3bscope:ltversion:becfl357.0089

Trust: 1.0

vendor:intelmodel:nuc 11 pro board nuc11tnbi70zscope:ltversion:tntgl357.0059

Trust: 1.0

vendor:intelmodel:nuc 8 compute element cm8pcbscope:ltversion:cbwhl.0095

Trust: 1.0

vendor:intelmodel:nuc 8 compute element cm8ccbscope:ltversion:cbwhl.0095

Trust: 1.0

vendor:intelmodel:nuc 11 pro kit nuc11tnhi7scope:ltversion:tntgl357.0059

Trust: 1.0

vendor:intelmodel:lapkc51escope:ltversion:kctgl357.0040

Trust: 1.0

vendor:intelmodel:nuc11btmi9scope:ltversion:dbtgl579.0055

Trust: 1.0

vendor:intelmodel:nuc 11 pro kit nuc11tnki50zscope:ltversion:tntgl357.0059

Trust: 1.0

vendor:intelmodel:nuc 11 enthusiast kit nuc11phki7cscope:ltversion:phtgl579.0064

Trust: 1.0

vendor:intelmodel:nuc 8 compute element cm8i7cbscope:ltversion:cbwhl.0095

Trust: 1.0

vendor:intelmodel:nuc 8 compute element cm8i3cbscope:ltversion:cbwhl.0095

Trust: 1.0

vendor:intelmodel:nuc11pahscope:ltversion:patgl357.0042

Trust: 1.0

vendor:intelmodel:nuc9i7qnscope:ltversion:qxcfl579.0064

Trust: 1.0

vendor:intelmodel:nuc 11 pro kit nuc11tnhi50wscope:ltversion:tntgl357.0059

Trust: 1.0

vendor:intelmodel:nuc 11 pro board nuc11tnbi50zscope:ltversion:tntgl357.0059

Trust: 1.0

vendor:intelmodel:lapkc71fscope:ltversion:kctgl357.0040

Trust: 1.0

vendor:intelmodel:nuc kit nuc8i5bescope:ltversion:becfl357.0089

Trust: 1.0

vendor:intelmodel:nuc 11 compute element cm11ebc4wscope:ltversion:ebtgl357.0057

Trust: 1.0

vendor:intelmodel:nuc 11 pro kit nuc11tnhi30zscope:ltversion:tntgl357.0059

Trust: 1.0

vendor:intelmodel:nuc 11 pro kit nuc11tnhi70zscope:ltversion:tntgl357.0059

Trust: 1.0

vendor:intelmodel:nuc 11 pro board nuc11tnbi5scope:ltversion:tntgl357.0059

Trust: 1.0

vendor:intelmodel:nuc 9 pro kit nuc9v7qnxscope:ltversion:qncflx70.0064

Trust: 1.0

vendor:intelmodel:nuc 11 pro kit nuc11tnki30zscope:ltversion:tntgl357.0059

Trust: 1.0

vendor:intelmodel:nuc 11 pro kit nuc11tnhi30pscope:ltversion:tntgl357.0059

Trust: 1.0

vendor:intelmodel:nuc11dbbi7scope:ltversion:dbtgl579.0055

Trust: 1.0

vendor:intelmodel:nuc 11 pro kit nuc11tnhi50lscope:ltversion:tntgl357.0059

Trust: 1.0

vendor:intelmodel:lapkc71escope:ltversion:kctgl357.0040

Trust: 1.0

vendor:intelmodel:nuc 9 pro compute element nuc9vxqnbscope:ltversion:qncflx70.0064

Trust: 1.0

vendor:intelmodel:nuc 11 pro board nuc11tnbi30zscope:ltversion:tntgl357.0059

Trust: 1.0

vendor:intelmodel:nuc8i3cysmscope:ltversion:cycnli35.86a.0050

Trust: 1.0

vendor:intelmodel:nuc 9 pro kit nuc9vxqnxscope:ltversion:qncflx70.0064

Trust: 1.0

vendor:intelmodel:nuc11btmi7scope:ltversion:dbtgl579.0055

Trust: 1.0

vendor:intelmodel:nuc9i9qnscope:ltversion:qxcfl579.0064

Trust: 1.0

vendor:インテルmodel:lapbc710scope: - version: -

Trust: 0.8

vendor:インテルmodel:nuc11btmi9scope: - version: -

Trust: 0.8

vendor:インテルmodel:nuc 11 pro kit nuc11tnhi50zscope: - version: -

Trust: 0.8

vendor:インテルmodel:nuc 11 pro board nuc11tnbi30zscope: - version: -

Trust: 0.8

vendor:インテルmodel:intel nuc 11 compute element cm11ebi716wscope: - version: -

Trust: 0.8

vendor:インテルmodel:lapkc71escope: - version: -

Trust: 0.8

vendor:インテルmodel:intel nuc 11 compute element cm11ebc4wscope: - version: -

Trust: 0.8

vendor:インテルmodel:nuc11dbbi7scope: - version: -

Trust: 0.8

vendor:インテルmodel:nuc11pahscope: - version: -

Trust: 0.8

vendor:インテルmodel:nuc11pascope: - version: -

Trust: 0.8

vendor:インテルmodel:lapkc71fscope: - version: -

Trust: 0.8

vendor:インテルmodel:nuc11paqscope: - version: -

Trust: 0.8

vendor:インテルmodel:intel nuc 11 compute element cm11ebi38wscope: - version: -

Trust: 0.8

vendor:インテルmodel:nuc 11 pro board nuc11tnbi70zscope: - version: -

Trust: 0.8

vendor:インテルmodel:nuc11btmi7scope: - version: -

Trust: 0.8

vendor:インテルmodel:lapkc51escope: - version: -

Trust: 0.8

vendor:インテルmodel:nuc11dbbi9scope: - version: -

Trust: 0.8

vendor:インテルmodel:nuc 11 pro board nuc11tnbi50zscope: - version: -

Trust: 0.8

vendor:インテルmodel:intel nuc 11 compute element cm11ebi58wscope: - version: -

Trust: 0.8

vendor:インテルmodel:lapbc510scope: - version: -

Trust: 0.8

sources: JVNDB: JVNDB-2022-009663 // NVD: CVE-2022-24297

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2022-24297
value: MEDIUM

Trust: 1.0

NVD: CVE-2022-24297
value: MEDIUM

Trust: 0.8

CNNVD: CNNVD-202205-3048
value: MEDIUM

Trust: 0.6

nvd@nist.gov: CVE-2022-24297
severity: MEDIUM
baseScore: 4.6
vectorString: AV:L/AC:L/AU:N/C:P/I:P/A:P
accessVector: LOCAL
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 3.9
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

nvd@nist.gov: CVE-2022-24297
baseSeverity: MEDIUM
baseScore: 6.7
vectorString: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
attackVector: LOCAL
attackComplexity: LOW
privilegesRequired: HIGH
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 0.8
impactScore: 5.9
version: 3.1

Trust: 1.0

NVD: CVE-2022-24297
baseSeverity: MEDIUM
baseScore: 6.7
vectorString: CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
attackVector: LOCAL
attackComplexity: LOW
privilegesRequired: HIGH
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: JVNDB: JVNDB-2022-009663 // CNNVD: CNNVD-202205-3048 // NVD: CVE-2022-24297

PROBLEMTYPE DATA

problemtype:NVD-CWE-noinfo

Trust: 1.0

problemtype:Lack of information (CWE-noinfo) [NVD evaluation ]

Trust: 0.8

sources: JVNDB: JVNDB-2022-009663 // NVD: CVE-2022-24297

THREAT TYPE

local

Trust: 0.6

sources: CNNVD: CNNVD-202205-3048

TYPE

other

Trust: 0.6

sources: CNNVD: CNNVD-202205-3048

PATCH

title:Intel NUC Security vulnerabilitiesurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=193792

Trust: 0.6

sources: CNNVD: CNNVD-202205-3048

EXTERNAL IDS

db:NVDid:CVE-2022-24297

Trust: 3.3

db:JVNid:JVNVU93344744

Trust: 0.8

db:JVNDBid:JVNDB-2022-009663

Trust: 0.8

db:AUSCERTid:ESB-2022.2320

Trust: 0.6

db:CNNVDid:CNNVD-202205-3048

Trust: 0.6

db:VULMONid:CVE-2022-24297

Trust: 0.1

sources: VULMON: CVE-2022-24297 // JVNDB: JVNDB-2022-009663 // CNNVD: CNNVD-202205-3048 // NVD: CVE-2022-24297

REFERENCES

url:https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00654.html

Trust: 2.5

url:https://jvn.jp/vu/jvnvu93344744/

Trust: 0.8

url:https://nvd.nist.gov/vuln/detail/cve-2022-24297

Trust: 0.8

url:https://www.auscert.org.au/bulletins/esb-2022.2320

Trust: 0.6

url:https://cxsecurity.com/cveshow/cve-2022-24297/

Trust: 0.6

url:https://nvd.nist.gov

Trust: 0.1

sources: VULMON: CVE-2022-24297 // JVNDB: JVNDB-2022-009663 // CNNVD: CNNVD-202205-3048 // NVD: CVE-2022-24297

SOURCES

db:VULMONid:CVE-2022-24297
db:JVNDBid:JVNDB-2022-009663
db:CNNVDid:CNNVD-202205-3048
db:NVDid:CVE-2022-24297

LAST UPDATE DATE

2024-11-23T20:33:11.762000+00:00


SOURCES UPDATE DATE

db:VULMONid:CVE-2022-24297date:2022-05-12T00:00:00
db:JVNDBid:JVNDB-2022-009663date:2023-08-07T08:15:00
db:CNNVDid:CNNVD-202205-3048date:2022-05-24T00:00:00
db:NVDid:CVE-2022-24297date:2024-11-21T06:50:07.030

SOURCES RELEASE DATE

db:VULMONid:CVE-2022-24297date:2022-05-12T00:00:00
db:JVNDBid:JVNDB-2022-009663date:2023-08-07T00:00:00
db:CNNVDid:CNNVD-202205-3048date:2022-05-12T00:00:00
db:NVDid:CVE-2022-24297date:2022-05-12T17:15:10.223