ID

VAR-202302-1275


CVE

CVE-2022-26345


TITLE

Intel's  openmp  Vulnerability regarding uncontrolled search path elements in

Trust: 0.8

sources: JVNDB: JVNDB-2022-019755

DESCRIPTION

Uncontrolled search path element in the Intel(R) oneAPI Toolkit OpenMP before version 2022.1 may allow an authenticated user to potentially enable escalation of privilege via local access. Intel's openmp Exists in a vulnerability in an element of an uncontrolled search path.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state

Trust: 1.8

sources: NVD: CVE-2022-26345 // JVNDB: JVNDB-2022-019755 // VULHUB: VHN-417061 // VULMON: CVE-2022-26345

AFFECTED PRODUCTS

vendor:intelmodel:openmpscope:ltversion:2022.1

Trust: 1.0

vendor:インテルmodel:openmpscope:eqversion: -

Trust: 0.8

vendor:インテルmodel:openmpscope: - version: -

Trust: 0.8

vendor:インテルmodel:openmpscope:eqversion:2022.1

Trust: 0.8

sources: JVNDB: JVNDB-2022-019755 // NVD: CVE-2022-26345

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2022-26345
value: HIGH

Trust: 1.0

secure@intel.com: CVE-2022-26345
value: MEDIUM

Trust: 1.0

NVD: CVE-2022-26345
value: HIGH

Trust: 0.8

CNNVD: CNNVD-202302-1402
value: HIGH

Trust: 0.6

nvd@nist.gov: CVE-2022-26345
baseSeverity: HIGH
baseScore: 7.3
vectorString: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H
attackVector: LOCAL
attackComplexity: LOW
privilegesRequired: LOW
userInteraction: REQUIRED
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 1.3
impactScore: 5.9
version: 3.1

Trust: 1.0

secure@intel.com: CVE-2022-26345
baseSeverity: MEDIUM
baseScore: 6.7
vectorString: CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H
attackVector: LOCAL
attackComplexity: HIGH
privilegesRequired: LOW
userInteraction: REQUIRED
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 0.8
impactScore: 5.9
version: 3.1

Trust: 1.0

NVD: CVE-2022-26345
baseSeverity: HIGH
baseScore: 7.3
vectorString: CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H
attackVector: LOCAL
attackComplexity: LOW
privilegesRequired: LOW
userInteraction: REQUIRED
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: JVNDB: JVNDB-2022-019755 // CNNVD: CNNVD-202302-1402 // NVD: CVE-2022-26345 // NVD: CVE-2022-26345

PROBLEMTYPE DATA

problemtype:CWE-427

Trust: 1.1

problemtype:Uncontrolled search path elements (CWE-427) [NVD evaluation ]

Trust: 0.8

sources: VULHUB: VHN-417061 // JVNDB: JVNDB-2022-019755 // NVD: CVE-2022-26345

THREAT TYPE

local

Trust: 0.6

sources: CNNVD: CNNVD-202302-1402

TYPE

code problem

Trust: 0.6

sources: CNNVD: CNNVD-202302-1402

PATCH

title:Intel OneApi Toolkits Fixes for code issue vulnerabilitiesurl:http://123.124.177.30/web/xxk/bdxqById.tag?id=227089

Trust: 0.6

title: - url:https://github.com/Live-Hack-CVE/CVE-2022-26345

Trust: 0.1

sources: VULMON: CVE-2022-26345 // CNNVD: CNNVD-202302-1402

EXTERNAL IDS

db:NVDid:CVE-2022-26345

Trust: 3.4

db:JVNid:JVNVU91223897

Trust: 0.8

db:JVNDBid:JVNDB-2022-019755

Trust: 0.8

db:CNNVDid:CNNVD-202302-1402

Trust: 0.6

db:VULHUBid:VHN-417061

Trust: 0.1

db:VULMONid:CVE-2022-26345

Trust: 0.1

sources: VULHUB: VHN-417061 // VULMON: CVE-2022-26345 // JVNDB: JVNDB-2022-019755 // CNNVD: CNNVD-202302-1402 // NVD: CVE-2022-26345

REFERENCES

url:http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00674.html

Trust: 2.6

url:https://jvn.jp/vu/jvnvu91223897/

Trust: 0.8

url:https://nvd.nist.gov/vuln/detail/cve-2022-26345

Trust: 0.8

url:https://cxsecurity.com/cveshow/cve-2022-26345/

Trust: 0.6

url:https://github.com/live-hack-cve/cve-2022-26345

Trust: 0.1

url:https://nvd.nist.gov

Trust: 0.1

sources: VULHUB: VHN-417061 // VULMON: CVE-2022-26345 // JVNDB: JVNDB-2022-019755 // CNNVD: CNNVD-202302-1402 // NVD: CVE-2022-26345

SOURCES

db:VULHUBid:VHN-417061
db:VULMONid:CVE-2022-26345
db:JVNDBid:JVNDB-2022-019755
db:CNNVDid:CNNVD-202302-1402
db:NVDid:CVE-2022-26345

LAST UPDATE DATE

2024-08-14T12:55:57.980000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-417061date:2023-02-28T00:00:00
db:VULMONid:CVE-2022-26345date:2023-02-17T00:00:00
db:JVNDBid:JVNDB-2022-019755date:2023-10-27T06:12:00
db:CNNVDid:CNNVD-202302-1402date:2023-03-01T00:00:00
db:NVDid:CVE-2022-26345date:2023-02-28T19:22:51.133

SOURCES RELEASE DATE

db:VULHUBid:VHN-417061date:2023-02-16T00:00:00
db:VULMONid:CVE-2022-26345date:2023-02-16T00:00:00
db:JVNDBid:JVNDB-2022-019755date:2023-10-27T00:00:00
db:CNNVDid:CNNVD-202302-1402date:2023-02-16T00:00:00
db:NVDid:CVE-2022-26345date:2023-02-16T20:15:13.057