ID

VAR-202211-0555


CVE

CVE-2022-29466


TITLE

Intel's  Intel Server Platform Services  Firmware Input Validation Vulnerability

Trust: 0.8

sources: JVNDB: JVNDB-2022-020987

DESCRIPTION

Improper input validation in firmware for Intel(R) SPS before version SPS_E3_04.01.04.700.0 may allow an authenticated user to potentially enable denial of service via local access. Intel's Intel Server Platform Services There is an input validation vulnerability in firmware.Service operation interruption (DoS) It may be in a state

Trust: 1.71

sources: NVD: CVE-2022-29466 // JVNDB: JVNDB-2022-020987 // VULHUB: VHN-420999

AFFECTED PRODUCTS

vendor:intelmodel:server platform servicesscope:ltversion:sps_e3_04.01.04.700.0

Trust: 1.0

vendor:インテルmodel:intel server platform servicesscope: - version: -

Trust: 0.8

vendor:日立model:日立アドバンストサーバ ha8000 シリーズscope: - version: -

Trust: 0.8

sources: JVNDB: JVNDB-2022-020987 // NVD: CVE-2022-29466

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2022-29466
value: MEDIUM

Trust: 1.0

secure@intel.com: CVE-2022-29466
value: HIGH

Trust: 1.0

NVD: CVE-2022-29466
value: MEDIUM

Trust: 0.8

CNNVD: CNNVD-202211-2465
value: MEDIUM

Trust: 0.6

nvd@nist.gov: CVE-2022-29466
baseSeverity: MEDIUM
baseScore: 5.5
vectorString: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
attackVector: LOCAL
attackComplexity: LOW
privilegesRequired: LOW
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: HIGH
exploitabilityScore: 1.8
impactScore: 3.6
version: 3.1

Trust: 1.0

secure@intel.com: CVE-2022-29466
baseSeverity: HIGH
baseScore: 7.3
vectorString: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:L/A:H
attackVector: LOCAL
attackComplexity: LOW
privilegesRequired: LOW
userInteraction: NONE
scope: CHANGED
confidentialityImpact: NONE
integrityImpact: LOW
availabilityImpact: HIGH
exploitabilityScore: 2.0
impactScore: 4.7
version: 3.1

Trust: 1.0

NVD: CVE-2022-29466
baseSeverity: MEDIUM
baseScore: 5.5
vectorString: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
attackVector: LOCAL
attackComplexity: LOW
privilegesRequired: LOW
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: HIGH
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: JVNDB: JVNDB-2022-020987 // CNNVD: CNNVD-202211-2465 // NVD: CVE-2022-29466 // NVD: CVE-2022-29466

PROBLEMTYPE DATA

problemtype:CWE-20

Trust: 1.1

problemtype:Inappropriate input confirmation (CWE-20) [NVD evaluation ]

Trust: 0.8

sources: VULHUB: VHN-420999 // JVNDB: JVNDB-2022-020987 // NVD: CVE-2022-29466

THREAT TYPE

local

Trust: 0.6

sources: CNNVD: CNNVD-202211-2465

TYPE

input validation error

Trust: 0.6

sources: CNNVD: CNNVD-202211-2465

PATCH

title:hitachi-sec-2022-224url:https://www.hitachi.co.jp/products/it/server/security/info/vulnerable/hitachi_sec_2022_224.html

Trust: 0.8

sources: JVNDB: JVNDB-2022-020987

EXTERNAL IDS

db:NVDid:CVE-2022-29466

Trust: 3.3

db:JVNid:JVNVU94499505

Trust: 0.8

db:JVNDBid:JVNDB-2022-020987

Trust: 0.8

db:AUSCERTid:ESB-2022.5834

Trust: 0.6

db:CNNVDid:CNNVD-202211-2465

Trust: 0.6

db:VULHUBid:VHN-420999

Trust: 0.1

sources: VULHUB: VHN-420999 // JVNDB: JVNDB-2022-020987 // CNNVD: CNNVD-202211-2465 // NVD: CVE-2022-29466

REFERENCES

url:https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00610.html

Trust: 2.5

url:https://jvn.jp/vu/jvnvu94499505/

Trust: 0.8

url:https://nvd.nist.gov/vuln/detail/cve-2022-29466

Trust: 0.8

url:https://cxsecurity.com/cveshow/cve-2022-29466/

Trust: 0.6

url:https://vigilance.fr/vulnerability/intel-amt-csme-sps-multiple-vulnerabilities-39877

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2022.5834

Trust: 0.6

sources: VULHUB: VHN-420999 // JVNDB: JVNDB-2022-020987 // CNNVD: CNNVD-202211-2465 // NVD: CVE-2022-29466

SOURCES

db:VULHUBid:VHN-420999
db:JVNDBid:JVNDB-2022-020987
db:CNNVDid:CNNVD-202211-2465
db:NVDid:CVE-2022-29466

LAST UPDATE DATE

2024-08-14T12:49:56.108000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-420999date:2022-11-17T00:00:00
db:JVNDBid:JVNDB-2022-020987date:2024-03-07T05:03:00
db:CNNVDid:CNNVD-202211-2465date:2022-11-18T00:00:00
db:NVDid:CVE-2022-29466date:2022-11-17T14:30:33.450

SOURCES RELEASE DATE

db:VULHUBid:VHN-420999date:2022-11-11T00:00:00
db:JVNDBid:JVNDB-2022-020987date:2023-11-07T00:00:00
db:CNNVDid:CNNVD-202211-2465date:2022-11-09T00:00:00
db:NVDid:CVE-2022-29466date:2022-11-11T16:15:14.110