ID

VAR-202308-2142


CVE

CVE-2022-36372


TITLE

Buffer Error Vulnerability in Multiple Intel Products

Trust: 0.8

sources: JVNDB: JVNDB-2022-024827

DESCRIPTION

Improper buffer restrictions in some Intel(R) NUC BIOS firmware may allow a privileged user to potentially enable escalation of privilege via local access. nuc 8 compute element cm8i3cb4n firmware, nuc 8 compute element cm8i5cb8n firmware, nuc 8 compute element cm8i7cb8n Multiple Intel products such as firmware contain a buffer error vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state

Trust: 1.71

sources: NVD: CVE-2022-36372 // JVNDB: JVNDB-2022-024827 // VULMON: CVE-2022-36372

AFFECTED PRODUCTS

vendor:intelmodel:nuc pro compute element nuc9vxqnxscope:eqversion: -

Trust: 1.0

vendor:intelmodel:nuc 8 compute element cm8i5cb8nscope:eqversion: -

Trust: 1.0

vendor:intelmodel:nuc rugged kit nuc8cchbnscope:eqversion: -

Trust: 1.0

vendor:intelmodel:nuc enthusiast nuc8i7hnkqcscope:eqversion: -

Trust: 1.0

vendor:intelmodel:nuc enthusiast nuc8i7hnkscope:eqversion: -

Trust: 1.0

vendor:intelmodel:nuc pro board nuc8i3pnkscope:eqversion: -

Trust: 1.0

vendor:intelmodel:nuc rugged kit nuc8cchkrscope:eqversion: -

Trust: 1.0

vendor:intelmodel:nuc pro compute element nuc9v7qnxscope:eqversion: -

Trust: 1.0

vendor:intelmodel:nuc business nuc8i7hnkqcscope:eqversion: -

Trust: 1.0

vendor:intelmodel:nuc enthusiast nuc8i7hvkvascope:eqversion: -

Trust: 1.0

vendor:intelmodel:nuc pro kit nuc8i3pnhscope:eqversion: -

Trust: 1.0

vendor:intelmodel:nuc enthusiast nuc8i7hvkvawscope:eqversion: -

Trust: 1.0

vendor:intelmodel:nuc kit nuc8i7hvkvascope:eqversion: -

Trust: 1.0

vendor:intelmodel:nuc pro compute element nuc9v7qnbscope:eqversion: -

Trust: 1.0

vendor:intelmodel:nuc pro kit nuc8i3pnbscope:eqversion: -

Trust: 1.0

vendor:intelmodel:nuc kit nuc8i7hvkscope:eqversion: -

Trust: 1.0

vendor:intelmodel:nuc pro kit nuc8i3pnkscope:eqversion: -

Trust: 1.0

vendor:intelmodel:nuc pro board nuc8i3pnbscope:eqversion: -

Trust: 1.0

vendor:intelmodel:nuc rugged kit nuc8cchkrnscope:eqversion: -

Trust: 1.0

vendor:intelmodel:nuc business nuc8i7hvkscope:eqversion: -

Trust: 1.0

vendor:intelmodel:nuc kit nuc8i7hnkqcscope:eqversion: -

Trust: 1.0

vendor:intelmodel:nuc kit nuc8i7hvkvawscope:eqversion: -

Trust: 1.0

vendor:intelmodel:nuc business nuc8i7hvkvascope:eqversion: -

Trust: 1.0

vendor:intelmodel:nuc business nuc8i7hvkvawscope:eqversion: -

Trust: 1.0

vendor:intelmodel:nuc rugged kit nuc8cchbscope:eqversion: -

Trust: 1.0

vendor:intelmodel:nuc 8 compute element cm8i7cb8nscope:eqversion: -

Trust: 1.0

vendor:intelmodel:nuc business nuc8i7hnkscope:eqversion: -

Trust: 1.0

vendor:intelmodel:nuc 8 compute element cm8pcb4rscope:eqversion: -

Trust: 1.0

vendor:intelmodel:nuc enthusiast nuc8i7hvkscope:eqversion: -

Trust: 1.0

vendor:intelmodel:nuc 8 compute element cm8ccb4rscope:eqversion: -

Trust: 1.0

vendor:intelmodel:nuc 8 compute element cm8i3cb4nscope:eqversion: -

Trust: 1.0

vendor:intelmodel:nuc pro compute element nuc9vxqnbscope:eqversion: -

Trust: 1.0

vendor:intelmodel:nuc kit nuc8i7hnkscope:eqversion: -

Trust: 1.0

vendor:intelmodel:nuc pro board nuc8i3pnhscope:eqversion: -

Trust: 1.0

vendor:インテルmodel:nuc 8 compute element cm8i5cb8nscope: - version: -

Trust: 0.8

vendor:インテルmodel:nuc pro compute element nuc9v7qnxscope: - version: -

Trust: 0.8

vendor:インテルmodel:nuc pro compute element nuc9vxqnbscope: - version: -

Trust: 0.8

vendor:インテルmodel:nuc pro kit nuc8i3pnbscope: - version: -

Trust: 0.8

vendor:インテルmodel:nuc rugged kit nuc8cchbnscope: - version: -

Trust: 0.8

vendor:インテルmodel:nuc pro kit nuc8i3pnhscope: - version: -

Trust: 0.8

vendor:インテルmodel:nuc business nuc8i7hnkqcscope: - version: -

Trust: 0.8

vendor:インテルmodel:nuc rugged kit nuc8cchkrnscope: - version: -

Trust: 0.8

vendor:インテルmodel:nuc pro board nuc8i3pnkscope: - version: -

Trust: 0.8

vendor:インテルmodel:nuc rugged kit nuc8cchkrscope: - version: -

Trust: 0.8

vendor:インテルmodel:nuc pro compute element nuc9vxqnxscope: - version: -

Trust: 0.8

vendor:インテルmodel:nuc 8 compute element cm8pcb4rscope: - version: -

Trust: 0.8

vendor:インテルmodel:nuc rugged kit nuc8cchbscope: - version: -

Trust: 0.8

vendor:インテルmodel:nuc 8 compute element cm8ccb4rscope: - version: -

Trust: 0.8

vendor:インテルmodel:nuc pro board nuc8i3pnhscope: - version: -

Trust: 0.8

vendor:インテルmodel:nuc pro compute element nuc9v7qnbscope: - version: -

Trust: 0.8

vendor:インテルmodel:nuc pro board nuc8i3pnbscope: - version: -

Trust: 0.8

vendor:インテルmodel:nuc pro kit nuc8i3pnkscope: - version: -

Trust: 0.8

vendor:インテルmodel:nuc 8 compute element cm8i3cb4nscope: - version: -

Trust: 0.8

vendor:インテルmodel:nuc 8 compute element cm8i7cb8nscope: - version: -

Trust: 0.8

sources: JVNDB: JVNDB-2022-024827 // NVD: CVE-2022-36372

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2022-36372
value: MEDIUM

Trust: 1.0

secure@intel.com: CVE-2022-36372
value: HIGH

Trust: 1.0

NVD: CVE-2022-36372
value: MEDIUM

Trust: 0.8

nvd@nist.gov: CVE-2022-36372
baseSeverity: MEDIUM
baseScore: 6.7
vectorString: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
attackVector: LOCAL
attackComplexity: LOW
privilegesRequired: HIGH
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 0.8
impactScore: 5.9
version: 3.1

Trust: 1.0

secure@intel.com: CVE-2022-36372
baseSeverity: HIGH
baseScore: 7.5
vectorString: CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H
attackVector: LOCAL
attackComplexity: HIGH
privilegesRequired: HIGH
userInteraction: NONE
scope: CHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 0.8
impactScore: 6.0
version: 3.1

Trust: 1.0

NVD: CVE-2022-36372
baseSeverity: MEDIUM
baseScore: 6.7
vectorString: CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
attackVector: LOCAL
attackComplexity: LOW
privilegesRequired: HIGH
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: JVNDB: JVNDB-2022-024827 // NVD: CVE-2022-36372 // NVD: CVE-2022-36372

PROBLEMTYPE DATA

problemtype:CWE-92

Trust: 1.0

problemtype:CWE-119

Trust: 1.0

problemtype:Buffer error (CWE-119) [NVD evaluation ]

Trust: 0.8

sources: JVNDB: JVNDB-2022-024827 // NVD: CVE-2022-36372

EXTERNAL IDS

db:NVDid:CVE-2022-36372

Trust: 2.7

db:JVNid:JVNVU99796803

Trust: 0.8

db:JVNDBid:JVNDB-2022-024827

Trust: 0.8

db:VULMONid:CVE-2022-36372

Trust: 0.1

sources: VULMON: CVE-2022-36372 // JVNDB: JVNDB-2022-024827 // NVD: CVE-2022-36372

REFERENCES

url:http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00917.html

Trust: 1.9

url:https://jvn.jp/vu/jvnvu99796803/

Trust: 0.8

url:https://nvd.nist.gov/vuln/detail/cve-2022-36372

Trust: 0.8

url:https://nvd.nist.gov

Trust: 0.1

sources: VULMON: CVE-2022-36372 // JVNDB: JVNDB-2022-024827 // NVD: CVE-2022-36372

SOURCES

db:VULMONid:CVE-2022-36372
db:JVNDBid:JVNDB-2022-024827
db:NVDid:CVE-2022-36372

LAST UPDATE DATE

2024-08-14T12:54:57.810000+00:00


SOURCES UPDATE DATE

db:VULMONid:CVE-2022-36372date:2023-08-11T00:00:00
db:JVNDBid:JVNDB-2022-024827date:2024-01-22T02:37:00
db:NVDid:CVE-2022-36372date:2023-11-07T03:49:36.840

SOURCES RELEASE DATE

db:VULMONid:CVE-2022-36372date:2023-08-11T00:00:00
db:JVNDBid:JVNDB-2022-024827date:2024-01-22T00:00:00
db:NVDid:CVE-2022-36372date:2023-08-11T03:15:13.040