ID

VAR-202302-1303


CVE

CVE-2022-26052


TITLE

Intel's  Intel MPI Library  Vulnerability regarding uncontrolled search path elements in

Trust: 0.8

sources: JVNDB: JVNDB-2022-019758

DESCRIPTION

Uncontrolled search path element in the Intel(R) MPI Library before version 2021.6 for Intel(R) oneAPI HPC Toolkit may allow an authenticated user to potentially enable escalation of privilege via local access. Intel's Intel MPI Library Exists in a vulnerability in an element of an uncontrolled search path.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state

Trust: 1.8

sources: NVD: CVE-2022-26052 // JVNDB: JVNDB-2022-019758 // VULHUB: VHN-416825 // VULMON: CVE-2022-26052

AFFECTED PRODUCTS

vendor:intelmodel:mpi libraryscope:ltversion:2021.6

Trust: 1.0

vendor:インテルmodel:intel mpi libraryscope:eqversion:2021.6

Trust: 0.8

vendor:インテルmodel:intel mpi libraryscope:eqversion: -

Trust: 0.8

vendor:インテルmodel:intel mpi libraryscope: - version: -

Trust: 0.8

sources: JVNDB: JVNDB-2022-019758 // NVD: CVE-2022-26052

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2022-26052
value: HIGH

Trust: 1.0

secure@intel.com: CVE-2022-26052
value: MEDIUM

Trust: 1.0

NVD: CVE-2022-26052
value: HIGH

Trust: 0.8

CNNVD: CNNVD-202302-1409
value: HIGH

Trust: 0.6

nvd@nist.gov: CVE-2022-26052
baseSeverity: HIGH
baseScore: 7.3
vectorString: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H
attackVector: LOCAL
attackComplexity: LOW
privilegesRequired: LOW
userInteraction: REQUIRED
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 1.3
impactScore: 5.9
version: 3.1

Trust: 1.0

secure@intel.com: CVE-2022-26052
baseSeverity: MEDIUM
baseScore: 6.7
vectorString: CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H
attackVector: LOCAL
attackComplexity: HIGH
privilegesRequired: LOW
userInteraction: REQUIRED
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 0.8
impactScore: 5.9
version: 3.1

Trust: 1.0

NVD: CVE-2022-26052
baseSeverity: HIGH
baseScore: 7.3
vectorString: CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H
attackVector: LOCAL
attackComplexity: LOW
privilegesRequired: LOW
userInteraction: REQUIRED
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: JVNDB: JVNDB-2022-019758 // CNNVD: CNNVD-202302-1409 // NVD: CVE-2022-26052 // NVD: CVE-2022-26052

PROBLEMTYPE DATA

problemtype:CWE-427

Trust: 1.1

problemtype:Uncontrolled search path elements (CWE-427) [NVD evaluation ]

Trust: 0.8

sources: VULHUB: VHN-416825 // JVNDB: JVNDB-2022-019758 // NVD: CVE-2022-26052

THREAT TYPE

local

Trust: 0.6

sources: CNNVD: CNNVD-202302-1409

TYPE

code problem

Trust: 0.6

sources: CNNVD: CNNVD-202302-1409

PATCH

title:Intel OneApi Toolkits Fixes for code issue vulnerabilitiesurl:http://123.124.177.30/web/xxk/bdxqById.tag?id=227095

Trust: 0.6

sources: CNNVD: CNNVD-202302-1409

EXTERNAL IDS

db:NVDid:CVE-2022-26052

Trust: 3.4

db:JVNid:JVNVU91223897

Trust: 0.8

db:JVNDBid:JVNDB-2022-019758

Trust: 0.8

db:CNNVDid:CNNVD-202302-1409

Trust: 0.6

db:VULHUBid:VHN-416825

Trust: 0.1

db:VULMONid:CVE-2022-26052

Trust: 0.1

sources: VULHUB: VHN-416825 // VULMON: CVE-2022-26052 // JVNDB: JVNDB-2022-019758 // CNNVD: CNNVD-202302-1409 // NVD: CVE-2022-26052

REFERENCES

url:http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00674.html

Trust: 2.6

url:https://jvn.jp/vu/jvnvu91223897/

Trust: 0.8

url:https://nvd.nist.gov/vuln/detail/cve-2022-26052

Trust: 0.8

url:https://cxsecurity.com/cveshow/cve-2022-26052/

Trust: 0.6

url:https://nvd.nist.gov

Trust: 0.1

sources: VULHUB: VHN-416825 // VULMON: CVE-2022-26052 // JVNDB: JVNDB-2022-019758 // CNNVD: CNNVD-202302-1409 // NVD: CVE-2022-26052

SOURCES

db:VULHUBid:VHN-416825
db:VULMONid:CVE-2022-26052
db:JVNDBid:JVNDB-2022-019758
db:CNNVDid:CNNVD-202302-1409
db:NVDid:CVE-2022-26052

LAST UPDATE DATE

2024-08-14T12:10:41.658000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-416825date:2023-02-28T00:00:00
db:VULMONid:CVE-2022-26052date:2023-02-17T00:00:00
db:JVNDBid:JVNDB-2022-019758date:2023-10-27T06:15:00
db:CNNVDid:CNNVD-202302-1409date:2023-03-01T00:00:00
db:NVDid:CVE-2022-26052date:2023-02-28T19:25:05.210

SOURCES RELEASE DATE

db:VULHUBid:VHN-416825date:2023-02-16T00:00:00
db:VULMONid:CVE-2022-26052date:2023-02-16T00:00:00
db:JVNDBid:JVNDB-2022-019758date:2023-10-27T00:00:00
db:CNNVDid:CNNVD-202302-1409date:2023-02-16T00:00:00
db:NVDid:CVE-2022-26052date:2023-02-16T20:15:12.730