ID

VAR-202205-0782


CVE

CVE-2022-24382


TITLE

Input validation vulnerability in multiple Intel products

Trust: 0.8

sources: JVNDB: JVNDB-2022-009662

DESCRIPTION

Improper input validation in firmware for some Intel(R) NUCs may allow a privileged user to potentially enable escalation of privilege via local access. LAPBC510 firmware, LAPBC710 firmware, lapkc71f Multiple Intel products such as firmware contain vulnerabilities related to input validation.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state

Trust: 1.71

sources: NVD: CVE-2022-24382 // JVNDB: JVNDB-2022-009662 // VULMON: CVE-2022-24382

AFFECTED PRODUCTS

vendor:intelmodel:nuc 9 pro compute element nuc9v7qnbscope:ltversion:qncflx70.0064

Trust: 1.0

vendor:intelmodel:nuc kit nuc8i7bescope:ltversion:becfl357.0089

Trust: 1.0

vendor:intelmodel:nuc 11 pro kit nuc11tnki3scope:ltversion:tntgl357.0059

Trust: 1.0

vendor:intelmodel:nuc8i3cysnscope:ltversion:cycnli35.86a.0050

Trust: 1.0

vendor:intelmodel:nuc 11 compute element cm11ebi58wscope:ltversion:ebtgl357.0057

Trust: 1.0

vendor:intelmodel:nuc 11 pro kit nuc11tnki5scope:ltversion:tntgl357.0059

Trust: 1.0

vendor:intelmodel:nuc 11 compute element cm11ebi38wscope:ltversion:ebtgl357.0057

Trust: 1.0

vendor:intelmodel:lapbc510scope:ltversion:bctgl357.0065

Trust: 1.0

vendor:intelmodel:nuc11paqscope:ltversion:patgl357.0042

Trust: 1.0

vendor:intelmodel:nuc11pascope:ltversion:patgl357.0042

Trust: 1.0

vendor:intelmodel:nuc 11 pro kit nuc11tnhi50zscope:ltversion:tntgl357.0059

Trust: 1.0

vendor:intelmodel:nuc 11 compute element cm11ebi716wscope:ltversion:ebtgl357.0057

Trust: 1.0

vendor:intelmodel:nuc 11 pro board nuc11tnbi7scope:ltversion:tntgl357.0059

Trust: 1.0

vendor:intelmodel:nuc 11 pro kit nuc11tnhi70lscope:ltversion:tntgl357.0059

Trust: 1.0

vendor:intelmodel:nuc 11 pro kit nuc11tnhi70qscope:ltversion:tntgl357.0059

Trust: 1.0

vendor:intelmodel:nuc 11 enthusiast mini pc nuc11phki7caascope:ltversion:phtgl579.0064

Trust: 1.0

vendor:intelmodel:nuc 11 pro kit nuc11tnki70zscope:ltversion:tntgl357.0059

Trust: 1.0

vendor:intelmodel:nuc9i5qnscope:ltversion:qxcfl579.0064

Trust: 1.0

vendor:intelmodel:nuc 11 pro board nuc11tnbi3scope:ltversion:tntgl357.0059

Trust: 1.0

vendor:intelmodel:nuc11dbbi9scope:ltversion:dbtgl579.0055

Trust: 1.0

vendor:intelmodel:nuc 11 pro kit nuc11tnhi3scope:ltversion:tntgl357.0059

Trust: 1.0

vendor:intelmodel:nuc 11 pro kit nuc11tnhi5scope:ltversion:tntgl357.0059

Trust: 1.0

vendor:intelmodel:nuc 11 pro kit nuc11tnhi30lscope:ltversion:tntgl357.0059

Trust: 1.0

vendor:intelmodel:lapbc710scope:ltversion:bctgl357.0065

Trust: 1.0

vendor:intelmodel:nuc 11 pro kit nuc11tnki7scope:ltversion:tntgl357.0059

Trust: 1.0

vendor:intelmodel:nuc 8 compute element cm8i5cbscope:ltversion:cbwhl.0095

Trust: 1.0

vendor:intelmodel:nuc kit nuc8i3bscope:ltversion:becfl357.0089

Trust: 1.0

vendor:intelmodel:nuc 11 pro board nuc11tnbi70zscope:ltversion:tntgl357.0059

Trust: 1.0

vendor:intelmodel:nuc 8 compute element cm8pcbscope:ltversion:cbwhl.0095

Trust: 1.0

vendor:intelmodel:nuc 8 compute element cm8ccbscope:ltversion:cbwhl.0095

Trust: 1.0

vendor:intelmodel:nuc 11 pro kit nuc11tnhi7scope:ltversion:tntgl357.0059

Trust: 1.0

vendor:intelmodel:lapkc51escope:ltversion:kctgl357.0040

Trust: 1.0

vendor:intelmodel:nuc11btmi9scope:ltversion:dbtgl579.0055

Trust: 1.0

vendor:intelmodel:nuc 11 pro kit nuc11tnki50zscope:ltversion:tntgl357.0059

Trust: 1.0

vendor:intelmodel:nuc 11 enthusiast kit nuc11phki7cscope:ltversion:phtgl579.0064

Trust: 1.0

vendor:intelmodel:nuc 8 compute element cm8i7cbscope:ltversion:cbwhl.0095

Trust: 1.0

vendor:intelmodel:nuc 8 compute element cm8i3cbscope:ltversion:cbwhl.0095

Trust: 1.0

vendor:intelmodel:nuc11pahscope:ltversion:patgl357.0042

Trust: 1.0

vendor:intelmodel:nuc9i7qnscope:ltversion:qxcfl579.0064

Trust: 1.0

vendor:intelmodel:nuc 11 pro kit nuc11tnhi50wscope:ltversion:tntgl357.0059

Trust: 1.0

vendor:intelmodel:nuc 11 pro board nuc11tnbi50zscope:ltversion:tntgl357.0059

Trust: 1.0

vendor:intelmodel:lapkc71fscope:ltversion:kctgl357.0040

Trust: 1.0

vendor:intelmodel:nuc kit nuc8i5bescope:ltversion:becfl357.0089

Trust: 1.0

vendor:intelmodel:nuc 11 compute element cm11ebc4wscope:ltversion:ebtgl357.0057

Trust: 1.0

vendor:intelmodel:nuc 11 pro kit nuc11tnhi30zscope:ltversion:tntgl357.0059

Trust: 1.0

vendor:intelmodel:nuc 11 pro kit nuc11tnhi70zscope:ltversion:tntgl357.0059

Trust: 1.0

vendor:intelmodel:nuc 11 pro board nuc11tnbi5scope:ltversion:tntgl357.0059

Trust: 1.0

vendor:intelmodel:nuc 9 pro kit nuc9v7qnxscope:ltversion:qncflx70.0064

Trust: 1.0

vendor:intelmodel:nuc 11 pro kit nuc11tnki30zscope:ltversion:tntgl357.0059

Trust: 1.0

vendor:intelmodel:nuc 11 pro kit nuc11tnhi30pscope:ltversion:tntgl357.0059

Trust: 1.0

vendor:intelmodel:nuc11dbbi7scope:ltversion:dbtgl579.0055

Trust: 1.0

vendor:intelmodel:nuc 11 pro kit nuc11tnhi50lscope:ltversion:tntgl357.0059

Trust: 1.0

vendor:intelmodel:lapkc71escope:ltversion:kctgl357.0040

Trust: 1.0

vendor:intelmodel:nuc 9 pro compute element nuc9vxqnbscope:ltversion:qncflx70.0064

Trust: 1.0

vendor:intelmodel:nuc 11 pro board nuc11tnbi30zscope:ltversion:tntgl357.0059

Trust: 1.0

vendor:intelmodel:nuc8i3cysmscope:ltversion:cycnli35.86a.0050

Trust: 1.0

vendor:intelmodel:nuc 9 pro kit nuc9vxqnxscope:ltversion:qncflx70.0064

Trust: 1.0

vendor:intelmodel:nuc11btmi7scope:ltversion:dbtgl579.0055

Trust: 1.0

vendor:intelmodel:nuc9i9qnscope:ltversion:qxcfl579.0064

Trust: 1.0

vendor:インテルmodel:lapbc710scope: - version: -

Trust: 0.8

vendor:インテルmodel:nuc11btmi9scope: - version: -

Trust: 0.8

vendor:インテルmodel:nuc 11 pro kit nuc11tnhi50zscope: - version: -

Trust: 0.8

vendor:インテルmodel:nuc 11 pro board nuc11tnbi30zscope: - version: -

Trust: 0.8

vendor:インテルmodel:intel nuc 11 compute element cm11ebi716wscope: - version: -

Trust: 0.8

vendor:インテルmodel:lapkc71escope: - version: -

Trust: 0.8

vendor:インテルmodel:intel nuc 11 compute element cm11ebc4wscope: - version: -

Trust: 0.8

vendor:インテルmodel:nuc11dbbi7scope: - version: -

Trust: 0.8

vendor:インテルmodel:nuc11pahscope: - version: -

Trust: 0.8

vendor:インテルmodel:nuc11pascope: - version: -

Trust: 0.8

vendor:インテルmodel:lapkc71fscope: - version: -

Trust: 0.8

vendor:インテルmodel:nuc11paqscope: - version: -

Trust: 0.8

vendor:インテルmodel:intel nuc 11 compute element cm11ebi38wscope: - version: -

Trust: 0.8

vendor:インテルmodel:nuc 11 pro board nuc11tnbi70zscope: - version: -

Trust: 0.8

vendor:インテルmodel:nuc11btmi7scope: - version: -

Trust: 0.8

vendor:インテルmodel:lapkc51escope: - version: -

Trust: 0.8

vendor:インテルmodel:nuc11dbbi9scope: - version: -

Trust: 0.8

vendor:インテルmodel:nuc 11 pro board nuc11tnbi50zscope: - version: -

Trust: 0.8

vendor:インテルmodel:intel nuc 11 compute element cm11ebi58wscope: - version: -

Trust: 0.8

vendor:インテルmodel:lapbc510scope: - version: -

Trust: 0.8

sources: JVNDB: JVNDB-2022-009662 // NVD: CVE-2022-24382

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2022-24382
value: MEDIUM

Trust: 1.0

NVD: CVE-2022-24382
value: MEDIUM

Trust: 0.8

CNNVD: CNNVD-202205-3049
value: MEDIUM

Trust: 0.6

nvd@nist.gov: CVE-2022-24382
severity: MEDIUM
baseScore: 4.6
vectorString: AV:L/AC:L/AU:N/C:P/I:P/A:P
accessVector: LOCAL
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 3.9
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

nvd@nist.gov: CVE-2022-24382
baseSeverity: MEDIUM
baseScore: 6.7
vectorString: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
attackVector: LOCAL
attackComplexity: LOW
privilegesRequired: HIGH
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 0.8
impactScore: 5.9
version: 3.1

Trust: 1.0

NVD: CVE-2022-24382
baseSeverity: MEDIUM
baseScore: 6.7
vectorString: CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
attackVector: LOCAL
attackComplexity: LOW
privilegesRequired: HIGH
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: JVNDB: JVNDB-2022-009662 // CNNVD: CNNVD-202205-3049 // NVD: CVE-2022-24382

PROBLEMTYPE DATA

problemtype:CWE-20

Trust: 1.0

problemtype:Inappropriate input confirmation (CWE-20) [NVD evaluation ]

Trust: 0.8

sources: JVNDB: JVNDB-2022-009662 // NVD: CVE-2022-24382

THREAT TYPE

local

Trust: 0.6

sources: CNNVD: CNNVD-202205-3049

TYPE

input validation error

Trust: 0.6

sources: CNNVD: CNNVD-202205-3049

PATCH

title:Intel NUC Enter the fix for the verification error vulnerabilityurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=193793

Trust: 0.6

sources: CNNVD: CNNVD-202205-3049

EXTERNAL IDS

db:NVDid:CVE-2022-24382

Trust: 3.3

db:JVNid:JVNVU93344744

Trust: 0.8

db:JVNDBid:JVNDB-2022-009662

Trust: 0.8

db:AUSCERTid:ESB-2022.2320

Trust: 0.6

db:CNNVDid:CNNVD-202205-3049

Trust: 0.6

db:VULMONid:CVE-2022-24382

Trust: 0.1

sources: VULMON: CVE-2022-24382 // JVNDB: JVNDB-2022-009662 // CNNVD: CNNVD-202205-3049 // NVD: CVE-2022-24382

REFERENCES

url:https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00654.html

Trust: 2.5

url:https://jvn.jp/vu/jvnvu93344744/

Trust: 0.8

url:https://nvd.nist.gov/vuln/detail/cve-2022-24382

Trust: 0.8

url:https://www.auscert.org.au/bulletins/esb-2022.2320

Trust: 0.6

url:https://cxsecurity.com/cveshow/cve-2022-24382/

Trust: 0.6

url:https://nvd.nist.gov

Trust: 0.1

sources: VULMON: CVE-2022-24382 // JVNDB: JVNDB-2022-009662 // CNNVD: CNNVD-202205-3049 // NVD: CVE-2022-24382

SOURCES

db:VULMONid:CVE-2022-24382
db:JVNDBid:JVNDB-2022-009662
db:CNNVDid:CNNVD-202205-3049
db:NVDid:CVE-2022-24382

LAST UPDATE DATE

2024-11-23T21:25:42.365000+00:00


SOURCES UPDATE DATE

db:VULMONid:CVE-2022-24382date:2022-05-12T00:00:00
db:JVNDBid:JVNDB-2022-009662date:2023-08-07T08:15:00
db:CNNVDid:CNNVD-202205-3049date:2022-05-24T00:00:00
db:NVDid:CVE-2022-24382date:2024-11-21T06:50:18.223

SOURCES RELEASE DATE

db:VULMONid:CVE-2022-24382date:2022-05-12T00:00:00
db:JVNDBid:JVNDB-2022-009662date:2023-08-07T00:00:00
db:CNNVDid:CNNVD-202205-3049date:2022-05-12T00:00:00
db:NVDid:CVE-2022-24382date:2022-05-12T17:15:10.267