ID

VAR-202302-1373


CVE

CVE-2022-21163


TITLE

Intel's  Intel Crypto API Toolkit for Intel SGX  Vulnerability in

Trust: 0.8

sources: JVNDB: JVNDB-2023-004604

DESCRIPTION

Improper access control in the Crypto API Toolkit for Intel(R) SGX before version 2.0 commit ID 91ee496 may allow an authenticated user to potentially enable escalation of privilege via local access. Intel's Intel Crypto API Toolkit for Intel SGX Exists in unspecified vulnerabilities.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state

Trust: 1.8

sources: NVD: CVE-2022-21163 // JVNDB: JVNDB-2023-004604 // VULHUB: VHN-408082 // VULMON: CVE-2022-21163

AFFECTED PRODUCTS

vendor:intelmodel:crypto api toolkit for intel sgxscope:ltversion:2.0

Trust: 1.0

vendor:インテルmodel:intel crypto api toolkit for intel sgxscope:eqversion:2.0

Trust: 0.8

vendor:インテルmodel:intel crypto api toolkit for intel sgxscope:eqversion: -

Trust: 0.8

vendor:インテルmodel:intel crypto api toolkit for intel sgxscope: - version: -

Trust: 0.8

sources: JVNDB: JVNDB-2023-004604 // NVD: CVE-2022-21163

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2022-21163
value: HIGH

Trust: 1.0

secure@intel.com: CVE-2022-21163
value: HIGH

Trust: 1.0

NVD: CVE-2022-21163
value: HIGH

Trust: 0.8

CNNVD: CNNVD-202302-1479
value: HIGH

Trust: 0.6

nvd@nist.gov: CVE-2022-21163
baseSeverity: HIGH
baseScore: 7.8
vectorString: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
attackVector: LOCAL
attackComplexity: LOW
privilegesRequired: LOW
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 1.8
impactScore: 5.9
version: 3.1

Trust: 1.0

secure@intel.com: CVE-2022-21163
baseSeverity: HIGH
baseScore: 8.4
vectorString: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:N
attackVector: LOCAL
attackComplexity: LOW
privilegesRequired: LOW
userInteraction: NONE
scope: CHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: NONE
exploitabilityScore: 2.0
impactScore: 5.8
version: 3.1

Trust: 1.0

NVD: CVE-2022-21163
baseSeverity: HIGH
baseScore: 7.8
vectorString: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
attackVector: LOCAL
attackComplexity: LOW
privilegesRequired: LOW
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: JVNDB: JVNDB-2023-004604 // CNNVD: CNNVD-202302-1479 // NVD: CVE-2022-21163 // NVD: CVE-2022-21163

PROBLEMTYPE DATA

problemtype:NVD-CWE-Other

Trust: 1.0

problemtype:others (CWE-Other) [NVD evaluation ]

Trust: 0.8

sources: JVNDB: JVNDB-2023-004604 // NVD: CVE-2022-21163

THREAT TYPE

local

Trust: 0.6

sources: CNNVD: CNNVD-202302-1479

TYPE

other

Trust: 0.6

sources: CNNVD: CNNVD-202302-1479

PATCH

title:Intel SGX SDK Security vulnerabilitiesurl:http://123.124.177.30/web/xxk/bdxqById.tag?id=227790

Trust: 0.6

title: - url:https://github.com/Live-Hack-CVE/CVE-2022-21163

Trust: 0.1

sources: VULMON: CVE-2022-21163 // CNNVD: CNNVD-202302-1479

EXTERNAL IDS

db:NVDid:CVE-2022-21163

Trust: 3.4

db:JVNid:JVNVU91223897

Trust: 0.8

db:JVNDBid:JVNDB-2023-004604

Trust: 0.8

db:CNNVDid:CNNVD-202302-1479

Trust: 0.6

db:VULHUBid:VHN-408082

Trust: 0.1

db:VULMONid:CVE-2022-21163

Trust: 0.1

sources: VULHUB: VHN-408082 // VULMON: CVE-2022-21163 // JVNDB: JVNDB-2023-004604 // CNNVD: CNNVD-202302-1479 // NVD: CVE-2022-21163

REFERENCES

url:http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00746.html

Trust: 2.6

url:https://jvn.jp/vu/jvnvu91223897/

Trust: 0.8

url:https://nvd.nist.gov/vuln/detail/cve-2022-21163

Trust: 0.8

url:https://cxsecurity.com/cveshow/cve-2022-21163/

Trust: 0.6

url:https://github.com/live-hack-cve/cve-2022-21163

Trust: 0.1

url:https://nvd.nist.gov

Trust: 0.1

sources: VULHUB: VHN-408082 // VULMON: CVE-2022-21163 // JVNDB: JVNDB-2023-004604 // CNNVD: CNNVD-202302-1479 // NVD: CVE-2022-21163

SOURCES

db:VULHUBid:VHN-408082
db:VULMONid:CVE-2022-21163
db:JVNDBid:JVNDB-2023-004604
db:CNNVDid:CNNVD-202302-1479
db:NVDid:CVE-2022-21163

LAST UPDATE DATE

2024-08-14T12:50:07.334000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-408082date:2023-03-06T00:00:00
db:VULMONid:CVE-2022-21163date:2023-02-17T00:00:00
db:JVNDBid:JVNDB-2023-004604date:2023-10-31T06:24:00
db:CNNVDid:CNNVD-202302-1479date:2023-03-07T00:00:00
db:NVDid:CVE-2022-21163date:2023-08-08T14:21:49.707

SOURCES RELEASE DATE

db:VULHUBid:VHN-408082date:2023-02-16T00:00:00
db:VULMONid:CVE-2022-21163date:2023-02-16T00:00:00
db:JVNDBid:JVNDB-2023-004604date:2023-10-31T00:00:00
db:CNNVDid:CNNVD-202302-1479date:2023-02-16T00:00:00
db:NVDid:CVE-2022-21163date:2023-02-16T21:15:11.443